Sie sind auf Seite 1von 160

2001

H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 212

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1319

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 2024

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

204

An organisation needs to store staff manuals, forms and policy information to allow
online access for employees.
What would be the most appropriate form of storage to use?
(A) Hypermedia
(B)

Filing cabinet

(C)

Flat-file database

(D) Relational database


2

A student locates information on the World Wide Web, at the following address:
http://edweb.optics.crc.org.au/fibres/fabrication.htm
The student saves the web page for later viewing, accepting the default name suggested
by the browser.
Which of the following is most likely to identify the saved file when the student attempts
to locate it at a later time?
(A) document1.htm
(B)

fabrication.doc

(C)

fabrication.htm

(D) fibres/fabrication.htm
3

Which of the following design tools shows the movement of information in an


information system?
(A) Decision table
(B)

Context diagram

(C)

System flowchart

(D) Data flow diagram


4

What does a database schema consist of?


(A) Records, entities and attributes
(B)

Relationships, entities and attributes

(C)

Relationships, attributes and fields

(D) Relationships, entities and files

In developing an information system last year, the Australian Taxation Office used data
collected by the Electoral Commissioner. This data included name, address, gender and
birth date. The Solicitor-General intervened during the development of the project to
prevent this information being used.
What issue would the Solicitor-General be concerned about in this situation?
(A) Acknowledgement of data sources
(B)

Freedom of Information Act

(C)

Privacy principles

(D) Reliability of data sources


6

A passenger in a car travelling in country New South Wales phones a friend in Sydney.
The diagram shows how the call could be transmitted through the telephone system.

Telephone
Exchange
Regional NSW
Segment 1
3.5 km

Telephone
Exchange
Orange
Segment 2
120 km

Telephone
Exchange
Sydney
Segment 3
260 km

Home in
Sydney

Segment 4
15 km

What transmission media, in order from Segment 1 to Segment 4, would be most


appropriate?
(A) Microwave, microwave, optic fibre, twisted-pair cable
(B)

Radio, microwave, optic fibre, twisted-pair cable

(C)

Radio, radio, twisted-pair cable, coaxial cable

(D) Radio, microwave, twisted-pair cable, coaxial cable

What is the meaning of the term baud rate?


(A) The number of bits that can be transmitted along a communications channel every
second.
(B)

The full range of frequencies that a communications channel is capable of


transmitting.

(C)

The full range of frequencies that can be transmitted along a communications


channel every second.

(D) The number of electronic signals or data symbols that can be transmitted along a
communications channel every second.
8

A systems professional works with participants to identify the requirements of a system.


Based on these requirements, the following screen is developed:
UTILITY COSTS
Usage rate:
Cost:

Following participant feedback, the screen is modified to the following:


UTILITY USAGE PROFILE
Department:
Date:
Usage rate:
Cost:
Cost to date:
What is the most accurate description of this activity?
(A) Developing a project plan
(B)

Information strategy planning

(C)

Participant development

(D) Prototype modification

What type of network is shown in the diagram?

Personal computer
Personal computer
Print
server

Personal computer

Web
server

Personal computer
Tape backup

Printer

(A) Bus
(B)

Star

(C)

Local area

(D) Wide area


10

Which of the following is NOT an example of metadata?


(A) Data dictionary
(B)

Data flow diagram

(C)

HTML tags

(D) Schema

11

A teacher whose students are located in remote areas of Australia uses reliable electronic
mail and facsimile to communicate with them.
What disadvantage would this have for the communication between teacher and
students?
(A) Errors may occur in the messages because the teacher will not be able to check the
messages after sending them.
(B)

Messages from the teacher may arrive too late for the time scheduled for the
students and teacher to communicate.

(C)

The information in the message could not be explained if students are unclear about
the tasks that they are required to complete.

(D) Messages might be misinterpreted because the teachers facial expressions and
body language cannot be seen by the students.
12

A local community group decides to produce a monthly newsletter.


This is the Gantt chart the group uses.
TASK NO

TASK NAME

DAYS
MON TUE WED THUR FRI MON TUE WED THUR FRI

Start

Establish brief

Write stories

Design graphics

Gather photos

Desktop publish

Proof

Edit and finalise

Print

How many days will elapse in the completion of tasks 2, 3 and 4?


(A) 3 days
(B)

4 days

(C)

6 days

(D) 7 days

13

Students are simulating the way that a network deals with multiple users accessing the
network. They are sitting in a circle, with their eyes closed, obeying the following two
rules:
No-one can talk when someone else is talking.
If someone starts talking at the same time as someone else, both must stop talking and
wait between two and five seconds before they may try talking again.
Which topology would use the protocol they are simulating?
(A) Bus
(B)

Star

(C)

Hybrid

(D) Token Ring

Use the diagram to answer Questions 14 and 15.


This diagram is used in designing an information system.

Customer

Bank
drafts

Batched
draft

Accept
transaction

Proof
transaction

Proofed
batches

Customer
account

Sort
batch

Sorted
approved
items

Approved
items

Queried
items

Details of
approved
items

Account details
Generate
statement
Statement

Clearing
house

Customer

14

The following symbol appears in the diagram on page 8.


Customer
account
What does this symbol represent?
(A) A process
(B)

A data flow

(C)

A data store

(D) An external entity


15

Which of the following is the correct context diagram for the system?
(A)
Customer

(B)
Customer

(C)
Customer

(D)
Customer

Bank
drafts
Statement

Item
processing
system

Bank
drafts

Item
processing
system
Transaction
approval

Bank
drafts

Bank
drafts

Queried
items

Queried
items

Item
processing
system

Statement

Item
processing
system

Statement

Queried
items
Clearing
house

Clearing
house

Clearing
house

Customer

Customer

Use the following information to answer Questions 16 and 17.


A university keeps staff data in this database table:
FACULTY

16

FACID

FAC_NAME

DEPARTMENT

GENDER SALARY

J01

RAYMOND J JAAFAR I.T.

MALE

60 000

S01

LYNETTE SIMON

I.T.

FEMALE

65 000

D01

ANDREA DCRUZ

I.T.

FEMALE

54 500

S02

DIB SURANYI

HISTORY

MALE

48 000

K01

LE HAN KWOK

ACCOUNTING

FEMALE

55 000

The following SQL statement is used to select data:


SELECT FACID, FAC_NAME
FROM FACULTY
WHERE SALARY > 55 000 AND SALARY < 50 000

Which of the following sets of data will be retrieved?


(A)

FACID

FAC_NAME

(B)

FACID

FAC_NAME

J01

RAYMOND J JAAFAR

S01

LYNETTE SIMON

S02

DIB SURANYI

FACID

FAC_NAME

J01

RAYMOND J JAAFAR 60 000

S01

LYNETTE SIMON

65 000

S02

DIB SURANYI

48 000

FACID

FAC_NAME

DEPARTMENT

J01

RAYMOND J JAAFAR I.T.

MALE

60 000

S01

LYNETTE SIMON

I.T.

FEMALE

65 000

S02

DIB SURANYI

HISTORY

MALE

48 000

(C)

(D)

SALARY

10

GENDER SALARY

17

Details about each of the courses taught by each staff member need to be added to the
database.
Which of the following changes will allow this to happen while minimising data
redundancy?
(A) Add a field
(B)

Add independent metadata

(C)

Add a table with a foreign key

(D) Add a table with a primary key


18

An analysis of the criteria for the award of certificates resulted in this decision table.
Conditions
Junior subjects completed 6
Senior subjects completed = 5
Senior subjects completed > 5
Special subjects completed > 1

Actions
Issue junior certificate
Issue senior certificate
Issue certificate of attainment

Rules



Which of the following conditions will result in a certificate of attainment being issued?
(A) Completion of less than six junior subjects and more than five senior subjects
(B)

Completion of at least six junior subjects and less than five senior subjects

(C)

Completion of at least six junior subjects and exactly five senior subjects and one
special subject

(D) Completion of less then six junior subjects and exactly five senior subjects and one
special subject

11

Use this information to answer Questions 19 and 20.


The diagram represents the information system of an organisation.
Purpose
To sell fresh flowers to customers and deliver in minimum time
Organisations Information System
Information Processes
collecting customers use the Internet to place orders for flowers
storage and retrieval order and delivery data stored on central computer
analysing sales data summarised to produce productivity and
performance reports
transmitting and receiving orders transmitted to flower growers, delivery
requests transmitted to courier delivery service

Participants
customers placing orders
flower growers
courier delivery service
administration staff
Internet service providers
(ISPs)

19

Data/Information
product availability
order data
delivery data
grower database
sales data

Information Technology
network using public
telecommunications
infrastructure
web server
database

The diagram was created during analysis of the information system. What do the arrows
on the diagram represent?
(A) Hyperlinks between storyboards
(B)

The flow of data between the related components

(C)

Two-way interactions between the related components

(D) Full duplex telecommunication between the related components


20

Which of the following does this diagram most accurately represent?


(A) The information system of an online library
(B)

The information system of a virtual organisation

(C)

The information system of a telecommuting organisation

(D) The information system of a communications service provider

12

2001 HSC
Notes from
the Examination Centre
Information Processes and Technology

2001 HSC Notes from the Examination Centre - Information Processes and Technology

Once final marking commences, Senior Markers arrange for a number of control scripts to be
individually marked by all Markers of a question and then compare the way in which the marking
guidelines are being applied. Senior Markers also monitor the statistics, which are processed each
session for each marker, each group and each question. Senior Markers check-mark papers from
every centre. These procedures ensure that the marking guidelines are consistently applied by all
Markers, at all times, throughout the entire marking operation.

The HSC Examination


In 2001, 10620 candidates presented for the Information Processes and Technology Higher School
Certificate Examination.
The Higher School Certificate Examination focused on assessing how well candidates could apply
and adapt the concepts they had learnt in the Stage 6 Information Processes and Technology course.
It required them to adapt their knowledge and understanding to a variety of situations. The
examination emphasised the importance of applying the tools of information systems in a given
context as opposed to regurgitating rote-learnt facts. A large majority of candidates found this
approach to be quite challenging. Markers observed that many candidates were able to identify a
key concept and describe that key concept in detail. However, alarmingly few candidates were able
to apply their understanding to the context of a particular question.
Candidates should be reminded that the mark value allocated for each question part, along with the
key word used in each question part, indicates the level of depth an answer requires to fully
address the question.
It is recommended that candidates be given ample opportunity to practice the application of the key
concepts to various scenarios.

Section I Multiple Choice

Question

Correct
Response

Question

Correct
Response

1
2
3
4
5
6
7
8
9
10

A
C
D
B
C
B
D
D
C
B

11
12
13
14
15
16
17
18
19
20

D
A
A or B
C
A or D
A
C
B
C
B

2002
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 211

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1216

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1725

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

When developing a new system, a project team needs to carry out a series of interviews
with the system participants.
Which is the most important set of skills to ensure effective data gathering?
(A) Negotiation skills
(B)

In-depth technical skills

(C)

Conflict resolution skills

(D) Question preparation skills


2

What type of cable is shown in this diagram?

Insulation
Outer conductor
Insulation
Inner conductor

(A) Coaxial
(B)

Fibre optic

(C)

Shielded twisted pair

(D) Unshielded twisted pair


3

Hypermedia, by its very nature, CANNOT be transferred to


(A) an optical disk.
(B)

another computer.

(C)

a paper document.

(D) a computer network.

Which of the following storage media does NOT support direct access to data?
(A) Magnetic tape
(B)

Magnetic disk

(C)

Optical disk

(D) CD-ROM
5

Which of the following best describes a network operating system?


(A) Hardware needed for the operation of a network
(B)

A configuration of devices to support network operation

(C)

Software used to protect microcomputers on a network from virus infection

(D) Software that controls network communications and the sharing of resources
6

Which of the following would be a primary consideration when determining the


economic feasibility of a proposed solution?
(A) The availability of suitable hardware and software
(B)

The time taken to implement the proposed solution

(C)

Whether users will be able to operate the proposed solution

(D) The purchase costs of new hardware required for the proposed solution
7

An organisation stores large amounts of data, collected by its transaction processing


system, in a data warehouse.
How would the data warehouse be most effectively used?
(A) Storing data for everyday transaction processing
(B)

Providing a storage facility for the organisations products

(C)

Mining the data to find trends that identify marketing opportunities

(D) Preparing summary reports to help managers make marketing decisions

Which of the following is the best description of the network shown?

Hub

Cable modem

External
cable

Printer
Personal computer

Personal computer

(A) An intranet that has strong security and a cable modem to protect against access by
off-site users
(B)

A small network that allows users to share files and a printer, and to access the
internet using a cable modem

(C)

A wide area network for a small business that allows online ordering of products
from suppliers via the internet, and sharing of a printer and file server

(D) A local area network for a small business with a dedicated file server that allows
sharing of database application software, online tape storage and a printer
9

A medical service has implemented an information system to collect and organise the
personal information of patients.
Which of the following is NOT an ethical practice in the management of the information
system?
(A) Information about patients is kept secure.
(B)

Information about patients is made available to drug companies.

(C)

The medical service obtains the patients consent to collect their information.

(D) The medical service uses the information only for the reason it was collected.

10

Which information system development approach is best described by the diagram?


Build first
version of the
system

Evaluate the
system

Abandon the
system

Decide on
next step

Revise the
system

System
complete

(A) Prototyping
(B)

Phased approach

(C)

Feasibility study

(D) End-user development


11

A cat owner wants to use an internet search engine to find sites about cat health.
However, many internet sites on cat health also contain information about dogs.
Which of the following would best narrow the search so that the search engine lists sites
that have information focusing on cat health?
(A) +cat +dog
(B)

+cat dog

(C)

+cat +health dog

(D) +cat +health +dog

12

The following reply was received by a student who sent an email to a friend.

What should the student do to ensure that the email is sent successfully to the friend?
(A) Re-send the message to pete.hindler@hotmail.com
(B)

Create a new message and send it to the same email address

(C)

Save the message and re-send it later to hsc.student@school.edu.au

(D) Re-send the message after checking and correcting the email address
13

Which of the following activities would occur when developing a project plan?
(A) Detailing the time frame of the project
(B)

Determining the nature of the problem

(C)

Determining if project objectives have been met

(D) Documenting the economic and technical feasibility of the project

Use this table to answer Questions 14 and 15.


A real estate agency has the following rental properties in its database:
Properties
Address
19 Blewett St, Hurstville
17 Bevan Pl, Padstow
16 Gilchrist Dr, Allawah
43 Hayden Pl, Revesby
99 Waugh St, Hurstville

14

Rent
270
260
250
210
200

Type
House
Flat
Flat
Townhouse
House

Branch
Hurstville
Bankstown
Hurstville
Hurstville
Bankstown

What would be the output from the following SQL statement?


