Also what other exams are out there besides VCAA and VITTA?As far as I'm aware: CSE, Insight (I think they only have a 2011 one)
I'm feeling quite shitty about this exam :/
Yeah it's terrible! I just keep looking at the exams and content and realising how much I don't know. It's such an ambiguous subject. I have studio on Monday, so that leaves 3 days of studying as well.I'm feeling quite shitty about this exam :/
Give me a day or two and I'll probably be in the same boat as you. As with you I do also have a second exam to study for before IT which is the other problem.
Yeah it's terrible! I just keep looking at the exams and content and realising how much I don't know. It's such an ambiguous subject. I have studio on Monday, so that leaves 3 days of studying as well.I'm feeling quite shitty about this exam :/
Give me a day or two and I'll probably be in the same boat as you. As with you I do also have a second exam to study for before IT which is the other problem.
What do you guys predict will show up on the exam? EDIT: besides what you mentioned above ;)I don't really like predictions, just study the entire course inside and out imo, anything in there could pop up.
I don't really like predictions, just study the entire course inside and out imo, anything in there could pop up.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
I said it must "adhere to the standards of user-friendliness, but apparently that's not a criterion, I think? Anyone have any idea on that one?My first thought is that is a bit too vague as a criterion, like what does "user-friendliness" encompass? You could word it in a way that's a bit more specific, what would you actually test for it to be user-friendly? e.g. things like is the user interface easy to understand etc.
The parking officers may resist the council's changes and be angry about the new system since they weren't warned or told why. This could result in for example, strike action or an increase in sick days.
Motorists will complain that the council is deliberately attempting to raise revenue from PIMS and that the software is unfair/unjust.
Just did the 2011 exam and got 90/100. Not too bad really.
Few questions that I got wrong:Question 15: Nola's and Ben's computers are part of a network. Recently Nola's computer became infected with a worm. Which statement is most correct?
A. The work will not spread to Ben's computer because it is not a use program.
B. The worm will spread to Ben's computer only if Nola sends an infected file to Ben as an email attachment.
C. The worm will spread to Ben's computer only if a copy of one of Nola's infected files is opened on his computer.
D. The worm will spread to Ben's computer by sending a copy of itself through the network and infecting one of his files.
I chose B. My reasons for that answer were that:
- A is ridiculous, we aren't even told what program it is. What defines a useful program? And what has that got to do with anything?
- C is implying that a worm can only travel is a copy is opened on another computer which is incorrect, it can travel through attachments
- I thought D was a little unrealistic. I never thought worms could send themselves? I always thought they had to attach to something that was already being sent?
b. Provide an example of a criterion that the new PIMS must meet to pass the UAT process.
I said it must "adhere to the standards of user-friendliness, but apparently that's not a criterion, I think? Anyone have any idea on that one?Question 16:The introduction of the new PIMS at the Bigton City Council will affect a number of stakeholders.
Outline the conflict that may occur between the Council and each of the following stakeholders.I wrote for Motorists that "The motorists may get angry for receiving unjustified parking tickets and take it out on the council for not explaining the system", however I don't think that's an acceptable answer so I didn't award myself a mark. Does a question like this have to be quite specific to the actual software solution?
- Parking Officers
- Motorists using parking bays
Section B Question 4
Big O Television's secure computer network was recently breached. Big O Television has hired an independent IT security company, Secure TVtech, to test the security of its network and provide support in identifying and repairing any weaknesses in its security.
a. Suggest a technique that Secure TVtech might use to test the security of Big O Television's computer network and describe how it would work.
b. Explain how a security audit of the computer network may have prevented the original network breach at Big O Television.
man im literally screwed for SD my sac scores were 69%,67%,58% and 75% , the practice exams however seem so much easier than our sacsReally? I think they are harder. Programming is way easier than theory.
Just did the 2011 exam and got 90/100. Not too bad really.i made the same mistakes ! this is why SD is so frustrating, the answers they expect of you are sometimes complete BS.
Few questions that I got wrong:Question 15: Nola's and Ben's computers are part of a network. Recently Nola's computer became infected with a worm. Which statement is most correct?
A. The work will not spread to Ben's computer because it is not a useful program.
B. The worm will spread to Ben's computer only if Nola sends an infected file to Ben as an email attachment.
C. The worm will spread to Ben's computer only if a copy of one of Nola's infected files is opened on his computer.
D. The worm will spread to Ben's computer by sending a copy of itself through the network and infecting one of his files.
I chose B. My reasons for that answer were that:
- A is ridiculous, we aren't even told what program it is. What defines a useful program? And what has that got to do with anything?
