1.
Hannah has stored a list of sports within the following one-dimensional array.
The number of comparisons required to find the item ‘kayaking’ using a linear search is
Correct Answer
C. 6
Explanation
The correct answer is 6 because in a linear search, each element of the array is compared with the target element until a match is found or the end of the array is reached. In this case, Hannah would need to compare "kayaking" with each of the 6 elements in the array before finding a match.
2.
Which one of the following is an advantage of a wireless network over a wired network?
Correct Answer
B. Less expensive set-up costs
Explanation
A wireless network has the advantage of less expensive set-up costs compared to a wired network. This is because setting up a wired network requires the installation of physical cables, which can be costly and time-consuming. On the other hand, a wireless network only requires the installation of wireless access points, which are generally more affordable and easier to set up. This makes wireless networks a more cost-effective option, particularly for small businesses or individuals who may not have the resources or infrastructure for a wired network installation.
3.
Which trace table is representative of the algorithm above immediately after the loop is executed for the second time?
Correct Answer
D. Option 4
Explanation
Many students selected the option that displayed the output at
the end of the second loop. However, the algorithm provided
only outputs the result of the total once all the values in the
array have been added.
4.
When analysing a new software solution, the developers identified the following non-functional requirement: ‘All users of the solution will be using their own mobile device.’ To which characteristic is the non-functional requirement related?
Correct Answer
B. Portability
Explanation
The non-functional requirement "All users of the solution will be using their own mobile device" is related to the characteristic of portability. Portability refers to the ability of a software solution to be easily moved or adapted to different environments or platforms. In this case, the requirement indicates that the solution should be able to run on different mobile devices, suggesting that it needs to be portable across various platforms and operating systems.
5.
Saritha researched the different methods used to calculate whether an individual is within a healthy weight range. She chose to use the body mass index (BMI) method. Instead of entering values into a spreadsheet to calculate an individual’s BMI, she used her programming skills to write an application for mobile phones.
Shown below is the user interface for the application that Saritha developed. It shows the BMI displayed when Jim, one of her classmates, entered his details into the application.
The values for height and weight to calculate BMI need to be of which data types?
Correct Answer
D. Floating point and floating point
Explanation
The values for height and weight need to be of floating point data types because BMI calculations involve decimal numbers. Using integer data types would result in inaccurate calculations and potentially incorrect BMI values.
6.
Which one do you like?
Correct Answer
A. Quick sort
Explanation
Quick sort is likely the correct answer because it is a popular and efficient sorting algorithm. It works by selecting a pivot element, partitioning the array into two sub-arrays based on the pivot, and then recursively sorting the sub-arrays. Quick sort has an average time complexity of O(n log n), making it faster than bubble sort, linear search, and selection sort in most cases.
7.
Which structural characteristic makes XML files distinguishable from other types of files?
Correct Answer
D. The inclusion of a header, prolog or declaration statement
Explanation
XML files are distinguishable from other types of files by the inclusion of a header, prolog, or declaration statement. This statement typically appears at the beginning of an XML file and provides information about the version of XML being used, as well as any character encoding or other specifications. This characteristic helps identify XML files and differentiate them from other file types that do not have this specific structure.
8.
Which one do you like?
Correct Answer
D. Add a menu item that allows a user to access any section from any other section in the application.
Explanation
The correct answer is to add a menu item that allows a user to access any section from any other section in the application. This is because it improves the overall usability and navigation of the application by providing a convenient and efficient way for users to move between different sections. It enhances the user experience by reducing the need to backtrack or go through multiple screens to access a specific section.
9.
To function, the vast range of services that operate over the internet requires a library of technical and communication standards.
The term for these technical and communication standards is
Correct Answer
D. Protocols.
Explanation
The question asks for the term that refers to the technical and communication standards required for the functioning of various internet services. The correct answer is "protocols." Protocols are a set of rules and guidelines that enable different devices and systems to communicate and interact with each other over the internet. They define how data is transmitted, received, and processed, ensuring seamless communication between different services and devices. HTML, malware, and monitors are not specifically related to the technical and communication standards required for internet services, making them incorrect choices.
10.
Use the following information to answer Questions 10 and 11.
Courtney is designing a new GPS-based traffic monitoring application for smartphones. As part of the design process, she has decided to generate some evaluation criteria and develop an evaluation strategy.