SELECT

Address, Branch

FROM Properties

WHERE Branch = Hurstville;

(A)

Address

Rent

Type

Branch

(B)

Address
19 Blewett St, Hurstville
16 Gilchrist Dr, Allawah
43 Hayden Pl, Revesby

Rent
270
250
210

Type
House
Flat
Townhouse

Branch
Hurstville
Hurstville
Hurstville

(C)

Address
19 Blewett St, Hurstville
99 Waugh St, Hurstville

Branch
Hurstville
Bankstown

(D)

Address
19 Blewett St, Hurstville
16 Gilchrist Dr, Allawah
43 Hayden Pl, Revesby

Branch
Hurstville
Hurstville
Hurstville

15

A family wants to find a place to live where the rent is no more than $250. Both houses
and flats would be suitable.
Which of these SQL statements will list suitable properties?
(A) SELECT Address FROM
Properties
WHERE Type = House AND Type = Flat AND Rent <= 250;
(B)

SELECT Address FROM


Properties
WHERE Type = House OR Type = Flat OR Rent <= 250;

(C)

SELECT Address FROM


Properties
WHERE (Type = House AND Type = Flat) OR Rent <= 250;

(D) SELECT Address FROM


Properties
WHERE (Type = House OR Type = Flat) AND Rent <= 250;
16

Protocols must be able to manage two computers on a network trying to send data at the
same time.
How do the Token Ring protocol and the Ethernet protocol manage this?
(A) Token Ring detects collisions, Ethernet detects collisions.
(B)

Token Ring avoids collisions, Ethernet detects collisions.

(C)

Token Ring detects collisions, Ethernet avoids collisions.

(D) Token Ring avoids collisions, Ethernet avoids collisions.


17

A major enhancement has been planned for the information system of a department store.
The diagram represents part of the existing database used by the store.
Employee code

Telephone number

Postcode

Available after hours

SMIT07

(02) 94431112

2037

Which data types would you expect to find in the data dictionary for these fields?
Employee code

Telephone number

Postcode

Available after hours

(A)

Text

Number

Number

Boolean

(B)

Alphabetic

Text

Number

Text

(C)

Text

Text

Number

Boolean

(D)

Alphabetic

Number

Number

Text

Use this information to answer Questions 18 and 19.


A direct marketing company proposes streamlining its inventory control system.
In the proposed system, once a telephone order is received, the operator will enter the order
details into the computer system, and check and update stock availability in the companys
central database. When the order is accepted, payment is automatically processed electronically
using the customers banking details, and a receipt is generated.
The diagram describes part of the ordering procedures in the proposed system.

Order details

Stock
availability

OK?

No

Reject order

Yes

Payment

10

Bank

18

What symbols would be included in the areas 1, 2 and 3?

(A)

(B)

(C)

(D)

19

In the system flowchart on page 10, what does the symbol

represent?

(A) Data inquiry


(B)

Online input

(C)

Direct access

(D) Manual operation


20

The following seven-bit ASCII character and parity bit were transmitted:
0011010

Which of the following examples would cause the receiver to request that the message
be re-sent?
ASCII character

Parity bit

(A)

1011010

(B)

0011011

(C)

0011011

(D)

0011010

11

2002 HSC Notes from


the Marking Centre
Information Processes and Technology

2002 HSC Notes from the Marking Centre Information Processes and Technology

Section I

Question
1
2
3
4
5
6
7
8
9
10

Correct
Response
D
A
C
A
D
D
C
B
B
A

Question
11
12
13
14
15
16
17
18
19
20

Correct
Response
C
D
A
D
D
B
C
A
B
C

Section II
Candidates were required to answer all four questions in this section.
Many candidates did not start a separate writing booklet for each question. It was sometimes
difficult to determine where one question ended and the next began. It is crucial that candidates
ensure that they start a new writing booklet for each question and clearly label which question they
are attempting. It also assists in the marking process if candidates indicate which part of the
question their answer is addressing.
Candidates who were familiar with the Board of Studies glossary of key words were more likely to
understand what type of responses were expected. This section required candidates to identify,
discuss, describe, outline and propose. Scenarios and diagrams were used in order to encourage
candidates to apply their knowledge and understanding of information-based systems to practical
situations. Many candidates found this a difficult task to undertake. Responses commonly
contained the students experiences of a situation similar to that in scenarios, rather than the
systems or computing perspectives.
Question 21
In this question candidates were required to discuss the roles of a file server and apply their
understanding of data redundancy and normalisation to the given scenario.
A surprisingly large number of candidates experienced difficulty in attempting this question. Some
candidates related the concept of data redundancy to a network rather than the database and there
was generally a very limited understanding of the process of normalisation.
(a)

A significant number of candidates confused the role of a file server with a communications
device rather than its primary role of storage and retrieval of files. Often the physical
characteristics were discussed rather than the role that the file server plays on a network.

2003
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 212

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1316

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1725

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

What type of information process is capturing data from a person requesting cash from
an EFTPOS terminal?
(A) Analysing
(B)

Collecting

(C)

Organising

(D) Processing
2

At what stage of a project would a system be measured against its design specifications?
(A) Designing
(B)

Evaluating

(C)

Prototyping

(D) Implementing
3

A website displays the following definition, and each underlined word is a link to another
definition.
A storage area network (SAN) is a high-speed
special-purpose network that interconnects
different kinds of storage devices with associated
servers. Typically, a storage area network is part
of the overall network of computing resources for
an organisation.

What is the name given to this method of data organisation?


(A) HTML
(B)

Metadata

(C)

Hypertext

(D) Relational

Which of the following would be most appropriate to demonstrate screen design to users?
(A) Prototype
(B)

Context diagram

(C)

System flowchart

(D) Schematic diagram


5

Which of the following describes the nature of communication in teleconferencing?


(A) Same-time, same-place
(B)

Same-time, different-place

(C)

Different-time, same-place

(D) Different-time, different-place


6

Which terms are used to describe the structure of data stored in a database?
(A) Character, field, record, file
(B)

Field name, size, type, attribute

(C)

Direct, sequential, indexed sequential, random

(D) Relational, hierarchical, hypertext, hypermedia


7

Why is it important to involve users in the development of an information system?


(A) Users are best at designing systems.
(B)

Users need to ensure that the development stays on track.

(C)

Users always have an in-depth knowledge of the technology.

(D) Users are more likely to accept a system to which they have contributed.

Which pair of the following diagrams illustrates a bus network topology and a star
network topology?
Star

Bus
(A)

(B)

(C)

(D)

Wright Books has ten shops connected by a network. Each shop maintains and stores its
own data about the books it sells and its business transactions. The DBMS makes this
data available to all the shops on the network.
What type of database is being used?
(A) Localised
(B)

Centralised

(C)

Distributed

(D) Decentralised
10

Kerry attempted to send Joanne a copy of her rsum as an attachment to an email. This
is the email that Joanne received:

Dear Joanne,
Please find attached my rsum in a word-processed document.
Regards,
Kerry.

What is the most likely explanation for the rsum file not being received by Joanne?
(A) The file was incorrectly saved.
(B)

The file was in the wrong format.

(C)

The file was incorrectly compressed.

(D) The file was not attached to the email.

11

A company uses a relational database to store data about employees. Which of the
following would be an example of data redundancy in that database?
(A) Storing unsorted data in a table
(B)

Storing inaccurate data about an employee in a table

(C)

Storing data not needed for reporting in different tables

(D) Storing the same details about an employee in different tables

12

Printer
Personal computer
Personal computer

Wireless
network
server
Laptop computer

Internet
server

Personal computer

The Internet

KEY
Cable
Radio signal
For which connection in the diagram would a broadband connection be MOST
advantageous?
(A) Between the Internet server and the Internet
(B)

Between the personal computer and the printer

(C)

Between the laptop and the wireless network server

(D) Between each personal computer and the wireless network server

13

The data flow diagram represents part of a booking system.


Destination, fare
Passenger
Ticket

Print
ticket

Ticket details

Seat
Allocation

In order, what do the symbols 1, 2, 3 and 4 represent?


(A) Process, decision, link, online display
(B)

External entity, process, data flow, data store

(C)

Data store, process, data flow, external entity

(D) Process, direct access storage, link, paper document


14

A car dealership uses a relational database. The data dictionary for one of the database
tables is as follows:
Field name

Type

Size

Description

VIN

Text

20

Vehicle identification number

Make

Text

10

Vehicle manufacturer

Model

Text

10

Model name

Price

Currency

Cost in whole dollars

If there were 100 records in this table, which calculation would give the approximate size
(in kilobytes) for the data stored in the table?
(A)

20 + 10 + 10 + 6
1024

(B)

(20 + 10 + 10 + 6) 100
8 1024

(C)

(20 + 10 + 10 + 6) 1024
100

(D)

(20 + 10 + 10 + 6) 100
1024

15

Which of the following is a difference between an intranet and the Internet?


(A) An intranet can only be used by people within an organisation; the Internet can be
used by the world community.
(B)

An intranet can be used by the local community; the Internet can only be used by
people within an organisation.

(C)

An intranet can only be used by suppliers and customers of an organisation; the


Internet can be used by the world community.

(D) An intranet can only be used by people within an organisation; the Internet can only
be used by suppliers and customers of an organisation.
An analogue signal is sampled once every second to convert it to a digital signal. The
signal has a maximum height of 4.
4
3
Height

16

2
1
0

2
3
Time (seconds)

What would be the digital signal generated for samples at 2, 3 and 4 seconds?
(A) 010

011

100

(B)

010

100

001

(C)

010

011

001

(D) 010

100

100

Use the following decision table to answer Questions 17 and 18.


This decision table is used to assess insurance claims.
Conditions

Rules

Loss is under $300

Police report submitted

Claim accepted

Claim rejected

Actions

17

Which statement is always TRUE?


(A) A claim is accepted if the loss is $250.
(B)

A claim is accepted if a police report is submitted.

(C)

A claim is accepted if the loss is $300 and a police report is submitted.

(D) A claim is accepted if the loss is $250 and a police report is submitted.

10

18

Which decision tree is equivalent to the decision table?


Loss is
under $300
Y
(A)
N

Loss is
under $300
Y
(B)
N

Loss is
under $300
Y
(C)
N

Loss is
under $300
Y
(D)
N

Police report
submitted

Action

Accept

Reject

Reject

Reject

Police report
submitted

Action

Accept

Accept

Accept

Reject

Police report
submitted

Action

Reject

Reject

Accept

Reject

Police report
submitted

Action

Reject

Accept

Accept

Reject

11

Use the following schema to answer Questions 19 and 20.


STUDENT

ENROL

SUBJECT

Stu_ID

Stu_ID

Subj_No

Stu_FirstName

Subj_No

Subj_Name

Stu_LastName

Date_Commenced

Department

Phone_Number

Result
Fees_Paid

19

What keys would be used in the schema to relate the tables for students enrolled in
subjects?
Primary keys

20

Foreign keys

(A) ENROL.Stu_ID

and ENROL.Subj_No

STUDENT.Stu_ID and SUBJECT.Subj_No

(B) ENROL.Subj_No

and ENROL.Stu_ID

SUBJECT.Subj_No and ENROL.Subj_No

(C) SUBJECT.Subj_No and STUDENT.Stu_ID

ENROL.Stu_ID

(D) STUDENT.Stu_ID and SUBJECT.Subj_No

STUDENT.Stu_ID and ENROL.Subj_No

and ENROL.Subj_No

A sample record in the table ENROL is


s1234567

1602

29/01/2001

76

How would each field be BEST defined in a data dictionary for the table ENROL?
(A) Text, numeric, date, text, text
(B)

Text, text, date, numeric, Boolean

(C)

Numeric, text, date, numeric, text

(D) Numeric, numeric, date, text, Boolean

12

2003 HSC Notes from


the Marking Centre
Information Processes and Technology

2003 HSC Notes from the Marking Centre Information Processes and Technology

Section I

Question
1
2
3
4
5
6
7
8
9
10

Correct
Response
B
B
C
A
B
A
D
D
C
D

Question
11
12
13
14
15
16
17
18
19
20

Correct
Response
D
A
B
D
A
B
C
C
C
B

Section II
Candidates were required to answer all four questions in this section.
Candidates who were familiar with the Board of Studies glossary of key words were more likely to
understand what type of responses were expected. This section required candidates to identify,
describe, design, construct, outline, draw, recommend and justify. Scenarios and tables were used in
order to encourage candidates to apply their knowledge and understanding of information-based
systems to practical situations. While many candidates were able to identify and describe, fewer
students were able to apply their knowledge to the given situations.
Question 21
This question allowed candidates to demonstrate their knowledge and understanding of setting up a
website in a context to which they could relate. In general, candidates responses reflected a
reasonable understanding of what was required of them and hence most candidates could gain some
marks from their responses.
(a)

This part required candidates to identify the hardware, software and communications
technology required to implement the website. Candidates who had a good knowledge
of the three technologies answered this question well. Most candidates could identify
the appropriate hardware and software required but many failed to address the
communications technology involved. Weaker responses simply suggested that the
internet and the phone was all that was needed from a communications perspective.

(b)

This part required candidates to identify and describe security measures which could be
implemented to prevent unauthorised access to data stored on the website. Better
responses described appropriate methods in detail and how they would be implemented
in this situation. Many candidates could not describe their functionality sufficiently in
this scenario and the weakest responses gave poor generic descriptions of sometimes
inappropriate security measures and displayed a poor understanding of their practical
implementation.

2004
HI GHER SCHOOL CERTI FI CATE
EX AMI NATI ON

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 212

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1316

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1720

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

Which of the following is most relevant when writing an operation manual for a new
information system?
(A) Data flow diagram
(B)

Technical feasibility

(C)

Cost-benefit analysis

(D) Participants background


2

The text below has been found in a file.


<title>Information Processes and Technology</title>
<p>Notes may be downloaded here
<a href=admin/IPTnotes.pdf> IPT Notes </a> </p>
<p>&nbsp; </p>
<h3>Topics</h3>

Which of the following best describes the content of the file?


(A) HTML code
(B)

Programming code

(C)

Rich text for a word processor

(D) Plain text for a word processor


3

A message is protected during transmission by applying an algorithm to the data. Another


algorithm is applied to restore the original message after it is transmitted.
In order, what terms are given to these two processes?
(A) Encoding and coding
(B)

Decryption and decoding

(C)

Decryption and encryption

(D) Encryption and decryption

Which diagram represents the transmission of a digital signal?


(A)

(B)

(C)

(D)

Which document typically assists in determining whether a project should proceed, based
on an analysis of the benefits, costs and risks associated with the project?
(A) Project plan
(B)

Feasibility study report

(C)

Project evaluation report

(D) Asset management report

A bank customer makes a cash withdrawal using an automatic teller machine (ATM).
What is the role of the customer in relation to the information system of the bank?
(A) User only
(B)

Participant only

(C)

User and participant

(D) User interface and participant

Use this information to answer Question 7.


