€¦  · web viewcomputing: software development - solutions. assessment. contributions towards...

47
Computing: Software Development - Solutions Assessment Contributions towards the study score U3O1 Programming practice SAC 10% U3O2 Analysis & Design SAT 15% U4O1 Software Solutions SAT 15% U4O2 Interactions & Impact SAC 10% Written examination 50% Written examination When & where Thursday 14 th November 2019 3:00pm to 5:15pm Reading Time: 15 minutes Writing Time: 120 minutes Location School should have notified you! Materials Bring Pens & pencils Highlighters & erasers Sharpeners & rulers Calculator – Scientific Watch Don’t Bring Whiteout Dictionary

Upload: others

Post on 04-Sep-2019

2 views

Category:

Documents


0 download

TRANSCRIPT

Computing: Software Development - Solutions

AssessmentContributions towards the study score

U3O1 Programming practice SAC 10%U3O2 Analysis & Design SAT 15%U4O1 Software Solutions SAT 15%U4O2 Interactions & Impact SAC 10%

Written examination 50%

Written examination

When & where

Thursday 14th November 20193:00pm to 5:15pm

Reading Time:15 minutes

Writing Time: 120 minutes

LocationSchool should have notified you!

Materials

BringPens & pencilsHighlighters & erasersSharpeners & rulersCalculator – Scientific Watch

Don’t BringWhiteoutDictionary

Structure

Three sections

Section A (20 marks)Multiple Choice Questions

Section B (20 marks)Short-answer questions

Section C – Case Study (60 marks)Short and extended-answer questions

Total marks = 100

Timing

120 minutes writing time/ 100 marks

1 mark = 1 minute 12 seconds2 marks = 2 min 24 sec3 marks = 3 min 36 secs4 marks = 4 min 48 sec

Keep an eye on the time!

Reading Time

15 minutes

Read every question carefully – Section A, B, C & Case StudyYou cannot mark the paper in anyway during this timeStart to develop a plan!!!Answer the questions you are confident with first!

Writing Time

You do not have to complete the questions in orderStart by answering the questions you feel the most comfortable withGood idea to start with the multiple choiceThis might help you remember parts of the course

Contents

The exam content will be based upon the study design

Key knowledge Key skills Glossary Problem-solving methodology

Key knowledge checklist

U3O1: Programming practiceDon’t know

Know a little

Know a lot

1 characteristics of data types

2 types of data structures, including one-dimensional arrays (single data type, integer index) and records (varying data types, field index)

3 methods of representing designs, including data dictionaries, object descriptions, mock-ups and pseudocode

4 formatting and structural characteristics of input and output, including XML file formats

5 a programming language as a method for developing working modules that meet specific needs

6 processing features of a programming language, including instructions, procedures, methods, functions and control structures

7 techniques for linear and binary searching

8 techniques for checking that modules meet design specifications, including trace tables and test data

9 purposes and characteristics of internal documentation, including comments and meaningful names.

U3O2: Analysis and design

Don’t know

Know a

little

Know a lot

1Project management concepts and processes, including milestones and dependencies (concepts), and task identification, sequencing, time allocation, resources and documentation using Gantt charts (processes)

2 Techniques for collecting data to determine needs and requirements, including interviews, surveys and observation

3Tools and techniques for depicting the interfaces between solutions, users and networks, including use case diagrams created using Unified Modelling Language

4 Features of context diagrams and data flow diagrams

5 Features of functional and non-functional requirements

6 Constraints that influence solutions, including economic, legal, social, technical and useability factors

7 Factors that determine the scope of solutions

8 Features and purposes of software requirements specifications

9 Techniques for generating design ideas

10 Criteria for evaluating alternative design ideas and the efficiency and effectiveness of solutions

11 Methods of expressing software designs using data dictionaries, object descriptions, mock-ups and pseudocode

12 Factors influencing the design of solutions, including useability, affordability, security, interoperability and marketability