Which one of the following is a criterion that Courtney could use to evaluate the efficiency of the GPS application?
Correct Answer
D. The application will generate and display directions within 10 seconds of the request from the user.
Explanation
Courtney can use the criterion of generating and displaying directions within 10 seconds of the user's request to evaluate the efficiency of the GPS application. This criterion assesses the speed and responsiveness of the application in providing directions, which is an important aspect of efficiency for a GPS-based traffic monitoring application.
11.
Courtney is researching how to develop an evaluation strategy for her new software solution. Key things that she should consider as she develops an evaluation strategy include
Correct Answer
D. Software solution evaluation criteria, how the criteria will be measured, appropriate timeframe for evaluation to occur and who will be involved in the evaluation process.
Explanation
Student responses varied considerably for this question.
Evaluation strategies typically would not contain solution
designs, testing approaches, use case diagrams or adjustments
to project plans. Evaluation strategies typically contain criteria,
how the criteria will be measured, when the evaluation will
occur and who will be involved.
12.
A programmer has been asked to improve the processing speed of a software solution. The solution reads data from a text file stored on a USB hard drive into RAM.
Why is reading the data from RAM more efficient than reading the data from the file stored on the USB hard drive?
Correct Answer
B. RAM has faster read/write speeds than USB hard drives.
Explanation
Reading data from RAM is more efficient than reading data from a file stored on a USB hard drive because RAM has faster read/write speeds compared to USB hard drives. RAM allows for quicker access to data, reducing the time it takes for the software solution to process the data. USB hard drives, on the other hand, have slower read/write speeds, which can result in slower data retrieval and processing times.
13.
Each member of an organisation needs a username and password to be able to access the organisation’s local area network (LAN). Each member is allocated a unique username but they can each choose their own password.
An appropriate data structure to store the username and password for each member of the organisation is
Correct Answer
C. An associative array
Explanation
An associative array is the most appropriate data structure to store the username and password for each member of the organization. This is because an associative array allows for a key-value pair relationship, where the username can serve as the key and the password as the corresponding value. This allows for easy retrieval and storage of the username-password pairs for each member.
14.
What is the output generated by the pseudocode?
Correct Answer
A. 6,15
Explanation
Many students did not trace the variables through the algorithm
correctly when answering this question, seemingly missing the
second increment of the x-variable.
15.
Which control structure starts on line 4 and finishes on line 6?
Correct Answer
C. Selection
Explanation
Student responses varied considerably between the three main
processing features of a programming language. Given that the
algorithm’s ‘if’ statement is on line 4 and the corresponding ‘end
if’ is on line 6, Option C. is the only possible answer
16.
Use the following information to answer Questions 16 and 17.
A social media platform tracks all user interactions on the platform. This includes user posts, mouse clicks, image and video views, and messages exchanged between users. This data is used to deliver targeted advertising to users and it is summarised to make changes to the platform.
For the social media platform, the data used to deliver targeted advertising is considered to be
Correct Answer
A. An input to the advertising module.
Explanation
The given correct answer is "an input to the advertising module." This means that the data used to deliver targeted advertising on the social media platform is considered as an input to the advertising module. This implies that the advertising module relies on this data to determine which ads to show to users based on their interactions on the platform.
17.
For the social media platform, tracking user interactions and summarising the data to make changes to the platform is an example of
Correct Answer
A. Data mining.
Explanation
Tracking user interactions and summarizing the data to make changes to the platform is an example of data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed decisions and improvements. In this case, the platform is using the data collected from user interactions to gain valuable insights and make changes that enhance the user experience or optimize the platform's performance.
18.
After repeated downtime events, the network administrators of a large supermarket chain have contracted a network security analyst to identify the cause of the downtime events. The analyst starts the investigation by implementing a network monitoring tool that will record network traffic and interactions between users on the network.
What is this approach commonly known as?
Correct Answer
C. Auditing network logs
Explanation
The approach commonly known as auditing network logs involves analyzing and reviewing the recorded network traffic and interactions between users on the network. This process helps identify any anomalies or suspicious activities that may be causing the downtime events. By examining the network logs, the network security analyst can gain insights into the root cause of the downtime events and take appropriate measures to prevent them in the future.
19.