Folder: INBOX
Date

From

Subject

Size

20/11/2003 Rita Fox

Photos

640 Kb

19/11/2003 Robert Haze

Committee meeting

1.6 Kb

18/11/2003 Best Bargains [SPAM***] Unbeatable offer . . . 1.2 Mb

What is the most likely reason [SPAM***] has been placed in the subject of the email
from Best Bargains?
(A) The email is the oldest.
(B)

The email contains a virus.

(C)

The email is considered to be too large.

(D) The email is considered to be junk mail.


8

Jean investigates the use of a personal information system to produce party invitations.
She is uncertain if she has the software on her computer to produce the invitations. She
has only one week to complete the task.
What feasibilities apply to Jeans situation?
(A) Economic and ethical
(B)

Technical and schedule

(C)

Operational and technical

(D) Schedule and organisational


9

In contrast to older telephone technologies, new mobile-telephone technologies allow


transmission of video and images in addition to voice. What is a feature of new mobile
telephones that allows this capability?
(A) They are smaller and more compact, allowing greater efficiency in transmission.
(B)

They have colour screens, providing a better interface for users for video and
images.

(C)

They use a higher frequency, allowing transmission of more data which is needed
for video and images.

(D) Their networks place base-stations further apart, resulting in gains in transmission
times, and hence transmission of more data.

Use this information to answer Questions 1011.


A newsagency keeps product data in this database table.
Product
Product_ID

Product_Name

1002

Disk case

1004

Mouse holder

1005

Mouse mat

Price
8.99
12.50
6.58

After running a query, these data were extracted.


Product_Name
Disk case
Mouse mat

10

Which query below will generate these results?


(A) SELECT Product_Name FROM Product WHERE Price > 9;
(B)

SELECT Product_Name FROM Product WHERE Price < 9;

(C)

SELECT Product_Name, Price FROM Product WHERE Price < 9;

(D) SELECT Product_Name, Price FROM Product WHERE Price > 9;


11

The newsagency owner wishes to keep track of the large number of orders from
customers. A customer may order the same product many times. The customer details are
stored in a Customer table with Customer_ID as the primary key.
What is the most efficient way to organise the data and reduce data redundancy?
(A) Store all data in the Product table or in the Customer table.
(B)

Create an Order table where Product_ID and Customer_ID are foreign keys.

(C)

Create an Order table where Product_ID and Customer_ID are primary keys.

(D) Insert a Product_ID field into the Customer table and a Customer_ID field into the
Product table.

12

The screen below displays a list of items retrieved using a web browser.
File

Edit

View

Favourites

Back
Links

Tools

Help
Search

Customize Links >>

Favourites

History

Address ftp://studynotes.org.au/

Go

Name

Last modified

Size

English

11 Feb2003

08:51

Maths

09 Dec2003

08:44

notes.pdf

24 Nov2003

11:38

Description

Which protocol has been used to retrieve the list of items?


(A) File Transfer Protocol
(B)

Portable Document Format

(C)

Hypertext Transfer Protocol

(D) Systems Network Architecture


13

Which of the following is NOT suitable for validating data?


(A) Using a data mask to ensure that data entered has the correct format
(B)

Using features that check that data is in an acceptable range of values

(C)

Adding a data entry area on the screen to limit how much data users can see

(D) Using pull-down menus for data entry to limit values that can be entered into the
database

14

A fun park charges different entry fees for the categories of Child, Concession and Adult.
This decision tree shows the criteria for the different categories.
Status

Age
< 16
Criteria
for
categories

Category
Child

16 and < 21

21

Full-time student

Concession

Not full-time student

Adult

Pension card-holder

Concession

Not pension card-holder

Adult

Use the information provided in the decision tree to determine the categories for these
three people seeking entry.
I

55-year-old pension card-holder

II

21-year-old full-time student

III

15-year-old student
I

II

III

(A)

Concession

Concession

Concession

(B)

Adult

Concession

Concession

(C)

Concession

Adult

Child

(D)

Adult

Adult

Child

Use this information to answer Question 15.

II
II
II

h-s
p
lin eed
k

II

hig

II

II

III

III

Network in Town X

Server

I
Server

15

II

II

Network in Town Y

What devices should be placed at locations I, II and III to most effectively connect the
two networks and the network components?
I

II

III

(A)

switch

hub

router

(B)

switch

bridge

hub

(C)

hub

gateway

router

(D)

gateway

bridge

hub

16

An online bookstores sales information system allows customers to search for books by
entering an authors name. A list of books written by the author is then displayed. To
purchase books, the customer needs only to indicate the desired books, and the amount
payable will be displayed for the customer to pay by credit card.
The credit card details are validated with the relevant financial institution electronically.
An email is generated for the customer and a transaction record is written to the sales
transaction file.
Which of the system flowcharts below correctly represents the procedure for purchasing
books?
(A)

Total
payable

(B)

Selected
books for
purchase
Calculate
payment

Selected
books for
purchase
Total
payable

Prices

Credit card
details
Sales

(C)

Payment
OK?
N
Credit card
details
Sales

Sales

Process
payment

Financial
institution

Email
Customer

(D)

Selected
books for
purchase
Calculate
payment

Prices

Credit card
details

Save
transaction
Email
customer

Calculate
payment

Total
payable

Customer

Selected
books for
purchase
Calculate
payment

Prices

Y
Credit
card details

Reject
Customer

Save
transaction
Email
customer

10

Process
payment

Financial
institution

Use this information to answer Questions 1718.


A database is being designed for a video store. At any one time, a video can only be borrowed
by one customer but the customer may borrow more than one video at a time.
The diagram below describes some components already identified for the database. The
Barcode field is a unique identification for each video cassette, and MovieID is a unique
identification for each movie. For example, there may be many copies of the same movie in the
video store. Copies of the movie will have different barcodes but the same MovieID.

17

Customer

Transaction

Video

Movie

CustomerID
LastName
FirstName
Address
Phone

CustomerID
Barcode
Date

Barcode
MovieID

MovieID
Title
Year
Category
Company

What are the relationships between the Customer and Transaction tables, the Transaction
and Video tables, and the Video and Movie tables?
CustomerTransaction

18

TransactionVideo

VideoMovie

(A)

many to one

many to one

one to many

(B)

many to one

one to many

one to many

(C)

one to many

one to many

many to one

(D)

one to many

many to one

many to one

The video store wishes to produce a report identifying the titles of the top-ten movies
rented in the last month.
Which tables will need to be used?
(A) Transaction, Movie
(B)

Movie, Video, Customer

(C)

Movie, Video, Transaction

(D) Customer, Transaction, Video, Movie

11

Use this information to answer Questions 1920.


A packet was transmitted containing three data bytes and a checksum. The last bit of each data
byte is a parity bit. The checksum is calculated by adding up the number of 1 bits in the data
bytes.
During transmission, two of the three data bytes were corrupted. A 1 bit was changed to a 0
in one of them and a 0 bit was changed to a 1 bit in the other.
The diagram below shows the result of the transmission of the three bytes with the two errors.

19

10110001

11100010

11000100

00001011

First Byte

Second Byte

Third Byte

Checksum

Which error detection method(s) would indicate that the packet contained errors?
(A) Parity checking but not checksum
(B)

Checksum but not parity checking

(C)

Both parity checking and checksum

(D) Neither parity checking nor checksum


20

Which parity was used, and which two of the data bytes in the packet were corrupted
during transmission?
Parity

Corrupted data bytes

(A)

Even

first and second

(B)

Even

second and third

(C)

Odd

first and second

(D)

Odd

second and third

12

2004 HSC Notes from


the Marking Centre
Information Processes and Technology

2004 HSC Notes from the Marking Centre Information Processes and Technology

2004 HSC NOTES FROM THE MARKING CENTRE


INFORMATION PROCESSES AND TECHNOLOGY
Introduction
This document has been produced for the teachers and candidates of the Stage 6 course in
Information Processes and Technology. It provides comments with regard to responses to the 2004
Higher School Certificate Examination, indicating the quality of candidate responses and highlighting
the relative strengths and weaknesses of the candidature in each section and each question.
It is essential for this document to be read in conjunction with the relevant syllabus, the 2004 Higher
School Certificate Examination, the Marking Guidelines and other support documents which have
been developed by the Board of Studies to assist in the teaching and learning of Information
Processes and Technology.
The HSC Examination
In 2004, 6825 candidates presented for the Information Processes and Technology Higher School
Certificate Examination.
Candidates are reminded that the mark value allocated for each question part, along with the key
words used in each question part, indicate the type of response required and the depth of that
response.
Section I
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Correct Response
D
A
D
D
B
C
D
B
C
B
B
A
C
C
A
B
D
C
A
C

Section II
Candidates were required to answer all four questions in this section.
Many candidates were able to analyse these scenarios and to give responses which related their
understanding to the scenario. Most candidates gave reasonable responses, although not all of these
were tied directly to the situation described in the stimulus material and consisted of fairly general

2005
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 212

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1316

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1720

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

The members of a team working on a project are located in different cities.


Which of the following would be the most appropriate technology for the team to use to
exchange text and graphical information for editing?
(A) Letter
(B)

Email

(C)

Facsimile

(D) Voice mail


2

The printing of a receipt from an EFTPOS terminal is an example of which information


process?
(A) Analysing
(B)

Collecting

(C)

Displaying

(D) Organising
3

Which graphical tool best shows how a project and its subprojects could be completed in
a specified timeframe?
(A) Gantt chart
(B)

Decision tree

(C)

Data flow chart

(D) System flow chart


4

Which of the following personnel would allocate file-access rights to users?


(A) Programmer
(B)

System analyst

(C)

Software trainer

(D) Network administrator

In seeking a site on the internet, a user types the URL http://farmclassics.com.au/ into a
browser. The message below is displayed.

Unable to locate the server farmclassics.com.au.


Please check the server name and try again.

Which of the following actions should the user perform to find the desired site?
(A) Use a different browser that is more reliable.
(B)

Check the URL for typing errors and try again.

(C)

Email farmclassics webmaster and request further information.

(D) Type in the name of the print server for the desired site, and try again.
6

A political party collected data from a large number of 18-year-old people. The data will
be analysed to identify patterns that relate to issues affecting young people.
Which of the following would be the most effective analysis technique?
(A) Data mining
(B)

Data sorting

(C)

Data validation

(D) Data warehousing


7

Several networked computers share a database that is stored on one computer.


Which type of network architecture is this?
(A) Parallel
(B)

Relational

(C)

Distributed

(D) Clientserver

Which of the following is an example of metadata?


(A) Search engine
(B)

System prototype

(C)

Site map for a website

(D) Result of an SQL query


9

What would ensure that the restricted area of a website is accessed only by registered
users?
(A) Internet nanny
(B)

Username and password

(C)

Encryption and decryption

(D) Uniform Resource Locator


10

A chain of fifty DVD rental outlets proposes a trial of a new information system prior to
full implementation. At the beginning of the trial, ten outlets will change over to the new
system.
What is the name for the conversion method the chain will use?
(A) Direct
(B)

Parallel

(C)

Phased

(D) Pilot
11

The table shows four pairs of statements about the order of arrival and paths of packets
through a packet-switching network.
In which case are both statements TRUE?
Arrival order

Path through network

(A)

Arrive in random order

All packets take same path

(B)

Arrive in random order

Packets can take different paths

(C)

Same order as transmitted

All packets take same path

(D)

Same order as transmitted

Packets can take different paths

12

A cost-benefit analysis is conducted on two proposed solutions for a new information


system.
A table from the analysis report is shown.
Solution One

Solution Two

$2000

$3000

$500

$500

Estimated total benefit after two years

$1100

$1600

Estimated total benefit after four years

$1100

$2200

No

Yes

Set-up cost
Running cost per year

Expansion capability

Based on the information in the table, which of the following statements is TRUE?
(A) Solution Two can be expanded and has lower costs.
(B)

Solution One would cost less to set up and return higher benefits after four years.

(C)

Solution Two will return higher benefits after two years even though it is more
expensive to set up.

(D) Solution One has the same running costs as Solution Two and will return higher
benefits after four years.

Use the following information to answer Questions 13 and 14.


Below is part of the data dictionary of a travel agents database. Only the metadata for the
Travel table is shown.
Field name

13

Date type

Field width

Description

Customer_Code

Text

Unique customer identification

Tour_Destination

Text

30

Main country of tour

Tour_Duration_Days

Number

Length of tour

Departure_Date

Date

Departure date of tour

Cost

Number

Charges for travel

Booking_Date

Date

Date of booking

The travel agent does not allow bookings to be made close to the date of departure of
a tour.
Which of the following would be the most appropriate range check to prevent the entry
of bookings within 14 days of the departure date?
(A) Tour_Duration_Days < 14
(B)

Departure_Date > 14

(C)

Booking_Date + 14 > = Departure_Date

(D) Booking_Date + 14 < = Departure_Date


14

Which of the following SQL commands would display the codes of the customers
travelling to China on tours of more than 10 days duration?
(A) SELECT Customer_Code FROM Travel WHERE Tour_Destination = China AND
Tour_Duration_Days > 10;

(B)

SELECT Customer_Code FROM Travel WHERE Tour_Destination = China AND


Tour_Duration_Days > = 10;

(C)

SELECT Customer_Code FROM Travel WHERE Tour_Destination = China OR


Tour_Duration_Days > = 10;

(D) SELECT Customer_Code FROM Travel WHERE Tour_Destination = China OR


Tour_Duration_Days > 10;

15

The context diagram represents the purchase of airline tickets through a travel agent.

Customer

payment record and


travel confirmation

customers details
and travel request
Ticket
Purchasing
System

payment details

transaction receipt

Bank

Which information process is necessary for the flow of data from a customer to the Ticket
Purchasing System?
(A) Analysing
(B)

Collecting

(C)

Displaying

(D) Processing

16

The following data flow diagram is a refinement of the context diagram in Question 15.

Customer

customers details
and travel request
Make
booking

travel request

payment record and


travel confirmation
selected flight
Process
payment
transaction
receipt

Flight availability

customers details
and selected flight

payment
details
Bank

Which of the following is a correct interpretation of how the purchase of an airline ticket
is represented in the data flow diagram?
(A) Stored data is accessed to make a booking.
(B)

Payment details are accessed to make a booking.

(C)

The customer provides payment details to the bank.

(D) The customer receives a transaction receipt from the bank.

17

The diagram represents some components of a random access storage device.


A, B, C, D and E represent different blocks on the medium.

C
A
E

Read/write
head

The table below contains information about the medium this device uses and the
sequence in which the device would access data.
In which row is all the information correct?
Medium

18

Sequence of data access

(A)

Flash memory

Could be accessed in any sequence

(B)

Magnetic tape

Must be accessed in the sequence A, B, C, D, E

(C)

Magnetic disk

Could be accessed in the sequence E, D, C, B, A

(D)

Optical disk

Must be accessed in the sequence A, D, B, E, C

Data flow diagrams and system flow charts are graphical tools used in documenting and
designing information systems.
What is the major difference between these two tools?
(A) Data flow diagrams can be converted to decision trees or decision tables, unlike
system flow charts.
(B)

System flow charts are for a proposed information system, while data flow
diagrams are for an existing information system.