- C is implying that a worm can only travel is a copy is opened on another computer which is incorrect, it can travel through attachments
- I thought D was a little unrealistic. I never thought worms could send themselves? I always thought they had to attach to something that was already being sent?
b. Provide an example of a criterion that the new PIMS must meet to pass the UAT process.
I said it must "adhere to the standards of user-friendliness, but apparently that's not a criterion, I think? Anyone have any idea on that one?Question 16:The introduction of the new PIMS at the Bigton City Council will affect a number of stakeholders.
Outline the conflict that may occur between the Council and each of the following stakeholders.I wrote for Motorists that "The motorists may get angry for recieving unjustified parking tickets and take it out on the council for not explaining the system", however I don't think that's an acceptable answer so I didn't award myself a mark. Does a question like this have to be quite specific to the actual software solution?
- Parking Officers
- Motorists using parking bays
i made the same mistakes ! this is why SD is so frustrating, the answers they expect of you are sometimes complete BS.
Yeah i'm feeling a little more confident, but i'm not sure how i'll go with unseen material!
I'm actually hoping it will be more technical! I like your attitude, let's smash the exam! although i don't want to jinx us...Yeah i'm feeling a little more confident, but i'm not sure how i'll go with unseen material!
Yeah, with all the teachers and some of last years IT people on here helping us to deal with problems that have cropped up in the past it only makes sense that you do fairly well with all the old material. Last year was the first year of the study design too so they generally have an easy first exam to test the waters with. This year if the exam writers get creative we could be in for a little fun. ;) So we've just got to be more prepared than the rest of the state and be ready to take down whatever's thrown at us. :D
Social Engineering isn't actually testing anything physical.I'm pretty sure you know this, but going to remind you that you might want to be careful how you use the word physical, in the context of security it'd probably refer to "physical security" - which is a term you wouldn't want to use incorrectly since that's something they might dock marks for. Stuff like cracking a password technically isn't anything physical either :P
"the art of manipulating people into performing actions or divulging confidential information."
So it's not actually hacking because nothing is, theoretically, being broken.
For example:
Sending a form to employees asking to fill out all of their credit card details, birth dates, pin numbers and security details. This form is from an 'anonymous' sender with a phony email address like "[email protected]". The sender would be the boss of the company, who will receive the e-mail with all the information. Technically, he hasn't breached any security, he has simply sent a text/html e-mail to the coworkers in an attempt to manipulate them into sending them confidential information.
This would be a form of user testing, i believe.
Many students discussed a version of ethical hacking to test the security. Students are reminded to use technically correct IT terminology. Many students used terms incorrectly, including white-box, black-box, white/black/grey hat hacker, penetration testing, cracker, etc. Appropriate responses included the techniques of penetration testing or packet sniffing and a technical and accurate description of how the technique works.
I'm pretty sure you know this, but going to remind you that you might want to be careful how you use the word physical, in the context of security it'd probably refer to "physical security" - which is a term you wouldn't want to use incorrectly since that's something they might dock marks for. Stuff like cracking a password technically isn't anything physical eitherYeah I meant physical as in like.... virtual physical... hahaha you know what I mean.
Anyway, you could use social engineering as a hacking technique, you could try to procure a password etc. What if it were a hacker sending that email to the employees?I agree with you! I wasn't thinking outside the box with this one, I always thought social engineering was only used by internal sources like bosses, employees, managers etc.
I would say that something has been broken if someone can manipulate the users into leaking confidential information. Say a password, has been leaked, has the network not been breached? Or the information could be a document etc. That's a hole in the network security, is it not?I kind of disagree with you here though. I agree with the document part, that's a breach of security because that document has left/been stolen. However, an employee sharing his password is not a breach of security, that's a personal issue.
Question 15:You can measure suitability before implementing, but you must show if the training program is successful or not.
Suitability is defined: "the quality of having the properties that are right for a specific purpose"
A way of testing whether or not the program itself is suitable, and remember we are talking about the training program, is to test whether or not the employees (parking officers) have actually learnt something from this training program. So, in order to successfully juxtapose the effects of the program you could test their knowledge before and after the program has taken place, for example.
I wrote this:
By asking the Parking Officers questions about their understanding of their job or running appropriate tests/questionnaires before and after training sessions, the Council could successfully measure whether or not the training program is effective and has a positive effect on the Parking Officers, thus testing the suitability of the program.
Yeah that's what I thought after reading the assessment report. But I just thought about it logically, in that you wouldn't want to do something and then say "oh let's check if it's suitable", you'd want to do that before hand. But for the purposes of IT i'll just shut that out haha.Yeah I know what you mean. But there isn't really anyway of seeing whether or not it has worked until you have done it. Obviously you can say before implementing "we wish to implement this to achieve x and y", but in order to test whether x and y were achieved you have to return results. The only way to return credible results is to test whether the program was a success or not, thus using before and after tests, surveys etc.