13 Characteristics of user experiences, including efficient and effective user interfaces

14 Naming conventions for solution elements

15 Security considerations influencing the design of solutions, including data protection and authentication

16 Styles of modern application architecture, including mobile, rich client, peer-to-peer and internet applications

17 Types of goals and objectives of organisations and information systems

18 Key legal requirements relating to the ownership and privacy of data and information

U4O1: Software solutions

Don’t know

Know a

little

Know a lot

1 Ways in which file size, storage medium and organisation of files affect access of data.

2 Uses of data structures to organise and manipulate data, including associative arrays (or dictionaries or hash tables).

3 Procedures and techniques for handling and managing files, including security, archiving, backing up and disposing of files.

4 Processing features of a programming language, including instructions, procedures, methods, functions and control structures.

5Algorithms for sorting, including selection sort and quick sort and their suitability for a given purpose, measured in terms of algorithm complexity and sort time.

6 Characteristics of efficient and effective solutions.

7 Techniques for checking that coded solutions meet design specifications, including construction of test data.

8 Validation techniques, including existence checking, range checking and type checking.

9 Techniques for testing the useability of solutions and forms of documenting test results.

10 Techniques for recording the progress of projects, including annotations, adjustments to tasks and timeframes, and logs.

11 Factors that influence the effectiveness of project plans.

12 Strategies for evaluating the efficiency and effectiveness of solutions and project plans.

U4O2: Interactions and impact

Don’t know

Know a little

Know a lot

1 Characteristics of wired and wireless networks

2 Reasons why individuals and organisations use information systems

3 Goals and objectives of information systems

4 Types of interactions (inputs and outputs) generated by information systems

5 Key legislation that affects how organisations control the storage, communication and disposal of their data and information.

6 Characteristics of data that has integrity, including accuracy, timeliness, reasonableness, authenticity, correctness

7Types and causes of accidental, deliberate and events-based threats to the integrity and security of data and information shared between information systems

8 Physical and software controls used by organisations to secure the storage and communication of data in a networked environment

9 Role of hardware, software and technical protocols in managing, controlling and securing data shared between information systems

10 Advantages and disadvantages for stakeholders affected by the operation of information systems

11 The impact of diminished data integrity on dependent systems

12 Tools and techniques for tracing transactions between users of information systems.

13 Data management practices that cause conflict between information systems, including data mining

14 Technical underpinnings of intranets, the internet and virtual private networks

Multiple choice

You need a pencil – and an eraser!Answer questions on multiple choice answer sheetCircle the answer on the question booklet itselfThen colour in the answer sheet

You do not have to complete questions in orderStart with the questions you feel most comfortable withRead each question carefully a number of timesUnderstand what the question is asking?

Underline key words

QuestionA physical control used to prevent unauthorised access to data and information is

A. encryptionB. locks on doorsC. username and passwordD. system protection software

QuestionA procedure checks user input for reasonableness. This type of check is called

A. user acceptance testing.B. evaluation.C. validation.D. testing.

Complete the questions you canThen move onto Sections B & C

Remember to come back to these later!!!

Do not leave any of the multiple choice questions blankYou have a 25% chance of guessing the correct answer

Question 1Testing involves establishing tests and expected results.

At what stage of the problem-solving methodology does testing occur?

A. designB. analysisC. evaluationD. development

Question 2Trace tables are used to test algorithms.

Which of the following best describes the characteristics of a trace table?

A. multi-column, multi-row, shows each variableB. multi-column, multi-row, shows each variable and the result displayedC. multi-column, multi-row, shows actual result, gives evidence of the test workingD. multi-column, multi-row, shows expected result, shows actual result, gives evidence of the test working

Question 3XML describes a set of rules for

A. displaying words in a document.B. inserting pictures into a document.C. designing the layout of a web page.D. formatting data for transferring and storage.