(C)

Data flow diagrams have more symbols available than system flow charts, enabling
the designer to convey more ideas.

(D) Data flow diagrams represent the movement of data through a system, while system
flow charts focus on the physical aspects of information flow.

10

19

The table describes the characteristics of optic fibre cable, copper cable and wireless
transmission media, but not necessarily in sequence.
Medium 1

Medium 2

Does not require


Installation
characteristics cable installation

Medium 3

Relatively
inexpensive

Can be difficult to
join
High range

Transmission
frequencies

Middle range

Low range

Risks

High potential for


interception

Can be affected by Brittle, easily


electromagnetic
damaged
interference

Which one of the following alternatives shows the most appropriate uses for Medium 1,
Medium 2 and Medium 3?
Medium 1

Medium 2

Medium 3

(A)

Satellite television

A company intranet

Connecting a printer to
a home computer

(B)

Remote telephone
services

A cordless telephone

Cabling the links


between computers
connected to the
internet

(C)

Mobile phone

A local area network

A dedicated link
between an organisation
and a branch office

(D)

WAN cabling

Connecting a modem to
a home computer

A link between
telephone exchanges

11

20

The analysis of criteria to choose suitable computer hardware for an organisation resulted
in this decision table.
Conditions

Rules

Processor speed >=2 GHz

Hard disk storage >100 GB

Flat screen

Includes a sound card and speakers

Price > $1500 and < $4000

Suitable for an office system

Suitable for a multimedia system

Suitable for an EFTPOS terminal

Actions

Which of the following would be the minimal conditions (requirements) for a system
suitable for both an office system AND an EFTPOS terminal?
(A) A processor speed of 2 GHz and a flat screen
(B)

A flat screen and a price between $1500 and $4000

(C)

A processor speed of 2 GHz and a price between $1500 and $4000

(D) A processor speed of 2 GHz, a flat screen and a price between $1500 and $4000

12

2005 HSC Notes from


the Marking Centre
Information Processes and Technology

2005 HSC Notes from the Marking Centre Information Processes and Technology

2005 HSC NOTES FROM THE MARKING CENTRE


INFORMATION PROCESSES AND TECHNOLOGY
Introduction
This document has been produced for the teachers and candidates of the Stage 6 course in
Information Processes and Technology. It provides comments with regard to responses to the 2005
Higher School Certificate examination, indicating the quality of candidate responses and
highlighting the relative strengths and weaknesses of the candidature in each section and each
question.
This document should to be read along with the relevant syllabus, the 2005 Higher School
Certificate examination, the marking guidelines and other support documents which have been
developed by the Board of Studies to assist in the teaching and learning of Information Processes
and Technology.
The HSC Examination
In 2005, approximately 5800 candidates presented for the Information Processes and Technology
Higher School Certificate examination.
Candidates are reminded that the mark value allocated for each question part, along with the key
words used in each question part, indicates the type of response required and the depth of that
response.
Section I
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Correct Response
B
C
A
D
B
A
D
C
B
D
B
C
D
A
B
A
C
D
C
C

2006
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 211

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1215

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1623

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

What is represented in the diagram?

Computer

Modem

Modem

Computer

(A) Encryption and decryption


(B)

Modulation and demodulation

(C)

Error detection and correction

(D) Log-on and log-off procedures


2

Which of the following best describes a backup procedure?


(A) Copying a database for use by multiple users
(B)

Updating a database to identify and eliminate errors

(C)

Copying a database and storing it off-site in case of an emergency

(D) Distributing a database across a network for quick access at different locations
3

The diagram shows the organisation of a database.

KEY
Video
Sound
Text

What organisation method is being used for this database?


(A) Flat-file
(B)

Relational

(C)

Hypertext

(D) Hypermedia

Which URL is most likely to locate a website?


(A) http//www.shop.co.uk
(B)

http:/www.university.edu.nz/

(C)

http://www.company.au.com/

(D) http://www.organisation.com
5

A department store has abandoned its proposed internet shopping website because the
website would discourage customers from using the physical department store.
Which of the following best describes the reason why this decision was made?
(A) The website was not technically feasible.
(B)

The website was not economically feasible.

(C)

There was not enough time to implement the website.

(D) The website did not fit the objectives of the department store.
6

Ken receives many unwanted phone calls from a telemarketing company. Ken seeks
details from the company about the information they hold about him.
To what issue does this relate?
(A) Freedom of information
(B)

Equity of access to services

(C)

Copyright and data security

(D) Protection of intellectual property


7

Which of the following primarily uses the information process of transmitting and
receiving?
(A) Sorting data in a database
(B)

Typing text into a mobile phone

(C)

Downloading music to an MP3 player

(D) Entering your PIN at an EFTPOS terminal

When the individual components of an information system were tested, no errors were
found. However, when all components were tested together the system failed to operate.
Which of the following most likely identified the failure?
(A) Testing with live data
(B)

Testing backup procedures

(C)

Testing user documentation

(D) Testing individual components


9

In the following diagram, the boxes represent devices on a network.


2
1

Internet

Which device on this network represents a router?


(A) 1
(B)

(C)

(D) 4
10

A school is planning to change its reporting system from paper-based reports to reports
accessed online. The implementation plan currently details participant training and
system testing.
Which of the following needs to be added to the implementation plan?
(A) Specification of a prototype
(B)

Details of conversion method

(C)

Details of the technical feasibility study

(D) Schedule for the development of the new system

11

A free-text search is undertaken on the following hypertext document.


Definition of BANDWIDTH
In general, bandwidth refers to telecommunication in which a wide
band of frequencies is able to transmit information.
Related terms are wideband (a synonym), baseband (a one-channel
band), and narrowband (sometimes meaning just wide enough to
carry voice, or simply not broadband).
In the free-text search, a * can be used to replace from 0 to 7 characters in a word, not
including white space.
Which of the following searches would locate all the words containing band?
(A) *band
(B)

band*

(C)

*band*

(D) * band *
12

Which of the following are ALL tools that help overcome physical boundaries to enable
virtual organisations?
(A) Email, decision tree, video-conferencing
(B)

An intranet, the internet, teleconferencing

(C)

Gantt chart, file sharing, web-conferencing

(D) Chat rooms, discussion groups, system flowchart


13

A communication link uses cyclic redundancy check (CRC) for error detection. The
transmitting device divides the data by a constant and transmits the remainder with the
data.
Which of the following best describes the process carried out by the receiving device?
(A) The data is divided by the transmitted remainder to find the constant.
(B)

The data is divided by the same constant and the remainders are compared to check
that they are the same.

(C)

The total number of 1 s in the data is calculated and compared with the
transmitted remainder.

(D) The data is divided by the same constant and the remainder is sent back to the
transmitting device to check that the remainders are the same.

14

Two nodes on a local area network attempt to communicate at the same time. A collision
occurs.
Which of the following correctly outlines what will take place after the collision so that
eventually both nodes communicate successfully?
(A) Each node waits for a free token before attempting to communicate.
(B)

Each node waits a random amount of time before checking if a token is free.

(C)

Each node waits a random amount of time before attempting to communicate.

(D) Each node waits until it has permission to communicate from the network
controller.
15

A courier company changed from a manual system to a computer system. Under the
manual system, the state of NSW was divided into many regions. The computer system
was designed to handle all deliveries across the state. The company adopted a two-stage
implementation approach:
Stage 1

Stage 2

A system was built with partial


functionality.

A system was built with full


functionality.

Successful trial in one region

Switched from the manual system


to the computer system at the
same time in all regions

What were the conversion methods used in Stage 1 and Stage 2?


Stage 1

Stage 2

(A)

Pilot

Direct

(B)

Pilot

Parallel

(C)

Phased

Direct

(D)

Parallel

Phased

Use the following information to answer Questions 16 and 17.


A video store tracks movie loans using a relational database which includes the tables Movie,
Borrower and Loan. Parts of the tables are shown below.
Movie
Movie_ID

Movie_Name

Type

MX5

King Kong

Adventure

MP6

Keeping Mum

Comedy

MF1

Mrs Henderson Presents

Drama

Borrower
Borrower_ID

Borrower_Name

Phone

BA3

E Bunnie

9213 1234

BP2

S Clause

9625 5678

BL9

T Ferry

9718 9101
Loan

16

Movie_ID

Borrower_ID

Due_Date

MX5

BL9

16 Oct 06

MF1

BL9

16 Oct 06

MP6

BP2

16 Oct 06

Which schema represents the relationships between the three tables?


(A)

(B)

(C)

(D)

Movie
Movie_ID
Movie_Name
Type
Movie
Movie_ID
Movie_Name
Type
Movie
Movie_ID
Movie_Name
Type
Movie
Movie_ID
Movie_Name
Type

many
1

many

many

1
many

Loan
Movie_ID
Borrower_ID
Due_Date
Loan
Movie_ID
Borrower_ID
Due_Date

many

1
many

Borrower
Borrower_ID
Borrower_Name
many
Phone
Borrower
many
Borrower_ID
Borrower_Name
Phone
8

Borrower
Borrower_ID
1
Borrower_Name
Phone

Borrower
Borrower_ID
Borrower_Name
Phone
Loan
Movie_ID
Borrower_ID
Due_Date

Loan
Movie_ID
1
Borrower_ID
Due_Date

17

The following SQL is run on the tables shown on page 8.


SELECT

Borrower.Borrower_Name, Loan.Movie_ID

FROM

Borrower, Loan

WHERE

Borrower.Borrower_ID = Loan.Borrower_ID

AND

Loan.Movie_ID = MP6;

Which of the following is the correct result?


(A) S Clause

MP6

(B)

S Clause

Keeping Mum

(C)

T Ferry

MP6

(D) T Ferry

18

Keeping Mum

Diagrams 15 are system flowchart symbols.

Which symbols could be used to represent input and output in a system?


Input

Output

(A)

1, 2

4, 5

(B)

3, 4, 5

1, 2

(C)

1, 3, 4

2, 3, 4, 5

(D)

1, 2, 4

1, 2, 3, 5

19

The ASCII code for the character A is 1000001. The character A is transmitted using
even parity as:
1000001

parity bit 0

The following bits are received:


1000010

parity bit 0

The receiving device accepts the transmission as the letter B which has the ASCII code
1000010.
What went wrong?
(A) Transmission was corrupt and parity check was incorrect.
(B)

Transmission was corrupt and parity check was correct.

(C)

Transmission was correct and parity check was correct.

(D) Transmission was correct and parity check was incorrect.

10

20

The following decision tree illustrates the calculation of admission charges for a public
session at Phoenix Ice Skating Rink.
Own skates

$6

Hire skates

$9

Own skates

$9

Hire skates

$12

Own skates

$12

Hire skates

$15

< 5 years

Phoenix Ice Skating Rink


admission charges

513 years

> 13 years

Based on the decision tree above, which of the following decision tables is correct for an
admission charge of $12?
(A)

Conditions

Rules

< 5 years

513 years

(B)

Conditions

Rules

< 5 years

513 years

> 13 years

> 13 years

Hire skates

Hire skates

Admission charge $12

Conditions

Rules

Actions

(C)

Actions

Admission charge $12

Conditions

Rules

< 5 years

< 5 years

513 years

513 years

> 13 years

> 13 years

Hire skates

Hire skates

Actions
Admission charge $12

(D)

Actions

11

Admission charge $12

2006 HSC Notes from


the Marking Centre
Information Processes and Technology

2006 HSC Notes from the Marking Centre Information Processes and Technology

2006 HSC NOTES FROM THE MARKING CENTRE


INFORMATION PROCESSES AND TECHNOLOGY
Introduction
This document has been produced for the teachers and candidates of the Stage 6 course in Information
Processes and Technology. It provides comments with regard to responses to the 2006 Higher School
Certificate Examination, indicating the quality of candidate responses and highlighting the relative
strengths and weaknesses of the candidature in each section and each question.
It is essential for this document to be read in conjunction with the relevant syllabus, the 2006 Higher
School Certificate Examination, the Marking Guidelines and other support documents which have been
developed by the Board of Studies to assist in the teaching and learning of Information Processes and
Technology.
The HSC Examination
In 2006, approximately 5200 candidates presented for the Information Processes and Technology Higher
School Certificate examination.
Candidates are reminded that the mark value allocated for each question part, along with the key words
used in each question part, indicate the type of response required and the depth of that response.

Section I
Question
1
2
3
4
5
6
7
8
9
10

Correct
Response
B
C
D
D
D
A
C
A
D
B

Question
11
12
13
14
15
16
17
18
19
20

Correct
Response
C
B
B
C
A
B
A
D
B
A

2007
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 212

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1419

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 2027

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.
1

Which of the following represents analog to digital conversion of a telecommunications


signal?
Before conversion

After conversion

(A)
(B)
(C)
(D)

While visiting a website that sells popular surfing movies, Lachlan decided to save an
image from the website. Lachlan later used that image as part of a logo for his surfboard
business, without permission.
How is Lachlans action best described?
(A) Breach of privacy
(B)

Protection of copyright

(C)

Infringement of copyright

(D) Acknowledgement of sources

What communication medium is shown?

(A) Coaxial cable


(B)

Optic fibre

(C)

Microwave

(D) Twisted pair


4

Which screenshot shows a stage of a guided process in an application package?


(A)

(B)

(D)
(C)

Which conflict resolution strategies would be best for a project leader to use to help
his/her team overcome a disagreement?
(A) Active listening and negotiation
(B)

Role playing and model building

(C)

Feasibility assessment and team building

(D) Interview techniques and prototype modification


6

In 2007 Centrelink installed a new data warehouse that stores detailed information on its
clients. This information is available to other agencies in charge of welfare, employment
and social policy.
What technique will allow these agencies to retrieve detailed information from Centrelinks
data warehouse?
(A) Data back-up
(B)

Data mining

(C)

Normalisation

(D) What-if analysis


7

Sebastian is using an internet search engine to investigate the extinction of the Golden
Toad species.
What search specification will locate the most relevant information?
(A) extinction + golden + toad
(B)

extinction + golden + toad

(C)

extinction + golden toad

(D) extinction golden + toad

The diagram shows a network used in an office.

Computer

The
internet

Computer

Key
Cable
Wireless

Printer
Which row of the following table most accurately identifies devices 1, 2 and 3 in the
diagram?