The progress of this project has been recorded using
Correct Answer
A. Annotations and adjustments.
Explanation
The progress of the project has been recorded using annotations and adjustments. This suggests that the project's progress has been documented by making notes and making necessary changes or modifications as needed. Annotations and adjustments provide a way to track the project's development and ensure that any necessary revisions are made to improve its outcome. This method allows for a dynamic approach to monitoring progress and making necessary modifications along the way.
20.
Dependencies are indicated
Correct Answer
A. Using arrows
Explanation
The correct answer is using arrows because arrows are commonly used to indicate dependencies between tasks in project management. By using arrows, it becomes clear which tasks are dependent on others and in what sequence they need to be completed. This helps in planning and scheduling the project effectively, ensuring that tasks are executed in the correct order to avoid delays or issues.
21.
In a Gantt chart, the completion of hardware installation is often a milestone in a project.
A milestone shows that
Correct Answer
B. A major point in a project has been reached.
Explanation
A milestone in a Gantt chart represents a significant point in a project that has been reached. It indicates the completion of a major task or achievement that marks progress in the project. It does not necessarily imply a delay, a dependency, or the need for another task to be completed before further work can happen. Instead, it signifies a significant milestone or accomplishment in the project's timeline.
22.
Which one of the following is an example of a non-functional requirement for an online ordering system?
Correct Answer
C. Online ordering must be available 24 hours a day, seven days a week.
Explanation
Many students selected use case diagrams to be
drawn as an example of a non-functional
requirement. However, a non-functional
requirement describes the attributes the solution
should possess. Option C, which states that
online ordering must be available 24 hours a day,
seven days a week, does this.
23.
Storing client data only on an external hard disk drive at the end of the financial year is a form of
Correct Answer
C. Archiving data for future use.
Explanation
Storing client data only on an external hard disk drive at the end of the financial year is considered archiving data for future use. Archiving involves preserving data in a secure and accessible manner for long-term storage and potential retrieval. By storing the client data on an external hard disk drive, it ensures that the information is safely retained and can be accessed when needed in the future. This practice helps in maintaining historical records and complying with legal or regulatory requirements.
24.
Jack is writing a software solution that will produce an invoice. The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item.
This processing feature is referred to as
Correct Answer
B. A function.
Explanation
The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item. This indicates that the processing feature is a specific block of code that performs a specific task, which aligns with the definition of a function in programming. A function is a self-contained block of code that can be called and executed whenever needed, making it the most appropriate choice for this scenario.
25.
How many times is the loop executed?
Correct Answer
B. Five times
Explanation
The loop is executed five times because the given answer states "five times".
26.
Use the following information to answer Questions 26 and 27.
The pseudocode below will take the current values in the array and then write the new values into the array.
Begin
Array[] = [3, 5, 0, 0, 0] //Initialise the array, index starts at 1
A = Array[1]
B = Array[2]
While B < 3 * A
C = A * B
A = A - 1
B = B + 2
EndWhile //Write new values into the array
Array[1] = A
Array[2] = B
Array[3] = C
End
Which array has the correct values after the pseudocode has been executed?
Correct Answer
D. Array = [2, 7, 15, 0, 0]
Explanation
The pseudocode initializes the array with the values [3, 5, 0, 0, 0]. It then assigns A as the value at index 1 of the array (which is 3) and B as the value at index 2 of the array (which is 5). The while loop runs as long as B is less than 3 times A. In each iteration of the loop, C is assigned the value of A multiplied by B, A is decremented by 1, and B is incremented by 2. After the loop ends, the new values of A, B, and C are written back into the array at their respective indices. Therefore, the correct array after the pseudocode is executed is [2, 7, 15, 0, 0].
27.
Which control structure is used in the pseudocode?
Correct Answer
A. Iteration
Explanation
The correct answer is "iteration" because iteration is a control structure that allows a set of instructions to be repeated multiple times based on a certain condition. It is commonly used in programming to execute a block of code repeatedly until a specific condition is met. In the context of pseudocode, iteration is used to represent loops or repetitive actions in an algorithm or program.
28.
Huy is writing a software solution to support administrative staff in a school. The software solution must store details about each student in the school.