Question 6The Privacy Act 1988 is best described as legislation that outlines how

A. individuals should use personal information.B. organisations should collect and use health records.C. organisations should collect and use personal information.D. organisations should collect and use copyright information.

Question 8Mobile application architecture involves

A. facilitating the streaming of media.B. writing software for wireless devices.C. eliminating dedicated backend servers.D. providing functionality independent of a server.

Question 9An example of an evaluation criterion that measures the efficiency of a software solution is that the software solution should

A. generate accurate output.B. have an intuitive and easy-to-use interface.C. produce the output within a practical time frame.D. produce output that does not require the user to source additional information or perform additionalcalculations.

Question 10Joe has downloaded some information from the internet for his school project. Part of his project is toprovide details of the integrity of his information.

This means Joe must check his information for characteristics including

A. accuracy, effectiveness, security and timeliness.B. accuracy, timeliness, reasonableness and security.C. accuracy, authenticity, timeliness and reasonableness.D. accuracy, authenticity, effectiveness and reasonableness.

Question 12The following numbers are to be sorted in ascending order.

14, 7, 69, 27, 15, 23, 11, 10

After the second pass, the numbers are in the following order.

7, 10, 69, 27, 15, 23, 11, 14

What type of algorithm was used to sort the array?

A. quick sortB. bubble sortC. binary sortD. selection sort

Question 13The following is an example of pseudocode.

WHILE X is not equal to 9Add 1 to X

END WHILE

The lines of pseudocode above are best described as a

A. control structure.B. procedure.C. function.D. method.

Short answer questions

Answer structure

Use the number of marks as a guide to the number of points needed

1 mark = 1 word or sentence2 marks = 2 points or sentences3 marks = 3 points or sentences4 marks = 4 points or sentences

Number of Lines

The number of lines gives an indication of how much to write - you can write more or lessYou can use blank spaceBetter answers tend to be concise

Handwriting

Write as neatly as possible, legible is good! Print if you must.Write with ink pen rather than pencilStart each point on a new lineUnderline key words in each sentence

Verbs = Doing Words

Identify the doing words in each question

Underline the verb or doing word

Question (1 mark)State one control structure used in programming.

Sequence.

Question (2 marks)Give one example of a physical security control. Explain its purpose.

Barrier techniques

Barrier techniques include using locks on doors which stop people from physically accessing the hardware where data is stored.

Question (2 marks)Explain the purpose of a software requirement specification (SRS).

An SRS is a complete description of what the solution will do, including the requirements, constraints and scope

The SRS is used as input to the design stage, and used as a guide when designing the solution. The SRS also forms the basis of evaluation to determine whether the final software version delivers on the SRS promises.

Question (3 marks)Aardvark Security requires a solution that will send an alert to a security officer if an alarm is activated. State which non-functional requirement will be most important – response rates or portability. All officers will be using issued the same device. Justify your answer.

Response rates

The alert needs to get to the officer in time for them to respond to the alarm.

Portability is not as important because each officer will be using the same device.

Question (4 marks)State two different types of constraints that will influence a software solution. Give an example of each constraint.

Economic

The requirements included in the solution may be limited depending on the amount of money available for the project

Usability

The input method used to enter data may affect how the software solution is designed.

Link to case study

Question (2 marks)Daniel needs to complete a backup medical records each day. He is trying to decide to back up the data locally or back up the data to the cloud.

Discuss why a local back up would be a better choice.

A local back up would be better because in the case of data loss they will need internet access to retrieve the backup from the cloud.

As the backup contains medical records it would be important that these records are restored quickly, and securely.

Question (4 marks)The following criteria are to be used to evaluate the most appropriate design:

• Criterion 1 – The PIMS solution will provide parking tickets in a form that is complete.• Criterion 2 – The PIMS solution user interface must be clear and easy to understand.