Device 1

Device 2

Device 3

(A)

Broadband modem

Wireless router

Wireless print server

(B)

Wireless router

Broadband modem

Network file server

(C)

Network file server

Hub

Wireless print server

(D)

Broadband modem

Wireless print server

Wireless router

The Roads and Traffic Authority (RTA) uses a secure database in its offices to update
information about licensed drivers in New South Wales.
Which option correctly identifies participants and data/information for this situation?
Participants

10

Data/information

(A)

Drivers

Licence number, Drivers details

(B)

Drivers

Computer terminal, Internet

(C)

RTA employees

Licence number, Drivers details

(D)

RTA employees

Computer terminal, Internet

Bluetooth-enabled devices such as mobile phones, laptops, printers and digital cameras
exchange information over a wireless connection. To establish a connection, a
Bluetooth-enabled device will transmit:
Name of device
Device class
Available services
Technical details such as features, manufacturer and specifications
Other Bluetooth-enabled devices may then respond.
What name is given to this process?
(A) Handshaking
(B)

Network logon

(C)

Error correction

(D) Cyclic redundancy check

11

Which option contains activities used for testing, evaluating and maintaining an
information system?
Testing

12

Evaluating

Maintaining

(A)

Checking that the original


objectives are met

Using live data

Deciding on a system
conversion method

(B)

Ensuring performance
specifications are met

Checking that the original


objectives are met

Applying a software
upgrade

(C)

Using live data

Checking that the original


objectives are met

Creating a prototype

(D)

Deciding on a system
conversion method

Using live data

Backing up system
data

The BB Little Athletics Club holds details of over 500 club members in a flat-file
database. Lee would like to know the total number of boys and girls in each age group.
This is a task done weekly to organise competitions.
What procedure would be the most efficient for Lee to use?
(A) Construct and run a report that produces totals for each gender and age group.
(B)

Construct and run an SQL query for each age group and each gender to find totals.

(C)

Obtain a printed copy of the database, highlight the relevant records and manually
count them.

(D) Construct an SQL query that orders records by age followed by gender, and then
manually count each group.
13

The following address was noted in a technical manual for a school website.
ftp://www.northpoinths.edu.au

What is the main purpose of this address?


(A) To locate the schools website
(B)

To locate the schools email server

(C)

To locate files to be uploaded and downloaded

(D) To locate the schools database for the administrative staff

14

A library wishes to provide wireless hot spots to allow people to access the internet
using their laptop computers.
Which option most accurately compares the choice of wireless over cabled network?
Mobility for users

15

Risk of signal
interception

Interference from
electromagnetic radiation

(A)

Better for wireless

The same for


wireless and cabled

More likely for cabled

(B)

Better for wireless

More likely for


wireless

More likely for wireless

(C)

The same for


wireless and cabled

More likely for


cabled

More likely for cabled

(D)

Better for wireless

More likely for


wireless

More likely for cabled

Consider the information system represented in the diagram.


Purpose: To assist businesses and
customers to process sales transactions
efficiently and accurately.

Environment:
Commercial

Information System
Information Processes: collecting, storing and retrieving, processing,
transmitting and receiving, displaying

Participants:
employees

Data/Information:
sales transaction data

Information
Technology:
transaction terminal,
file server,
communications
system database

Which option most accurately describes this information system?


(A) An ATM system
(B)

An EFTPOS system

(C)

A library loans system

(D) A voicemail messaging system


8

16

A new online system is being developed to allow doctors to access patient records in
hospital wards.
Which of the following does NOT relate to potential social and ethical issues of this new
system?
(A) Protection of the system from unauthorised access
(B)

Inclusion of data validation techniques to ensure only accurate data is entered

(C)

Production of user documentation that helps doctors to easily access required data

(D) Production of accurate system design documentation for future system development
17

The table shows pairs of statements about error detection methods.


In which row are both statements TRUE?
Parity bit check will detect an:

Cyclic redundancy will:

(A)

even number of bit changes

detect a change in the order of the data

(B)

odd number of bit changes

not detect a change in the order of the data

(C)

even number of bit changes

not detect a change in the order of the data

(D)

odd number of bit changes

detect a change in the order of the data

Ahmed is a systems analyst who has created a context diagram to model an online
grocery stores information system. He has then refined the context diagram to create the
following first draft data flow diagram.
Sales

Gr
oc
e
ord ry
er

co

er y
oc
r
Gr
e
r
ord rde ion
O
at
rm
nfi

Customer

Order
processing

er y
oc
Gr
er
ord

Delivery
Dispatch
processing instruction

Food
warehouse

Ahmed now wants to check that his context diagram is consistent. Which context
diagram below is consistent with his data flow diagram?
(A)

(B)
Customer

oc
e
ord ry
er

ery
oc
r
Gr
e
r
ord rde ion
O
at
rm
nfi

Sales

Gr

co

co

ery
oc
Gr
er
r
ord Orde ion
at
rm
nfi

Customer

Grocery
information
system

Order
processing

De

c
tru

ry
live on
ti

ins

Food
warehouse

(C)

(D)
Customer

Sales

er

er y

ord

oc

oc
e
ord ry
er

Gr

co

ery
oc
Gr
er
r
ord Orde ion
at
rm
nfi

Customer

Gr

18

Grocery
information
system

Order
processing

10

ry
live
De ction
tru
ins

ry
live
De ction
tru
ins

Food
warehouse

Food
warehouse

19

A companys recruitment system requires all applicants to submit their rsums over the
internet. Once received, this information is stored in an applicant database. A selection
panel interviews applicants. Applicants are advised by telephone of the success or
otherwise of their applications. Details of the successful applicants are transferred to the
employee database.
This system flowchart describes the recruitment system.
1

Applicant
database

Applicant
database
Interview
applicants
Advise applicants
that they were
successful

Advise applicants
that they were
unsuccessful

Which symbols would be included in areas 1, 2 and 3?


1
(A)

2
Success

3
Y

N
(B)

Success

N
(C)

Success

Y
(D)

Transfer data
to employee
database

Success

N
11

20

The following tables are used by a university to record student enrolment in courses.
STUDENT
StudentID
StudentName
StudentPhone

ENROLMENT
Many StudentID
CourseCode
Many
Date

COURSE
CourseCode
CourseTitle
Category

The university would like to include the details of a textbook (Title, Author, Publisher)
for each course.
What would be the most effective way to do this without causing data redundancy?
(A) Add a field Textbook to the ENROLMENT table.
(B)

Add a field Textbook to the COURSE table.

(C)

Create a table TEXTBOOK and link it to the COURSE table with a one-to-one
relationship.

(D) Create a table TEXTBOOK and link it to the ENROLMENT table with a
one-to-many relationship.

12

2007 HSC Notes from


the Marking Centre
Information Processes and Technology

2007 HSC NOTES FROM THE MARKING CENTRE


INFORMATION PROCESSES AND TECHNOLOGY
I ntroduction
This document has been produced for the teachers and candidates of the Stage 6 course in Information
Processes and Technology. It contains comments on candidate responses to the 2007 Higher School
Certificate examination, indicating the quality of the responses and highlighting their relative strengths
and weaknesses.
This document should be read along with the relevant syllabuses, the 2007 Higher School Certificate
examinations, the marking guidelines and other support documents which have been developed by the
Board of Studies to assist in the teaching and learning of Information Processes and Technology.
Candidates need to be familiar with the Board s Glossary of Key Words
(www.boardofstudies.nsw.edu.au/syllabus_hsc/glossary_keywords.html) which contains some terms
commonly used in examination questions. However, candidates should also be aware that not all
questions will start with or contain one of the key words from the glossary. Questions such as how?,
why? or to what extent? may be asked or verbs may be used which are not included in the glossary,
such as design , translate or list.
Candidates are reminded that the mark value allocated for each question part, along with the key words
used in each question part, indicate the type of response required and the depth of that response.
Section I
Question
1
2
3
4
5
6
7
8
9
10

Correct
Response
D
C
D
A
A
B
C
A
C
A

Question
11
12
13
14
15
16
17
18
19
20

Correct
Response
B
A
C
B
B
D
D
B
D
C


( ) ' ( % 2 3 # ( / / , # % 2 4 ) & ) # !4 %
% 8 ! - ) . !4 ) / .

)NFORMATION0ROCESSES
AND4ECHNOLOGY
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 211

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1317

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1825

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.
1

Sam is using a webcam to communicate with his friend Lee. Lee has decided to post
Sams video on a social networking site.
What should Lee do before posting the video?
(A) Ask Sam for permission
(B)

Edit Sams video file

(C)

Save a backup onto his computer

(D) Place a copyright symbol on the video


2

Which of the following contains only relational operators?


(A) And, Or, Not
(B)

Equals, And, Not equals

(C)

Contains, Or, Does not contain

(D) Equals, Not equals, Greater than


3

To renew a newspaper subscription, a customer is required to visit the newspaper website,


complete and submit a form.
Which information process is involved?
(A) Collecting
(B)

Organising

(C)

Analysing

(D) Displaying

Which tool best allows for same-time, different-place meetings?


(A) Email
(B)

Voicemail

(C)

Text messaging

(D) Teleconferencing
5

Morgan sends a video file to a web-based video hosting site.


What best describes Morgans action?
(A) Uploading
(B)

Handshaking

(C)

Downloading

(D) Videoconferencing
6

In which stage of system development would you undertake a feasibility study?


(A) Implementing
(B)

Making decisions

(C)

Designing solutions

(D) Testing, evaluating and maintaining


7

When is it most appropriate to use prototyping?


(A) When testing the final system
(B)

When refining system requirements

(C)

When system feasibility is being determined

(D) When team members disagree on what to build

The following diagram represents a health departments Wide Area Network (WAN).

Health Department LAN

3
1

Internet

Local hospital LAN


4

In this diagram, which device must be a router?


(A) 1
(B)

(C)

(D) 4

The following email message has been created:


To: indra@gmail.com
cc: kim@jilltech.com.au
bcc: jordan@hotmail.com, kerry@frogpond.com
Subject: Here is the file you requested
Attachments: 100_0949.JPG (1.45 MB)
Dear Indra,
Please find attached the file you requested.
Kind Regards
Chris

Which of the following statements is correct?


(A) The attachment will not be received by Jordan and Kerry.
(B)

All recipients will be aware that the others have received the email and attachment.

(C)

Kerry will be aware that Jordan and Kim have also received the email and
attachment.

(D) Indra and Kim will not know that Kerry and Jordan have also received the email
and attachment.
10

A database stores data about players in an Under 8 basketball team. The field for a
players date of birth only accepts dates in the form DD/MM/YYYY and does not accept
dates earlier than 01/01/2000.
What are two issues addressed here?
(A) Data integrity and the Y2K bug
(B)

Data validation and data integrity

(C)

Data redundancy and the Y2K bug

(D) Data redundancy and data validation

11

A Gantt chart for an upgrade of a library network indicates that:


Design documentation will take one week, followed by research and development
which will take three weeks.
Designing the solution can then begin and will take two weeks.
Installation of cables will start immediately after this and last for one week.
Installation of software and hardware will last for one week and will start when
research and development has concluded.
On completion of all of the installations, the network upgrade will undergo an
evaluation for a two week period.
What is the minimum number of weeks required for the network upgrade?
(A) 7
(B)

(C)

(D) 10
12

Which task performed by systems developers is most likely to ensure that participants
accept a new system?
(A) Interviewing the users and participants of a system to identify system requirements
(B)

Carrying out a feasibility study looking specifically at the cost of introducing the
new system

(C)

Using a prototype to get feedback from participants before defining the system
requirements

(D) Meeting with participants at several stages during the project to discuss training
and how the systems will be implemented
13

A section of html code appears below:


<a href=kangaroos.html> <img src=kangaroos.jpg></a>
What does this html code allow the user to do?
(A) Click on an icon to run a video about kangaroos
(B)

Click on a reference page and then insert an image of a kangaroo

(C)

Click on an image of a kangaroo to go to another website about kangaroos

(D) Click on an image of a kangaroo to go to another web page about kangaroos

14

The following screenshot shows an advanced search using a search engine on the web.
Advanced Search
Find results with all of the words
with the exact phrase

licence application

with at least one of the words

rta form

without the words


Language

Return pages written in

any language

Region

Search pages located in:

any region

File Format

Only

return results of the file format Adobe Acrobat PDF (.pdf)

Which of the following search expressions would match the advanced search shown?
(A) rta licence application form pdf
(B)

rta form licence application filetype: pdf

(C)

rta OR form licence application filetype: pdf

(D) licence application AND rta form OR filetype: pdf


15

In October 2006, the rock band Wolfmother streamed the first live show to mobile
phones. The show was encoded and compressed, then uploaded to a web server. A
journalist reported that during fast sections of the guitar, the audio was distorted and
broken.
What would most likely have caused this distortion?
(A) The speed of the server
(B)

Electromagnetic interference

(C)

Limitations of mobile bandwidth

(D) Limitations of the speakers in mobile phones

Use the table below to answer Questions 1617.


The table shows some of the physical differences between acids, including the
melting point (MP) and boiling point (BP).
Acidtbl
Acid

State

Colour

MP

BP

Odour

Oxalic

Solid

White

101

Sublimes 150 None

Citric

Solid

White

70

Decomposes

None

Acetic

Solid/liquid Glassy

16.6

118.2

Vinegary

Butyric

Liquid

Colourless

5.5

164.1

Rancid butter

Sulphuric

Liquid

Colourless

10.5

320

None

Nitric

Liquid

Colourless

4.1

86

Strong

Colourless

111

84

Strong

Hydrogen
Gas
chloride

Science Foundation for Physics, The University of Sydney

16

Which portion of the decision tree below most clearly selects Oxalic and Citric acids?
(A) Colour

(B)

(C)

Odour

State

MP

Acid

white

none

solid

< 100
> 100

Citric
Oxalic

Colour

Odour

State

MP

Acid

white

none

solid

> 100
< 100

Citric
Oxalic

BP

Odour

State

Colour

Acid

sublimes
decomposes

none

solid

white

Citric
Oxalic

Odour

State

Colour

Acid

none
none

solid
solid

white
white

Citric
Oxalic

(D) BP
sublimes
decomposes

17

Which SQL statement would output the following pieces of information?


Nitric, Liquid, Colourless
Hydrogen chloride, Gas, Colourless
(A) SELECT
FROM
WHERE

Acid, State, Colour, Odour, MP


Acidtbl
Odour = Strong AND MP > 0;

(B)

SELECT
FROM
WHERE

Acid, State, Colour, Odour, MP


Acidtbl
Odour = Strong AND MP < 0;

(C)

SELECT
FROM
WHERE

Acid, State, Colour


Acidtbl
Odour = Strong AND MP < 0;

(D) SELECT
FROM
WHERE

Acid, State, Colour


Acidtbl
Odour = Strong AND MP > 0;

Use the diagram below to answer Questions 1819.