Your answer makes perfect sense. If the had of asked for a way to measure the effectiveness of the testing program, that's exactly what I would have written (minus the last part, obviously). But thanks for the response, that's all cleared up now.
I've always found VITTA quite reasonable.I just did the Unit 3 Theory test one from 2011, and got 15/20 for multiple-choice :/
I just did the Unit 3 Theory test one from 2011, and got 15/20 for multiple-choice :/
Question 2: Name a device that operates only at the physical layer of the OSI model.
A. Hub
B. Switch
C. Router
D. USB stick
I said USB stick mainly because it cannot have any other function but connect to a port. However, some USB sticks can connect to the internet (ie. 3G mobile broadband) but how can you determine that a hub only runs at the physical layer of the OSI? Can't you have Ethernet Hubs that transfer actual data? The physical data is only binary and circuit transmission?
In a situation like that? I think so. An array of record would have been my answer without even thinking.
Question 9:A program is to be written to store the list of items sold and their characteristics. What would be the most appropriate data structure to use?
A. An array of records
B. An array of numbers
C. A one-dimensional array
D. A two-dimensional array
is it always appropriate in a situation like this to chose an array of records?
Question 17: A discount procedure algorithm has the following rules:
Orders over $500 receieve a 10% discount and orders over $1000 receive a 10% discount and free postage. Which of the following sets of test data would adequately test the discount procedure?
A. Order values of $500 & $1000
B. Order values of $501, $502, $600, $1200
C. Order values of $500, $501, $1000, $1001 & $1200
D. Order values of $400, $500, $600, $700, $800, $900, &1000 & $1200
The answer was C, I chose D.
The reason why I chose D is:The test data at C does not wager for <500, so how can it be adequate?
- Must test data <500 to ensure no discounts are included
- Must test data = 500 to ensure 500 isn't included in the discount (>500)
- Must test data over 500 to ensure a discount of 10% is given (>500)
- Must test data under 1000 to ensure it's not included in "free postage" (<1000)
- Must test data equal to 1000 to ensure it's not included in "free postage" (=1000)
- Must test data over 1000 to ensure "free postage" is included (>1000)
Question 2: Name a device that operates only at the physical layer of the OSI model.Hubs do not read any of the data passing through them and are not aware of their source or destination. Essentially, a hub simply receives incoming packets, possibly amplifies the electrical signal, and broadcasts these packets out to all devices on the network. Switches are typically layer 2 as they are dealing with frames and MAC addresses, routers are layer 3.
A. Hub
B. Switch
C. Router
D. USB stick
I said USB stick mainly because it cannot have any other function but connect to a port. However, some USB sticks can connect to the internet (ie. 3G mobile broadband) but how can you determine that a hub only runs at the physical layer of the OSI? Can't you have Ethernet Hubs that transfer actual data? The physical data is only binary and circuit transmission?
Question 9:A program is to be written to store the list of items sold and their characteristics. What would be the most appropriate data structure to use?
A. An array of records
B. An array of numbers
C. A one-dimensional array
D. A two-dimensional array
is it always appropriate in a situation like this to chose an array of records?
Question 17: A discount procedure algorithm has the following rules:
Orders over $500 receieve a 10% discount and orders over $1000 receive a 10% discount and free postage. Which of the following sets of test data would adequately test the discount procedure?
A. Order values of $500 & $1000
B. Order values of $501, $502, $600, $1200
C. Order values of $500, $501, $1000, $1001 & $1200
D. Order values of $400, $500, $600, $700, $800, $900, &1000 & $1200
QuoteQuestion 17: A discount procedure algorithm has the following rules:
Orders over $500 receieve a 10% discount and orders over $1000 receive a 10% discount and free postage. Which of the following sets of test data would adequately test the discount procedure?
A. Order values of $500 & $1000
B. Order values of $501, $502, $600, $1200
C. Order values of $500, $501, $1000, $1001 & $1200
D. Order values of $400, $500, $600, $700, $800, $900, &1000 & $1200
It's the rubbish questions like this that make me face palm. I agree in a real world scenario the answer should be D. Sure D may be a little excessive but it does test what happens if you enter something less than 500. To me this is still testing the discount procedure, because I am checking its implementation to ensure that the discount is not incorrectly applied to items less than $500. Whoever wrote this question should take a long hard look at themselves. Disgusting.