Which option – Option A or Option B – should Kirsten choose? Explain why

Option A

All the information can be entered on the one screen so it improves the chance that the data will be complete

Sections have been used to clearly identify the data required to improve understandability

Option B may use different screens so it is difficult to check for completeness but this is also unclear what data may be needed.

Steps/procedure/strategy

Question (3 marks)Suggest a strategy that she might use to evaluate the timeliness of the notifications being sent to the parking officers.

1. After one month2. Count the number of tickets issued3. Compare to the number of notifications sent

Question (3 marks)David backs up all his files to the cloud on a Friday night.

Recommend a procedure David could complete to check if the back-up is completed successfully.

1. Calculate the expected size of the backup2. Complete the backup3. Compare the actual size to the expected size

Question (3 marks)Recommend a strategy that could be used to assess the effectiveness of a project plan in managing a project.

1. Set a criterion based on effectiveness e.g. timeliness2. Collect data about the actual time taken for each task3. Use the data to evaluate if the criterion was achieved

U3O1: Programming practice

Data types

Data types include:

Boolean Integer Floating point Character String

Question (4 marks)An example of an animal’s weight is 56.5 kilograms.

Indicate the most appropriate data type for each field.

Chose from integer, floating point, string, character or Boolean

ACIS No String – as it contains a spaceWeight Floating point – example givenGender CharacterBreeding Defects Boolean – only two possible values

Data structuresA data structure is used to organise and store data

Array Record Associative array

Question (4 marks)Duc needs to store members name, age and phone number in a data structure. Indicate which option would be the most appropriate – an array, record or associative array. Justify your answer.

Record.

A record is a data structure that can store data of different data types so it will fulfil Duc’s requirements.

An array can only store data if the same data type.

While an associate array can only store two values that are related, not three.

Design tools

Data dictionary Object descriptors Mock-up diagram Pseudocode

Pseudocode

Question (1 mark)Identify the output of the following procedure

BEGINA ← 1REPEAT

A ← (A * A) + 1UNTIL A > 2PRINT A

END

OUTPUT: 5

Question (1 mark)Identify the output of the following procedure

BEGINA ← 4B ← 2REPEAT

A ← A + 1B ← B * 2

UNTIL B > APRINT A, B

END

OUTPUT: 6, 8

Question (6 marks)A procedure starts. It sets Variable A to 1 and Variable B to 2. A loop is started. Variable A is doubled andVariable B has 1 added to it. The loop continues until Variable A is bigger than or equal to Variable B. The procedure then stops.

Write this as pseudocode.*Answers will vary*BEGIN

A ← 1B ← 2WHILE A>B DO {

A ← A * 2B ← B + 1

}ENDWHILE

END

Question (3 marks)Complete the following algorithm so that, at its end, the variable largestAge contains the largest number in the 1-D array of integers, ages. The array contains 1000 elements and ages [ 0 ] is not used.*NOTE arrays usually begin with A[0] as the first element*BEGIN

largestAge ← 0FOR i ←1 to 1000

IFages[ i ] > largestAge THENlargestAge ← ages[ I ]

ENDIFENDFOR

END

Question (6 marks)A school stores its Year 12 students’ names and ages in two separate arrays – Names [ ] and Ages [ ].The position of the students’ names in Names [ ] is the same as the position of their ages in Ages [ ].

Write pseudocode to print the names and ages of all students who are 18 or over where the number ofstudents in Year 12 is stored in the variable NoOfStudents.

BEGINFOR position ← 1 to NoOfStudents

IF Age[position] => 18 THENPRINT Names[position]PRINT Ages[position]

ENDIFENDFOR

END

Question (3 marks)The algorithm below contains five lines, three of which are not shown. Length and Width are variables.Write the next three lines of the algorithm that is needed to swap the contents of Length and Width. You may introduce other variables as needed.

Length ← 5Width ← 7

Temp ← LengthLength ← WidthWidth ← Temp

Question (6 marks)After Election Day, the council needs to prepare a list of those who have not voted.