ShopperID + Password
Online Shopper
ProductDescription
ProductDetails
AddToCartRequest
Validate
ShopperID

IDisOK +
ShopperDetails

ProductDetails

AddTo artOK
AddToCartO
AddToCartOK
Find
Product

FinalisePurchase_
FinalisePurchase
Request

NumberOfIte s
NumberOfItems

ShopperDetai s
ShopperDetails
ProductFile
ShopperFile

ProductDetails +
ShopperDetails +
ProceedOK

FinaliseOK
Process
Purchase

SalesDetails

SalesRecords

The diagram shows the dataflows involved when a shopper purchases a product online.
18

Which is the most likely order in which data elements are passed to the Find Product
procedure?
(A) ProductDescription, ProductDetails, AddToCartRequest, AddToCartOK
(B)

AddToCartRequest, ProductDetails, ProductDescription, ShopperDetails

(C)

IDisOK + ShopperDetails, ProductDescription, ProductDetails, AddToCartOK

(D) ShopperID + Password, IDisOK + ShopperDetails, ProductDetails, ProductDescription,


AddToCartOK

19

Which of the following statements is FALSE?


(A) The Validate ShopperID procedure requires shopper details.
(B)

The Find Product procedure carries out analysing and collecting only.

(C)

The Online Shopper is the only participant represented in the diagram.

(D) The Process Purchase procedure includes the information processes of storing and
displaying.

10

20

A student has set up a local area network at home comprising three computers, and has
connected them to the internet via a modem.
The screenshot segments represent some of the settings used in setting up one of the
computers.

Standard 56000 bps Modem Default Prefer...


General

General

Advanced

You can get IP settings assigned automatically if


your network supports this capability. Otherwise,
you need to ask your network administrator for
the appropriate IP settings.

Hardware Settings
Data bits:
Parity:
Stop bits:

Internet Protocol (TCP/IP) Properties

Obtain an IP address from server


Use the following IP address:

Even
1

Modulation:

IP address:

198.12.22.30

Subnet mask:

10.0.0.0

Default gateway:

198.1.1.0

Obtain DNS address automatically

Which description best applies to this set-up and connection to the internet?
(A) Asynchronous, error detection will NOT detect if a 1 bit has been changed to a
0 bit in the same byte, IP address is assigned manually.
(B)

Asynchronous, error detection will detect if a 1 bit has been changed to a 0 bit
in the same byte, IP address is assigned manually.

(C)

Asynchronous, error detection will detect if a 1 bit has been changed to a 0 bit
in the same byte, IP address is assigned automatically.

(D) Synchronous, error detection will NOT detect if a 1 bit has been changed to a
0 bit in the same byte, IP address is assigned automatically.

11

2008 HSC Notes from


the Marking Centre
Information Processes and Technology

2008 HSC NOTES FROM THE MARKING CENTRE


INFORMATION PROCESSES AND TECHNOLOGY
Introduction
This document has been produced for the teachers and candidates of the Stage 6 course in Information
Processes and Technology. It contains comments on candidate responses to the 2008 Higher School
Certificate examination, indicating the quality of the responses and highlighting their relative strengths
and weaknesses.
This document should be read along with the relevant syllabus, the 2008 Higher School Certificate
examination, the marking guidelines and other support documents which have been developed by the
Board of Studies to assist in the teaching and learning of Information Processes and Technology.
Candidates need to be familiar with the Boards Glossary of Key Words
(www.boardofstudies.nsw.edu.au/syllabus_hsc/glossary_keywords.html) which contains some terms
commonly used in examination questions. However, candidates should also be aware that not all
questions will start with or contain one of the key words from the glossary. Questions such as how?,
why? or to what extent? may be asked or verbs may be used which are not included in the glossary,
such as design, translate or list.
Candidates are reminded that the mark value allocated for each question part, along with the key words
used in each question part, indicate the type of response required and the depth of that response.
Section I
Question
1
2
3
4
5
6
7
8
9
10

Correct
response
A
D
A
D
A
B
B
C
D
B

Question
11
12
13
14
15
16
17
18
19
20

Correct
response
C
D
D
C
C
A
C
C
B
B

2009
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I

General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Pages 28

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 912

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1316

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

203

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.
1

28 March 2009
Met with clients to discuss aims and
objectives of new system

BLOGGER BIZ
BLOGS OF NOTE

3 April 2009
Asked client for more money to
complete project
10 April 2009
Received more money for project
This blog is being used as which project management tool?
(A) Gantt chart
(B)

Journal of events

(C)

Teleconferencing

(D) Communication management plan


2

What is the purpose of a requirements report?


(A) To plan a new system
(B)

To produce a prototype

(C)

To evaluate a project proposal

(D) To produce an operations manual


3

What does information technology refer to in an information system?


(A) Hardware related to the information system
(B)

Users and software used in information processes

(C)

Users and hardware related to the information system

(D) Software and hardware used in information processes

Use the following information to answer Questions 45.


LiveSMS is developing a website to allow people to create and send text messages online.
The website has a database that stores personal information about its clients. This
information will be available to other online companies such as telephone and digital media
companies.
In order to test and evaluate the system before launching the site, the personal details of ten
fictional customers were entered.
4

What type of test data was used by LiveSMS?


(A) Live data
(B)

Operational data

(C)

Simulated data

(D) Volume data


5

Which social and ethical issue should LiveSMS consider when developing the new
system?
(A) Data redundancy
(B)

Freedom of information

(C)

Globalisation

(D) Privacy
6

What is the name given to a client PC when it has applications installed that are separate
from its server?
(A) Fat client
(B)

Mail client

(C)

Remote client

(D) Web client


7

What is the role of the primary key in a relational database table?


(A) To allow access to encrypted data
(B)

To uniquely identify records in the table

(C)

To operate as an alternative to a foreign key

(D) To allow easier sorting of a field in the table


3

Which protocol does the circled icon represent?


Internet

(A) http
(B)

smtp

(C)

SSL

(D) TCP/IP
9

Which of the following would be included in a feasibility study?


(A) Participants qualifications
(B)

Computer equipment available

(C)

A report from users who have trialled the new system

(D) A prototype to clarify participants understanding of the problem


10

Relational databases for a system may have more than one user view of the data.
What is the reason for constructing these different views?
(A) To implement metadata structures
(B)

To establish the validity of the data

(C)

To determine data elements for different purposes

(D) To describe the relationship between hyperlinked design elements


11

Which design tool would best display the details of data and processes in a system?
(A) Data dictionary
(B)

Database schema

(C)

System flowchart

(D) Data flow diagram

12

Which of the following describes voice-over internet protocol (VoIP) transmissions?


(A) Analog audio data sent as digital signals
(B)

Analog audio data sent as analog signals

(C)

Digital audio data sent as analog signals

(D) Digital audio data sent as digital signals


13

Which technological development has supported the emergence of VoIP, 3G and


podcasts?
(A) Broadband transmission
(B)

Group Decision Support Systems

(C)

Radio Frequency Identification Tags

(D) Twisted pair cables in local area networks


14

The diagram below represents a physical network topology.

What is the function of the component labelled with the letter A?


(A) To prevent reflection of the data signal back down the cable
(B)

To carry data packets up and down the network to all nodes

(C)

To attach data to a token and then send it to the addressed node

(D) To listen for data present on the network to monitor the network activity
15

Which of the following do agile system development approaches involve?


(A) A step-by-step approach to find a flexible solution
(B)

A swapping of the traditional roles of team members

(C)

A flexible approach allowing the development team greater independence

(D)

A complete understanding of the requirements before a project is commenced


5

16

What is an advantage of querying databases using Query By Example (QBE) compared


to using Structured Query Language (SQL)?
(A) Tables are linked using a primary key.
(B)

Data does not need to be previously sorted.

(C)

It is a visual technique allowing non-experts to do searches.

(D) The computer is able to access the required information faster.


Use the following information to answer Questions 1718.
A sporting association has designed a scholarship approval system. It uses the following
decision table as the basis for deciding which student members will be granted a scholarship
for their tertiary studies.
Conditions

Rules

Lives in the local area

Excellent HSC results

Membership for 10 years or more

Membership between 5 and 10 years

Grant 3-year scholarship

Grant 1-year scholarship

Reject scholarship application

Actions

17

Which of the following statements is true?


(A) If the student lives in the local area and has been a student member for more than
10 years, he/she will be granted a 1-year scholarship.
(B)

If a student has gained an excellent HSC result, lives in the local area and has been
a student member for 6 years, he/she will be granted a 3-year scholarship.

(C)

If a student has gained an excellent HSC result, lives in the local area and has been
a student member for 4 years, he/she will be granted a 1-year scholarship.

(D) If a student has gained an excellent HSC result, lives in the local area and has been
a student member for more than 10 years, he/she will be granted a 3-year
scholarship.

18

Which decision tree represents the data in the decision table?


(A)

Excellent
HSC result

Lives in
local area

Membership
10 years

Membership
> 5 years
Y

1-year scholarship

Scholarship rejected
3-year scholarship
Scholarship rejected
Scholarship rejected

3-year scholarship

Scholarship rejected
1-year scholarship
Scholarship rejected
Scholarship rejected

1-year scholarship

Scholarship rejected
3-year scholarship
Scholarship rejected
Scholarship rejected

Scholarship rejected

1-year scholarship
3-year scholarship
Scholarship rejected
Scholarship rejected

N
Y
Y

Y
N

(B)

Excellent
HSC result

Lives in
local area

Membership
10 years

Membership
> 5 years
N

Y
Y

Y
N

(C)

Excellent
HSC result

Lives in
local area

Membership
10 years

Membership
> 5 years
N

N
Y

Y
Y

(D)

Excellent
HSC result

Lives in
local area

Membership
10 years

Membership
> 5 years
N

Y
Y

Y
N

19

A Communication System Framework is shown.


Sams
webmail
account

Jos webmail
account

Application
Level

Communication
Control and
Addressing Level

Transmission
Level

PC

email
message
messa
ge

email
email
message
m
essage

Network
interface
card

Wireless

Switching
+
Routing

Ethernet
cable

MAC

Ethernet
connection

What are the appropriate components if Jos webmail account is the source of the email
message?

20

Transmitter

Receiver

Destination

(A)

Ethernet connection

Sams webmail
account

MAC

(B)

Network
interface card

Ethernet cable

Sams webmail
account

(C)

PC

MAC

Sams webmail
account

(D)

Wireless

Ethernet cable

Sams webmail
account

The following is an SQL query for a real estate database.


SELECT agent.name
FROM agent, residence
WHERE agent.agentno = residence.agentno
AND residence.residenceno = 342;

What fact can be deduced from this query?


(A) All sales have the same agent.
(B)

The sale has an agent numbered 342.

(C)

The residence number attribute occurs in both tables.

(D) The residence table is not required to identify an agent.

2009 HSC Information Processes and Technology


Marking Guidelines

Section I
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Correct
Response
B
A
D
C
D
A
B
C
B
C
D
A
A
A
C
C
D
A
B
D


( ) ' ( % 2 3 # ( / / , # % 2 4 ) & ) # !4 %
% 8 ! - ) . !4 ) / .

)NFORMATION0ROCESSES
AND4ECHNOLOGY

Pages 29

Reading time 5 minutes


Working time 3 hours
Write using black or blue pen
Draw diagrams using pencil

Attempt Questions 120


Allow about 40 minutes for this section
Pages 1014
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Pages 1520
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

1300

Use the multiple-choice answer sheet for Questions 120.


1

A library maintains a card-based system, indexed by title, to help borrowers find books.
There is only one card for each book containing data on the title, the publisher, the author,
the topics, the date of publication and a location number.
Using the card-based system, which of the following would enable the user to determine
the location of a book?
(A) The authors name but not the title
(B)

The title but not the date of publication

(C)

The books publisher but not the author

(D) The topics that a book covers but not the title
2

A student uses a digital photograph of another student in an email.


Which issue needs to be considered in this scenario?
(A) Privacy
(B)

Security

(C)

Copyright

(D) Accuracy of information


3

Which of the following refers to a subscription-based web-feed that provides users with
frequently updated content?
(A) OLAP
(B)

RSS

(C)

SSL

(D) VOIP

A DVD store maintains a customer database. Each new customer is asked to complete a
form by providing his or her contact details, including address, phone numbers and email
contact. Each time a customer borrows a DVD the customer is asked to confirm his or
her address details only, and updates are made as needed.
Which statement about the quality of this data is true?
(A) The data quality is good because the data stored is always up to date.
(B)

The data quality is good because the data stored is constantly revised.

(C)

The data quality is poor because much of the data could be out of date and there is
no way of checking.

(D) The data quality is poor because there are no verification procedures in place to
ensure it is accurate.
5

A large clothing-store chain has recently made major upgrades to its stock/sales
information system. Many of the staff need to be trained in the use of the new information
system. The director is implementing the new system in the following sequence:
mens clothing section
womens clothing section
childrens clothing section.
Which of the following methods of conversion is being used?
(A) Direct
(B)

Parallel

(C)

Phased

(D) Pilot
6

The owner/operator of a retail store is designing a database to manage stock/sales within


the workplace. Initially she designs the solution on a spreadsheet prior to developing the
information system using a Database Management System.
Which development approach would be most appropriate?
(A) Outsource
(B)

Prototyping

(C)

Structured

(D) Traditional

Which of the following statements about normalisation is true?


(A) A query would not require normalising.
(B)

A flat file would not require normalising.

(C)

Normalisation reduces data redundancy.

(D) Normalisation eliminates data duplication.


What is a term for the screens and reports produced from stored database data?
(A) Views
(B)

Vistas

(C)

Visions

(D) Vertices
Use the following information to answer Questions 910.
A school assistant maintains a flat-file database to manage vehicle owners who use the schools
carpark on a daily basis. The data dictionary contains the following metadata.

Driver_Surname

44

Driver_FirstNames

40

Driver_DOB

Car_Make

12

Car_Manufacture_Year

Car_Registration

Licence_No

Approximately how much storage space would 1000 records require?


(A) 120 bytes
(B)

120 kilobytes

(C)

120 megabytes

(D) 120 gigabytes

10

The database designer has decided that the flat-file database should be redesigned and
split into two tables, a
table and a
table.
Which of the following options provides the best schema for the two new tables?
(P = primary key, F = foreign key)
(A)
Driver_Surname (P)

Licence_No (P)

Driver_FirstNames

Car_Make

Driver_DOB

Car_Manufacture_Year

Licence_No (F)

Car_Registration

Driver_Surname

Car_Make

Driver_FirstNames

Car_Manufacture_Year

Driver_DOB

Car_Registration (P)

Licence_No (P)

Licence_No (F)

Driver_Surname (P)

Car_Registration (P)

Driver_FirstNames

Car_Make

Driver_DOB

Car_Manufacture_Year

Car_Registration (F)

Driver_Surname (F)

Driver_Surname (P)

Car_Registration (F)

Driver_FirstNames

Car_Make

Driver_DOB

Car_Manufacture_Year

Car_Registration

Licence_No

(B)

(C)

(D)

11

Which of the following provides the best example of a virtual community?