Actually upon inspection again, I think it might test it properly.QuoteQuestion 17: A discount procedure algorithm has the following rules:
Orders over $500 receieve a 10% discount and orders over $1000 receive a 10% discount and free postage. Which of the following sets of test data would adequately test the discount procedure?
A. Order values of $500 & $1000
B. Order values of $501, $502, $600, $1200
C. Order values of $500, $501, $1000, $1001 & $1200
D. Order values of $400, $500, $600, $700, $800, $900, &1000 & $1200
It's the rubbish questions like this that make me face palm. I agree in a real world scenario the answer should be D. Sure D may be a little excessive but it does test what happens if you enter something less than 500. To me this is still testing the discount procedure, because I am checking its implementation to ensure that the discount is not incorrectly applied to items less than $500. Whoever wrote this question should take a long hard look at themselves. Disgusting.
I personally disagree, I think the answer should be C, that tests all the ranges of values we have.
1) =< 500
2) 500<x=<1000
3) >1000
Two things in relation to OSI model. Know the physical layer well (the study design certainly emphasizes this). Also understand how the OSI model relates to the TCP/IP model.If terms of protocols, will SSL, HTTPS, FTP, POP3, IMAP, TCP, IP, SMTP suffice? Or is there others we need to know?
VCAA do not require you to have extensive knowledge of all layers. As long as you understand the basic ideas behind each layer, you should be fine in regards to the OSI model.
Two things in relation to OSI model. Know the physical layer well (the study design certainly emphasizes this). Also understand how the OSI model relates to the TCP/IP model.If terms of protocols, will SSL, HTTPS, FTP, POP3, IMAP, TCP, IP, SMTP suffice? Or is there others we need to know?
VCAA do not require you to have extensive knowledge of all layers. As long as you understand the basic ideas behind each layer, you should be fine in regards to the OSI model.
A little off-topic:
Are we required to have an extensive knowledge of all layers of the OSI Model? Also do we need to memorise the protocol stack in regards to TCP/IP and know the functions of each layer?
I'm not really confident in my knowledge for layer 1, I'll go into detail when I get home, but for now what would you guys classify as "extensive knowledge"?I'd say:
PROCEDURE Calc_Qty(Product_Recipes)
BEGIN
Open File
Ingredient_ID <-- 1
READ Num_Ingredients
REPEAT
Qty(Ingredient_ID) <-- 0
Ingredient_ID <-- Ingredient_ID + 1
UNTIL Ingredient_ID > Num_Ingredients
REPEAT
READ Product_ID, Num_Ord
Ingredient_ID <-- 1
REPEAT
Ingredient_ID <-- Ingredient_ID + 1
Amount_Req <-- Num_Ord * Product_Recipes(Product_ID,Ingredient_ID)
Qty(Ingredient_ID) <-- Qty(Ingredient_ID) + Amount_Req
UNTIL Ingredient_ID = Num_Ingredients
UNTIL End of File
Close Files
END
VARIABLE | |
Num_Ingredients | 3 |
Product ID | 1 |
Num Ordered | 10 |
Product_Recipes(1,1) | 0.15 |
Product_Recipes(2,1) | 0 |
Product_Recipes(3,1) | 0.20 |
The line: Amount_Req <-- Num_Ord * Product_Recipes(Product_ID, Ingredient_ID) is what is confusing me.
In theory the array structure is (1,2) for Product_Receipes. However in the test data we aren't given (1,2) as variable, instead we are given (2,1). Is this an error in the code or am i deskchecking this incorrectly. If i were to use the test data (2,1) i'd return this answer:
Ok... I've just gone over the 2011 VCAA exam again and question 9 in multiple choice still confuses me.Function:
What exactally is an instruction. As opposed to a function or procedure. The text book seems to have 7 lines on "Instructions and Syntax" all of which seem to have no bearing on why or how an instruction "modifies a variable's content". I'll check Mark Kelly's solutions again to see what he said, but I just hate the lack of explanation this text book contains here.
Edit: Mark only complains about VCCA at first publishing my answer A as correct when it is not. He gives no reason why though..
In a program, a line of code that modifies a variable's content is best described as a
A. function.
B. procedure.
C. instruction.
D. control structure.
Ah okay, I hope that question doesn't come up haha
So I would talk about the planning of software projects as more of a Design phase?
Hmm... I'm pretty sure planning comes under the design stage of PSM (page 5 of Adrian Janson's textbook) and encompass thing such as writing up all your pseudocdoe, creating data dictionaries, IPO charts and doing all that other design stuff where you work out how the system will function.
Question 1:What are the key tasks associated with the planning of software projects?is referring to this study design dot point: "key tasks associated with planning software projects, including identifying, scheduling and monitoring tasks, resources, people and time"