The voters’ electoral roll contains a number of fields, including Surname, GivenName, StreetAddress, Suburb, Postcode and Voted.

To do this, it is necessary to read each voter’s details from the Electoral Roll file and display the fields Surname, GivenName, StreetAddress, Suburb and Postcode for those who are recorded as false in the Voted field. Each record is read until the EndOfFile is reached.

Write pseudocode for a procedure to perform this process.

BEGINREPEAT

READ Surname, GivenName, StreetAddress, Suburb, Postcode, VotedIF (Voted = False) THEN

DISPLAY Surname, GivenName, StreetAddress, Suburb, PostcodeENDIF

UNTIL EndOfFileEND

Question 2 (3 marks)The algorithm below contains 12 lines, five of which are not shown.

Competition_Score stores the score each student received in a competition. Two types of certificates are to be printed for students based on their scores. The variable Certificate stores the type of award to be printed.

A high-distinction certificate is printed when a student gets a score between 95 and 100. A pass certificate is printed when a student gets a score between 50 and 94. No certificate is printed if the score is less than 50.

Complete the algorithm to ensure that it functions as expected.*answers may vary*BEGIN

IF Student in Student Details File THENIF Competition_Score >= 50 THEN

IF Competition_Score >= 95 THEN Award equals “High Distinction” ELSEIF Award equals “Pass”

ENDIFENDIFPRINT “Certificate” Award

ENDIFEND

XML filesXML files are used to organise and transport data between software solutions.

Designed to be easy to read by both people and software.

XML uses tags to give data structure and meaning

<title>Star Wars</title>

Each piece of data is known as an element

Question (3 marks)When a parking officer issues a parking ticket, the following record (in XML format) is sent from the mobile phone application to the council’s fines payments system.

</infringement><?xml version=”1.0” encoding=”UTF-8”?><infringement><reg_pl> </reg_pl><bay_num> </bay_num><park_off> </park_off><c_make> </c_make><c_model> </c_model><c_col> </c_col><reason> </reason><time> </time><date> </date></infringement>

List three fields that the mobile phone application will send to the fines payments system in the XML file.

reg_plbay_numpark_off

Question (2 marks)Explain an advantage of an XML file over a plain text file.

An XML file uses tags to organise the data, where a text file does not.

An advantage of an XML file is the structure of the data is transported along with the data between solutions.

Processing features

Instructions Procedures Functions Methods Control structures (sequence, selection and repetition)

Question (2 mark)Explain how a procedure differs from a function.

A procedure is a self-contained section of code that completes a task.

A function is a procedure that returns a value to another part of the program.

Question (2 mark)State two control structures used in algorithm.

BEGINFOR i ← 1 to 4

Input ScoreTotal ← Total + Score

NEXTAverage = Total / 4PRINT Average

END

SequenceRepetition

SearchesLinearSearches through the array one item at a timeData can be in any order

BinaryChecks the middle valueDivides the array in half until the value is foundData must be sorted first

Question (2 marks)Describe one advantage of both a linear and binary search.

A linear search can be used when the data is not already sorted.

A binary search is much faster compared to a linear search. ‘divide and conquer’ approach

Question (2 marks)What would be the effect on the number of records read (on average) if the total number of records increased from 32 000 to 64 000 (doubled) using

a linear searchThe number of records that are read will double.

a binary searchOn average it would read one more record

Internal documentationInternal documentation consists of comments that are made within the code.Internal documentation describes complex sections of code to helps programmers understand the logic

Question (1 mark)State in which stage of the problem-solving methodology is internal documentation completed.

Trace tables

Question (3 marks)Complete the trace table assuming that the test data input was 3, 5, 6, 4 and 78.