(A) Shoppers purchasing goods online
(B)

Doctors meeting at a conference in a regional town

(C)

Friends emailing each other from different parts of the world

(D) Students participating online in an international environmental forum

Use the following information to answer Questions 1213.


The Gantt chart outlines the times taken to complete tasks when introducing a new system.

Training
Testing
Implementation of IT
System design
System feasibility
System requirements
Interviews/surveys
0

12

5
Time (weeks)

10

Which tasks were completed over a period of five weeks?


(A) System feasibility, testing, training
(B)

Implementation of IT, testing, training

(C)

Interviews/surveys, system requirements, system feasibility

(D) System requirements, system design, implementation of IT


13

The project team had planned to implement the new hardware and software in the week
it was received. The supplier has just informed the project team that the delivery date is
now the beginning of week 10.
How many weeks will the original plan be delayed by?
(A) 1
(B)

(C)

(D) 4

14

An e-commerce site offers perfumes for sale online. Since launching the site, the website
functionality, ease of navigation and payment system have been tested. Sales have grown
from two to fifty purchases per hour. This increased sales growth has caused the system
to malfunction.
Which of the following test data should have been used in the testing stage of
development?
(A) Live
(B)

Real

(C)

Unit

(D) Volume
15

What is smtp?
(A) A communications protocol used for receiving files sent from one computer to
another over a network
(B)

An internet standard for sending email messages from one computer to a server
over a network

(C)

An internet standard for securing email messages from one computer to a server
over a network

(D) A protocol used for sending secure webpages and webpage components over the
internet
16

Jim has hired a project team to build a new information system for his business. The
project manager has provided a feasibility report.
Using a traditional system of development approach, which of the following does Jim
need to consider next?
(A) How installation of hardware and software will occur
(B)

How the specifications for the design will be developed

(C)

How the staff will be trained and the system will be tested

(D) How the new system will help the business achieve its purpose

17

What name is given to a network of many interlinked LANs within an organisation used
to securely share information and software?
(A) Extranet
(B)

Internet

(C)

Intranet

(D) Wireless
18

1. Shopping cart

2. Login

3. Address

xxxxxxxxx
xxxxxxxx xxxxx x

xxxxxxxxx

Xxxx

Email
xxxxx
xxxxxxxxx

xx
xxx

xx
xxx

Xxxx

Password

Xxxx

xxx

xxxxxxx

Xxxx

xxxxxxxxx

xxx
xxx

Email

Xxxx

Password

Xxxx

xxxx
Back

Next

4. Payment information

xxx

Back

Next

Back

Submit

5. Thank you

Payment information
Name
Card number
Expiry date

Thank you for purchasing our product.


CVC

Continue shopping

Xxxxx

Submit
Back

Which of the following sets contains three elements that are displayed in the sequence of
screens shown above?
(A) Menus, radio buttons, scroll bars
(B)

Menus, check-boxes, radio buttons

(C)

Data entry, input mask, scroll bars

(D) Text boxes, radio buttons, drop-down menus

19

An information system is used by a retail hardware store to record the sales completed at
one of its branches.
Which of the following best describes the purpose of such an information system?
(A) To process the transaction data
(B)

To reduce the transaction details

(C)

To describe the transaction schema

(D) To data mine the transaction records


20

In which list are all the elements characteristics of Network Operating Systems?
(A) File searches, secure logins for users, accept multiple users, multitasking
(B)

Text searching, process transactions, allocate network addresses, accept multiple


users

(C)

Scheduling of tasks, controlled access to network resources, accept multiple users,


audio processing

(D) Allocate network addresses, secure logins for users, controlled access to network
resources, scheduling of tasks

2010 HSC Information Processes and Technology


Marking Guidelines

Section I
Question

Answer

10

11

12

13

14

15

16

17

18

19

20

2011
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I
General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Black pen is preferred
Draw diagrams using pencil

Pages 29

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 1014

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1623

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

1300

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.

The access to data in a database management system (DBMS) is primarily related to


which of these information processes?
(A) Storing and retrieving
(B)

Receiving and analysing

(C)

Collecting and displaying

(D) Transmitting and organising


2

What is the primary purpose of HTML?


(A) To provide secure access to a web page via the world wide web
(B)

To specify how text, graphics and sound are displayed on a web page

(C)

To control access to files when downloading data via a web page

(D) To transfer a web page from a remote server and display it on a screen
3

A local council stores information relating to property ownership in a database.


Under the terms of the Freedom of Information Act (now Government Information
(Public Access) Act) who owns the data?
(A) The local council
(B)

The person to whom the data refer

(C)

The participants who collected the data

(D) The personnel who manage the database


4

Under what conditions would it be appropriate to outsource the development of a new


solution?
(A) When the design team does not have the skills to deliver a part of the system
(B)

When the materials required for the system cannot be delivered to schedule

(C)

When the new system does not meet the basic requirements of the client

(D) When the cost of the new system is not economically feasible
2

What type of connection does Bluetooth wireless technology use between two devices
enabled to receive data?
(A) Long-range high-bandwidth
(B)

Short-range high-bandwidth

(C)

Long-range low-bandwidth

(D) Short-range low-bandwidth


6

What term is used to describe the type of computing shown in the diagram?

Requests

Data and services


User interface

Data, applications,
network resources

(A) Virtual
(B)

Client-Server

(C)

Peer to Peer

(D) Multiprocessor
7

A local entertainment venue is implementing a website to promote its business.


Currently the website has information about upcoming events. Shortly customers will be
able to purchase memberships through the website. Within six months the venue hopes
to be selling merchandise online.
Which of the following methods of conversion is being used?
(A) Pilot
(B)

Direct

(C)

Parallel

(D) Phased

What is the advantage of creating a system using an iterative system development


approach?
(A) Users are not needed at any stage of the project, so time and cost are reduced.
(B)

Users are only involved at the end of the project, so problems are identified, solved
and reduced.

(C)

Users are involved at each step of the project, so problems are identified, solved and
reduced at each stage of development.

(D) Users are only involved at the beginning of the project, so time, cost and
unnecessary use of additional staff are reduced.
9

line 1
line 2
line 3

SELECT
FROM
WHERE

STUDENTID, STUDENTNAME, MARKS


STUDENT, RESULTS
STUDENT.Student ID = RESULTS.Student ID
and RESULTS.MARKS > 49

In the above SQL, what does line 2 do?


(A) It specifies the criteria used for data retrieval.
(B)

It identifies the fields displayed in the results.

(C)

It identifies the tables to be used for data retrieval.

(D) It determines the sequence for the displayed results.


10

Which of the following is an element of the logical organisation of hypermedia?


(A) Field name
(B)

Hard disk

(C)

Node

(D) Text
11

Which network administration task is common to many networks?


(A) Designing the cabling layout for a network
(B)

Giving users file access rights

(C)

Writing the code for an application

(D) Personalising users desktops

Use the following diagram to answer Questions 12 and 13.


Communication System Framework

Users/Participants
Application
level

Communication
control
and addressing
level
Transmission
level
12

13

message

Medium

message

Medium

Which of the following correctly identifies components 2, 3 and 5 in the communication


system framework?
2

(A)

Source

Transmitter

Destination

(B)

Transmitter

Switching & routing

Receiver

(C)

Source

Transmitter

Receiver

(D)

Transmitter

Switching & routing

Destination

Which of the following is part of the communication control and addressing level?
(A) Physically transferring each message
(B)

Ensuring the correct transmission of each packet of data

(C)

Controlling the size of data packets and speed of transfer

(D) Reorganising the data into a form suitable for transmission

14

A system development team has tested a new information system to sell books online.
When the system went live customers had difficulty using the system successfully.
What strategy could have been used to ensure a more successful implementation?
(A) Use a traditional development method to control the project schedule and scope
(B)

Use participant development to allow customers to develop a system that best


meets their needs

(C)

Undertake a phased implementation so that the system would not be available to all
customers at the one time

(D) Test the system with a group of customers and provide online documentation to
support customers shopping at home

15

Which row in the table shows data flow symbols that represent a process, an external
entity and data flow?
Process

External entity

(A)
(B)
(C)
(D)

Data flow

16

A school timetable system allows students to print their own timetable. When they enter
their student ID and password the student has access to the timetable file and can retrieve
the timetable details. A printed copy is then produced for the student.
Which context diagram best represents this process?

(A)

student

printed
timetable

student ID,
password
generate
timetable

student ID
timetable
file

timetable
details

(B)

student

printed
timetable

(C)

student ID

printed
timetable

student ID,
password

generate
timetable

verify password
generate
timetable

timetable
details

(D)

student ID

printed
timetable

retrieve timetable

timetable
file

verify password
generate
timetable

17

Which of the following is an example of the independence of data from the database
management system (DBMS)?
(A) An organisation uses data as part of a DBMS.
(B)

The DBMS accesses data using sequential access.

(C)

An organisation can only access data using a DBMS.

(D) The DBMS retrieves data without knowing where the data is stored.
18

What are the names given to the three parts of the database hierarchy shown in the
diagram?
COURSE file
Database

STUDENT file

ENROLMENT file

Part 1

COURSE
Course_ID
DF101
BP201
PM202

Course Name
Database Fundamentals
Business Processes
Process Management

Part 2

DF101

Database Fundamentals

Part 3

DF101

Part 1

Part 2

Part 3

(A)

Record

Field

Table

(B)

Table

Record

Field

(C)

Field

Record

Table

(D)

Table

Field

Record

Use this information to answer Questions 1920.


Users
Customers who use loyalty cards
when purchasing goods

Environment
Large retail organisation

Information System
Purpose
To identify trends, sequences and clusters in
data in order to improve the marketing of
products
Information Processes
Organising, analysing, processing, displaying
Participants
Skilled employees
who can use
complex software

Data/Information
Very large amounts of
sales data, customer
data, inventory data,
product information etc

Information
Technology
Large storage, fast
processors,
interactive software

Boundary
19

What would be the most powerful tool to help participants best achieve the purpose of
this system?
(A) Online analytical processing to explore patterns in data
(B)

Decision tables to represent the purchasing patterns of customers

(C)

Structured query language commands to interrogate a sales database

(D) What-if analysis to explore trends/sequences in large amounts of data


20

What would be the most appropriate structure to store the data for this system?
(A) Spreadsheet
(B)

Flat-file database

(C)

Data mine

(D) Data warehouse

2011 HSC Information Processes and Technology


Marking Guidelines
Section I
Multiple-choice Answer Key
Question

Answer

10

11

12

13

14

15

16

17

18

19

20

2012
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I
General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Black pen is preferred
Draw diagrams using pencil

Pages 28

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 912

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1420

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

1300

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.

Which protocol would be most appropriate to send a client ID and password to an online
banking system?
(A) Secure Socket Layer (SSL)
(B)

File Transfer Protocol (FTP)

(C)

Hypertext Transfer Protocol (http)

(D) Portable Document Format (PDF)


2

Which of the following diagrams best represents digital to analogue conversion?


(A)

sender

modem

receiver

(B)

sender

modem

receiver

(C)

sender

modem

receiver

(D)

sender

modem

receiver

In which of the following documents will potential costs associated with a new system
be included?
(A) Gantt chart
(B)

User manual

(C)

Process diary

(D) Feasibility report

The diagram shows a portion of a network.

Awaiting Copyright

What term is used to describe Computer 1 in the diagram?


(A) Fat client
(B)

Web server

(C)

Thin client

(D) Mail server

Which of the following describes the organisation of hypermedia?


(A) Nodes and links
(B)

Files and records

(C)

Online and offline storage

(D) Direct and sequential access to data

Which of the following best describes handshaking between two communication devices?
(A) Modulation of a signal
(B)

Process to encrypt a message

(C)

Establishment of an agreed protocol

(D) Detection and correction of transmission errors


3

Which of the following transmission media only allows transmission if the sender and the
receiver are in line of sight?
(A) Optic fibre
(B)

Microwave

(C)

Coaxial cable

(D) Twisted pair

The cable shown in the diagram carries digitised data.

Awaiting Copyright

What type of waves are carried by this cable?


(A) Radio waves
(B)

Microwaves

(C)

Sound waves

(D) Light waves

Four network topologies are shown.


KEY
Node
Server
Transmission medium
Terminator
1

Which row in the table correctly identifies the types of network topologies shown?

10

(A)

star

bus

ring

hybrid

(B)

ring

star

bus

hybrid

(C)

ring

star

hybrid

bus

(D)

star

hybrid

bus

ring

The following 8-bit ASCII character and a parity bit were transmitted without error.
ASCII character

Parity bit

00110010

Which of the following would result in an error message if sent using the same parity?
(A)

01010111

(B)

01100101

(C)

10111000

(D)

00010010

11

A new database system for the management of records has been implemented in a
doctors surgery. Paper records will continue to be used until all staff are trained and
confident in using the new system.
Which conversion method is being used?
(A) Direct
(B)

Parallel

(C)

Phased

(D) Pilot
12

The table shows a partial data dictionary from a database.


Field name

Size

Data type

IDnum

10

number

Surname

20

text

Firstname

20

text

Phone

10

text

What is the approximate amount of memory needed to store 10 000 records in this
database?
(A) 60 Kb
(B)

600 Kb

(C)

6000 Kb

(D) 60 000 Kb
13

Users have recognised that there are problems with an existing information system.
Which of the following would help in finding the cause of the problem?
(A) Identifying participants
(B)

Producing a new Gantt chart

(C)

Analysing the system

(D) Retraining participants to use the system

14

Within a school database, which of the following describes the relationship between data
in a student table and data in a subject table?
(A) One to one
(B)

One to many

(C)

Many to one

(D) Many to many

15

In free text search, the * symbol can be used to replace 0 to 7 characters in a word, not
including white space.
Which of the following searches would locate all three words hypermedia,
multimedia and hypertext?
(A) media* OR hyper*
(B)

multi* OR hyper*

(C)

*multi AND *text

(D) *media AND *hyper

16

This image shows detail of an emerging technology used in luggage tags to track items
being transported from the check-in area at an airport to different aircraft.
Awaiting Copyright

What technology is this?


(A) Optical Character Recognition
(B)

Radio Frequency Identification

(C)

Magnetic Ink Character Recognition

(D) Transmission Control Protocol/Internet Protocol

17

Which issue needs to be considered when many organisations store data with one
common identifier, such as a tax file number?
(A) Data matching
(B)

Ownership of data

(C)

Freedom of information

(D) Acknowledgement of data sources

18

A multinational company has its database located in Sydney. The database is accessed
from offices in various countries. What type of database is being used?
(A) Centralised
(B)

Distributed

(C)

Redundant

(D) Schematic
19

How does a print server on a client-server network interact with the user when it is
reporting the status of a print job to the client?
(A) The transmitter determines the address of the user.
(B)

The print server is the receiver of the transmission medium.

(C)

It is the source of the message being sent to the destination.