BEGINFOR i ← 1 to 5

Input ATotal ← Total + A

NEXTPRINT Total

END

Trace tableVariable Value Value Value Value Value

I 1 2 3 4 5

A 3 5 6 4 78

Total 3 8 14 18 96

U3O2: Analysis and design

Software requirement specification

Functional requirements Non-functional requirements Constraints Scope Use case diagram Data flow diagrams

Question (2 marks)State two functional requirements of the solution

Register car arrivalsPrint parking ticketAny other use case

Question (2 marks)Describe what will be contained within the scope of the solution

The scope outlines what requirements will be included in the solution.It will also outline what requirements will not be included.

Use case diagramRepresent the functional elements of a system and how the users of the system interact with the functions

Question (3 marks)The manager of a real estate agency is having new software developed. The software will maintain the information on the system as well as add and remove new rentals. All agents need to be able to add the details of new clients who take up a rental property. Everyone must login.

Complete the use case diagram to show the stated requirements.

Data flow diagrams

Question (4 marks)Sally continues her analysis by drawing a context diagram and she has started a data flowdiagram (DFD).

a. List the entities involved.2 marks

VotersCouncil

There are three processes:

• Process A – Allocate votes to candidates• Process B – Prepare reports for each candidate• Process C – Check voter eligibility and record votes

From these processes, select the correct two for the circles labelled 1 and 2 in the DFD diagram.

b. Write your answers in the circles. 2 marks

1 = C 2 = A

Alternative design ideas

Question (3 marks)Which option would you recommend? Justify your answer

Option A includes a graph showing the growth of the stock so it is quick to calculate.It also includes a map of the property so it is easy to remember the location of the cattle.Option B requires both the growth and location to be calculated by the user.

Efficient and effective user interfaces

Efficiency Effectivenessless time Accuracyless money Completenessless effort Readability

AccessibleAttractivenessRelevanceUsabilityClarity

Question (2 marks)Explain how a drop down list improves the efficiency and effectiveness of data entry.

improves efficiency as it will take less time to input the data compared to a text box. improves effectiveness as it is more likely that the data selected is accurate.

Naming conventions

Hungarian notation camel Case PascalCase Hump Case

e.g. txtFirstName

Question (2 marks)Describe two features of a naming convention used.

In Hungarian notation the first three letters represent the type of object The remaining letters represent the purpose of the object.

All others use longer meaningful names, rather than shortened code-like names Filenames are no longer restricted to 8 dot 3, so meaningful variable names assist understanding

for someone unfamiliar with the code.

Project management

• Gantt charts • milestones• dependencies• tasks• sequencing• time • resources• ‘critical path’

Question 1 (5 marks)Kirsten plans to set up the parking infringement monitoring system (PIMS). She decides thatbuying the dedicated computer for the council office and the bluetooth printer as well as settingthem up will take four days; writing, testing and debugging the software for the dedicated computerwill take 25 days; writing, testing and debugging the application for the mobile phones will take20 days; and testing the whole system and making sure it works will take seven days.

a. Complete the Gantt chart below to show how the four tasks could be completed within40 days.

4 marks

b. The task ‘test system’ cannot begin until both programming tasks are completed.Show how this situation is represented on the Gantt chart above.

1 mark

Application architecture

MobilePeer to peerRich clientInternet applications

Question (2 marks)Explain how a mobile application differs from a rich client application.

A mobile app completes most of the processing on a central server.A rich client app completes most of the processing on the users device.

U4O1: Software solutions

Access of data on files

Serial and random access Access speeds

Question (2 marks)Susan wishes to download an App for her Smart Phone. The file size of the App is 240MB and the average download speed of Susan’s internet connection is 16Mbps

Calculate the time required to downloaded the app.

240 MB / 16 Mbps240 MB x 8 = 1920 Mbps

1920/16 = 120 seconds = 2 minutes

Question (3 marks)Management of a Supermarket need to make a decision about whether they need to replace the current file server.

Their current server has a capacity of 250MB and they have 1000 different items of stock. Each stock record needs at 250KB storage space.

Recommend to the Supermarket if they should upgrade their file server. Use calculations to support your answer.

250 MB = 250 000 KB / 250 KB = 1 000 records on the server

They should get a new server immediately, as the server is operating at capacity. Before they can increase the number of stock items they will need more server storage space.

Sorting

Selection sortA selection sort works by identifying the smallest value in the arrayIt then moves the smallest value to the start of the array and then searches for the next smallest value

Quick sortFirst a value is selected as the pivotThen all items are sorted lower or higher than the pivot

Question (1 mark)The following numbers are to be sorted

14, 7, 69, 27, 15, 23, 11, 10

After the 2nd pass, the numbers are in the following order.

7, 10, 69, 27, 15, 23, 11, 14

What type of algorithm was used to sort the array?

ANSWER: Selection sort

Project progress

Three techniques can be used to record the progress of a project

Project log (diary) Annotations Amendments

Question (2 marks)Identify two techniques that could be used to record the progress of a project.

Project log (diary) with annotations Change log with detailed amendments

Evaluation

Does the working solution meet the requirements stated in the analysis stage?

An evaluation strategy includes

Criteria A timeline Data needed How the data will be collected?

Question (3 marks)Dan needs to evaluate if his online solution is easy to use.

Outline a strategy that can be used.

1. One month after the solution is released2. Collect opinions about the usability of the solution3. An online survey to collect the data

U4O2: Interactions and impact

Goals and objectives

GoalsGoals are general aimsProvide timely information

ObjectivesObjectives are specific and measureableProvide information in within 60 seconds of a request

Question (2 marks)Below are two aims of a new solution

The new internet application will increase profit The new internet application will increase sales by 10%

State which aim is an information system objective. Give a reason for your answer.

The new internet application will increase sales by 10%Objectives are specific and measurable and normally contain numbers or percentages

Data integrity

Refers to the quality of the data used within a software solution

Accuracy Timeliness Reasonableness Authenticity Correctness

Question (2 marks)Anita has created an app where members of the public will submit reviews about the surf conditions at beaches around Australia.

Discuss two factors that may affect the integrity of the data submitted.

1. TimelinessBy the time a review is submitted the conditions may have changed

2. AuthenticityIt is possible that some reviews may be made up

Key legislation

Laws in Australia set by the government that organisations have to follow including:

Privacy Act 1988 Privacy & Data Protection Act 2014 Health Records Act 2001 Copyright Act 1968 Charter of Human Rights 2006 Spam Act 2003

Question (2 marks)Name a key piece of legislation that affects how organisations communicate their data and information, and provide a specific example of how an organisation can fulfil this requirement.

Privacy Act 1988When data is communicated it can be encrypted to keep the data secure.

Data mining

Examining existing large data sets (that where collected for one purpose) to identify any unexpected patterns and relationships within the data (and using this for another purpose).

Question (2 marks)Describe two issues caused by data mining.

Data mining may result in the privacy of individuals to be breached and this may upset some people.

When searching through existing data sets this may slow down the performance of an information system frustrating users

Dependent systems

Many information systems get data from other information systems. Problems occur if the data acquired from other systems lacks integrity.

Different systems may have different data types and data structures which causes problems when data is transferred between systems.

Question (2 marks)Below are outputs from two systems of the same data at the same time.

Give a reason why the information provided differs

The two systems have used different data types to display the information.This has resulted in different outputs being produced.

Threats to data

Accidental Deliberate Event-basedUser error Malware FirePower outage Hackers Lighting strikeHardware failure Data theft Power surge

Security controls

Software PhysicalUsername & password Barrier techniques (locks)Encryption Biometric securityFirewall BackupsSystems protection Shred documentsAccess restrictions Power surge protector

Question (2 marks)Outline a security control used to reduce the chance of a power surge caused by lightning strike.

Power surge protector.A power surge protector will protect hardware from being damaged in the case of a power surge occurring.