(D) It is the destination of the message being sent by the source.


20

An insurance company pays a loyalty bonus to customers who have been insured for at
least six months. In their first year with the company, Premium-cover customers receive
$500 and Basic-cover customers get $300. After one year all customers receive a $500
bonus.
Length of
time insured
Loyalty
bonus
payment

Type of
insurance

Amount of
bonus
$500

X
Premium-cover

$500

Basic-cover

$300

Not eligible

Which of the following shows the correct set of conditions for X, Y and Z?
X

(A)

> 1 year

6 months AND 1 year

< 6 months

(B)

> 1 year

6 months OR

1 year

< 6 months

(C)

< 1 year

6 months AND 1 year

> 6 months

(D)

< 1 year

6 months OR

> 6 months

1 year

2012 HSC Information Processes and Technology


Marking Guidelines

Section I
Multiple-choice Answer Key
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Answer
A
A
D
C
A
C
B
D
B
B
B
B
C
D
B
B
A
A
C
A

2013
H I G H E R S C H O O L C E R T I F I C AT E
E X A M I N AT I O N

Information Processes
and Technology
Total marks 100
Section I
General Instructions
Reading time 5 minutes
Working time 3 hours
Write using black or blue pen
Black pen is preferred
Draw diagrams using pencil

Pages 28

20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Section II

Pages 912

40 marks
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Section III

Pages 1316

40 marks
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

2480

Section I
20 marks
Attempt Questions 120
Allow about 40 minutes for this section
Use the multiple-choice answer sheet for Questions 120.
1

An organisation employs a project team to update a system.


Which of the following techniques could the team use to understand the needs of the
organisation?
(A) Testing the solution
(B)

Refining the prototype

(C)

Interviewing the participants

(D) Scheduling the tasks to be completed


2

This context diagram represents an online retailer.


Order
details

Order
details
Online
Purchasing
System

Customer
Invoice

Warehouse
Transaction
receipt

Which row in the table identifies a process and an external entity in the diagram?
Process

External entity

(A)

Online purchasing system

Warehouse

(B)

Order details

Transaction receipt

(C)

Online purchasing system

Transaction receipt

(D)

Order details

Warehouse

A company is considering implementing a new system.


Which of the following should be included in the feasibility study?
(A) An operation manual
(B)

Results from testing the new system

(C)

A working model of the new system

(D) Risks associated with the new system


4

A worker uses a hand-held device to scan the barcodes of items in a warehouse.


Which information process best describes the activity of scanning?
(A) Collecting
(B)

Displaying

(C)

Storing

(D) Transmitting
5

The diagram shows a household network.


Broadband
modem
(to internet
connection)
Ethernet
router

Printer

Computer 1

Wireless
access point

Computer 2
Games console

Smartphone

Which network topology is represented in this diagram?


(A) Bus
(B)

Hybrid

(C)

Star

(D) Wireless

Which of the following converts analog sound into digital data?


(A) OLAP
(B)

RSS

(C)

TCP

(D) VOIP
7

Which of the following would be LEAST effective in identifying problems in an existing


system?
(A) Surveying users
(B)

Interviewing participants

(C)

Observing participants using the system

(D) Writing a troubleshooting guide for users


8

A new EFTPOS method of payment for purchases requires customers to simply place an
enabled credit card close to a terminal at the checkout.
Which of these is used to transfer data from the credit card to the EFTPOS terminal?
(A) 3G
(B)

Infrared

(C)

NIC

(D) Radio
9

In a transmission system, when the message TOP MARKS was sent as a secured
message it appeared as XSTDQEVON.
Which security measure was used?
(A) Checksum
(B)

Encryption

(C)

Modulation

(D) Synchronisation

Use this email to answer Questions 10 11.


To: Patricia Jones, James Nguyen, Kevin Wang
Cc: Kerrin Jacobson
Bcc: Fred Stevenson
Subject: Meeting Notes
From: Brian Clarkson

Dear All,
Please find attached a copy of the meeting notes from our 10:00am meeting.
Regards
Roberto

Meeting Notes (24.6KB)

10

Who would receive this email without all the other recipients knowing?
(A) Patricia Jones, James Nguyen and Kevin Wang
(B)

Kerrin Jacobson

(C)

Fred Stevenson

(D) Brian Clarkson


11

What may raise concerns as to whether the email message is legitimate?


(A) The attachment may contain a virus.
(B)

The message is being sent to three recipients.

(C)

There are obvious spelling mistakes in the message.

(D) It is signed by a person who does not own the email account.
12

A prospective employer asks a job applicant for their social network login details.
The applicant should consider this request as
(A) an invasion of privacy.
(B)

the employers legal right.

(C)

a freedom of information request.

(D) a breach of the applicants ownership of data.


5

13

A database developer would create different data views for users to show
(A) the metadata.
(B)

the data structures.

(C)

data relevant to their work.

(D) data in response to their queries.


14

This is part of the PRODUCT table in a relational database.


PRODUCT
Product_ID

Product_Name

Price

Supplier_ID

SB1296

Cheese grater

4.55

SX43

SB1297

Salad spinner

11.25

SX43

SB1298

Knife block

45.00

SD18

Which of the following would be valid data types for the fields Price and Supplier_ID?

15

Price

Supplier_ID

(A)

Boolean

Text

(B)

Text

Real

(C)

Real

Text

(D)

Currency

Real

This HTML code is found in the source of a web page.


<html>
<head>
<title>Cinema Releases of 2013</title>
<meta name=description content=the best movies that were released in 2013>
<meta name=keywords content=pictures, films, videos>
</head>
</html>

Which of the following words would NOT locate this web page when entered into a
search engine?
(A) 2013
(B)

films

(C)

movies

(D) title
6

16

A company is designing backup procedures for very important data. The main server is
located in the head office and connected to a network of thin clients in remote offices.
Which of the following backup options is the most appropriate?
(A) Daily backup of the main server
(B)

Daily backup of the thin clients

(C)

Weekly backup of the thin clients

(D) Weekly backup of the main server


17

A business employs a project team to develop a new system. The development approach
they use is represented in the diagram below.
Understanding the initial requirements
Planning a solution
Refining the solution

Developing and testing the solution


User testing and evaluating

Yes

Is another feature requested?


No
System completed

Which development approach is used by the business?


(A) Agile
(B)

Traditional

(C)

Participant development

(D) Participant customisation


18

Which of the following is an example of live data testing?


(A) A programmer reviewing the code of a game prior to releasing it
(B)

A business offering free goods to customers who order from an online store in its
trial period

(C)

A web designer requesting feedback about a website from the company for which
it was developed

(D) A data entry operator investigating the maximum number of records that can be
stored in a database
7

19

Janice entered the following SQL command to retrieve information about the products in
her store.
SELECT Products.ProductNumber
FROM Products
WHERE Products.Quantity < minimum stock
ORDER BY Products.Quantity ASC

Which list would be produced as a result of this query?


(A) All products in alphabetical order
(B)

Products due to be delivered in order of urgency

(C)

Products sold in the last month in order of popularity

(D) Products that need to be reordered based on stock levels


20

A large insurance company wishes to integrate all data in its current information systems
to create an enterprise-wide system within the next three months. Research into similar
companies indicates that there are already successful systems available, although they do
not fulfil all the specific needs of the company.
Which of the following would be the most appropriate solution for this company?
(A) Identify a developer who can apply agile methods to develop the new enterprise-wide
system
(B)

Use prototyping to show the modifications that the company requires of their new
enterprise-wide system

(C)

Use a traditional approach to develop the new enterprise-wide system in-house to


meet the companys specific needs

(D) Identify an appropriate supplier, purchase an enterprise-wide system from them


and have the system customised to meet the needs of the company

2013 HSC Information Processes and Technology


Marking Guidelines

Section I
Multiple-choice Answer Key
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Answer
C
A
D
A
B
D
D
D
B
C
D
A
C
C
D
A
A
B
D
D

2014

HIGHER SCHOOL CERTIFICATE


EXAMINATION

Pages 29

Reading time 5 minutes


Working time 3 hours
Write using black or blue pen
Black pen is preferred
Draw diagrams using pencil

Attempt Questions 120


Allow about 40 minutes for this section
Pages 1013
Attempt Questions 2124
Allow about 1 hour and 10 minutes for this section
Pages 1418
Attempt TWO questions from Questions 2528
Allow about 1 hour and 10 minutes for this section

2450

Use the multiple-choice answer sheet for Questions 120.


1

Which of the following contains a project teams descriptions of progress and issues
encountered during system development?
(A) A journal
(B)

A schedule of tasks

(C)

A funding management plan

(D) A communication management plan


2

Which of the following is NOT a network administration task?


(A) Mapping users
(B)

Installing software

(C)

Assigning protocols

(D) Refining prototypes


3

Which of the following technologies provides the fastest wireless transmission over short
distances between mobile devices?
(A) Infrared
(B)

Bluetooth

(C)

Optic fibre

(D) Twisted pair

Use the following extract from a data dictionary to answer Questions 45.
Field name

Field size

Example

Student_ID

10

00105/VB

Student_DOB

10

10/08/2007

Fees_Paid

Which row in the following table correctly identifies the suitable data types for
Student_ID, Student_DOB and Fees_Paid?
Student_ID

Student_DOB

Fees_Paid

(A)

Text

Date

Boolean

(B)

Numeric

Date

Text

(C)

Numeric

Numeric

Text

(D)

Text

Numeric

Boolean

Which calculation could be used to determine the storage space in kilobytes for
1000 records of this database?
(A)

(Number of characters in a record) 1024 1000

(B)

(Number of characters in a record) 8 1024

(C)

(Number of characters in a record) 1000 8

(D)

(Number of characters in a record) 1000 1024

Two members of a development team disagree about the information technology


requirements of a project.
Which initial strategy should the project manager use to identify the issues of the
disagreement?
(A) Team building
(B)

Conducting a survey with team members

(C)

Observing the two team members

(D) Interviewing the two team members

Which of the following error detection techniques is the most effective in checking the
accuracy of data transmitted?
(A) Parity bit
(B)

Checksum

(C)

Block character check

(D) Cyclic redundancy check


8

What is the main purpose of assigning employees different levels of network access?
(A) To ensure that the network is correctly set up
(B)

To make the network inaccessible from a remote location

(C)

To ensure employees only have access to data relevant to their role

(D) To prevent people outside the organisation from accessing the network
9

A business operates a secure private network that allows access for its employees and
limited access for its customers via a secure login.
What types of networks allow access for the employees and the customers respectively?
Employees

10

Customers

(A)

Internet

Extranet

(B)

Intranet

Extranet

(C)

Internet

Local area network

(D)

Intranet

Local area network

A company is replacing all of its physical stores with an online store. During the trial
period, customers are able to purchase products online or from any of the companys
existing stores. When the company is confident that the online system is functioning
correctly, it will set a date to close all of the physical stores.
Which method of conversion is being used?
(A) Direct
(B)

Parallel

(C)

Phased

(D) Pilot

The diagram shows a home communication system.

Internet

Router

Laptop

X
Pay TV
Printer

Games console
Scanner
Server

Which hardware component is X most likely to be?


(A) Modem
(B)

Switch

(C)

Repeater

(D) Wireless Access Point


A company will use a participant development approach to modify its website.
Which statement best describes this approach?
(A) Purchasing a custom-built website
(B)

Hiring programmers to develop the website

(C)

Using the existing information technology and skills of the staff

(D) Meeting with external contractors to modify, refine and test the website

13

This diagram shows a network.

Node

Which topology is represented?


(A) Bus
(B)

Hybrid

(C)

Ring

(D) Star
14

What is the purpose of system evaluation?


(A) To customise a system to make it operational
(B)

To clarify the relevant information processes within a system

(C)

To review the effect that a system has on its users and participants

(D) To determine whether an organisation can meet the costs associated with the
changes to its existing system

Which data modelling tool shows the relationship between data entry screens?
(A) Storyboard
(B)

Decision tree

(C)

Schematic diagram

(D) Data flow diagram


16

Which row of the table correctly matches the communication level with a suitable
protocol?
Communication level

Protocol

(A)

Transmission

TCP

(B)

Application

TCP

(C)

Application

SSL

(D)

Transmission

SSL

This decision table is used for troubleshooting printer problems.


Conditions

Rules

Printer does not print

Status light is flashing

Printer is unrecognised

Check printer cable

Check paper jam

Actions

Which of the following situations will require checking the printer cable?
(A) The printer prints and the status light is flashing.
(B)

The printer does not print and the status light is not flashing.

(C)

The printer does not print but is recognised by the computer.

(D) The printer prints but is not recognised by the computer.

A Gantt chart for an upgrade of a business network indicates that:


Research will take two weeks, followed by designing the solution which will take
three weeks.
Installation of cables will start immediately after this and last for two weeks.
Installation of software and hardware will last for five weeks and will start when
research has concluded.
On completion of all of the above tasks, the network upgrade will undergo an
evaluation for a one-week period.
What is the minimum number of weeks required for the network upgrade?
(A) 7
(B)

(C)

(D) 10
The following 7-bit ASCII character and parity bit were transmitted.
0110101

In which of the following examples would the receiver request that the message be
re-sent?
ASCII character

Parity bit

(A)

0110101

(B)

1011010

(C)

0011011

(D)

0011010

20

This flat-file database stores the details of devices that can be borrowed from a library.
Item

Item
Borrowers Borrowers
number first name
surname

Faculty

Date
borrowed

Date
returned

Laser printer #1

001

John

Jones

Science

31 Jan 14

02 Feb 14

Video camera

008

John

Jones

Science

07 Feb 14

12 Feb 14

Video camera

008

Mary

Green

Maths

14 Feb 14

Multimedia projector

005

John

Jones

Science

21 Feb 14

06 Jun 14

Digital camera

003

Jack

Smith

English

04 Apr 14

08 Apr 14

Multimedia projector

005

Mary

Green

Maths

15 Sep 14

22 Sep 14

The database manager has decided that the flat-file database should be normalised.
Which of the following best represents the relationship between the Borrower table and
the Item table?
P

(A)

Primary key

Borrower

Item

Borrower ID (F)

Foreign key

(B)

Borrower

Item

Item number (P)

Borrower ID (P)

Item number (F)

Surname

Borrower ID (F)

Surname

Borrower ID (P)

First name

Item

First name

Item

Faculty

(C)

Faculty

Borrower

Item

Borrower ID (P)

(D)

Borrower

Item

Item number (P)

Borrower ID

Item number (P)

Surname

Borrower ID (F)

Surname (P)

Borrower ID (F)

First name

Item

First name

Item

Faculty

Faculty

2014 HSC Information Processes and Technology


Marking Guidelines

Section I
Multiple-choice Answer Key
Question
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Answer
A
D
B
A
D
D
D
C
B
B
B
C
A
C
A
C
B
B
C
C

Das könnte Ihnen auch gefallen