The most appropriate data structure to store a student’s first name, last name, date of birth, home address and telephone number is
Correct Answer
C. A record.
Explanation
A record is the most appropriate data structure to store a student's first name, last name, date of birth, home address, and telephone number. A record allows for the grouping of related data fields into a single entity, making it easier to manage and access the student's information. It provides a structured way to store and retrieve the different attributes of a student, ensuring that the data is organized and can be easily accessed when needed. A record also allows for efficient searching and sorting of the student's information based on different criteria.
29.
A local IT business has installed a home network for Maria. Maria asked the technician if she needed to set up encryption on the wi-fi router or whether the firewall would offer enough protection.
Which one of the following would be the most appropriate response from the technician?
Correct Answer
D. Encryption protects the data traffic in the home network by making it unreadable to unauthorised scanning. The firewall mainly protects the network by scanning incoming packets, so it would be advisable to have both.
Explanation
The technician explains that encryption is necessary to protect the data traffic in the home network by making it unreadable to unauthorized scanning. On the other hand, the firewall primarily protects the network by scanning incoming packets. Therefore, it is advisable to have both encryption and a firewall to ensure comprehensive protection for the home network.
30.
Use the following information to answer Questions 30 and 31.
Frankie copies his completed programming folio from a school computer’s hard drive onto a USB flash drive. Two days later, Frankie returns to the computer only to find that his folio has been deleted from the hard drive.
Which procedure for managing files was Frankie following?
Correct Answer
A. Backup
Explanation
Frankie was following the procedure of backup. Backup refers to creating copies of files or data in order to protect against loss or damage. In this case, Frankie copied his programming folio from the computer's hard drive onto a USB flash drive, which serves as a backup copy. This allows Frankie to have a duplicate of his folio in case the original files are lost or deleted from the hard drive.
31.
Frankie’s teacher reminds him that his folio is to be submitted that day.
Which is the most appropriate way for Frankie to submit his folio?
Correct Answer
C. Copy his files onto another USB flash drive and submit that USB flash drive.
32.
Sophia works at a gym that operates for 24 hours a day, seven days a week. Each gym member is given an identification (ID) number that is used to unlock the gym door between 9 pm and 6 am. Sophia has designed an algorithm that can check each ID against a list of valid numbers.
Which one of the following validation techniques has Sophia used?
Correct Answer
C. Range check
Explanation
Many students selected existence check as the
validation check. Existence checks are used to
see if data is entered, not if data exists in a list.
Option C, range check, is the validation
technique used to check against a list of valid ID
numbers.
33.
In an attempt to help not-for-profit organisations clarify their obligations with regard to privacy legislation, the Australian Government has provided a range of scenarios on its website.
Which one of the following organisations would be exempt from the Australian Privacy Principles?
Correct Answer
A. Organisation A earns $120 000 in revenue and collects the names and addresses of team participants for a local fun run.
Explanation
Option A is the only answer that satisfies the
collection of solicited personal information. The
personal information collected is used for, or is
directly related to, the organisation’s activities.
34.
A new software solution is being created for handheld devices. The requirements of the solution include that it be easy to use, must be able to work offline, but can occasionally connect for updates, and that any data required is stored on the device.
Which type of modern application architecture would be the most appropriate?
Correct Answer
A. Mobile applications
Explanation
A mobile application architecture would be the most appropriate for this scenario because it is specifically designed for handheld devices. Mobile applications are developed to be user-friendly, can work offline, and can connect to the internet for updates. Additionally, mobile applications store data on the device, which aligns with the requirement mentioned in the question.
35.
Maddie is setting up a file of records that need to be shared with a range of people with different operating systems and applications. Jono has suggested that she consider setting it up as an XML file. What is the key reason why Jono has suggested that an XML file should be considered?
Correct Answer
B. It provides a common structure for sharing data between applications.
Explanation
Jono has suggested using an XML file because it provides a common structure for sharing data between applications. XML allows for standardized formatting and organization of data, making it easier for different operating systems and applications to interpret and use the information. This ensures that the data can be easily shared and accessed by a range of people with different systems and applications, promoting interoperability and efficiency.
36.
How many comparisons need to occur to find the name ‘Vinnie’ in the array?
Correct Answer
B. 4
Explanation
To find the name 'Vinnie' in the array, a total of 4 comparisons need to occur. This means that the algorithm will compare 'Vinnie' with 4 other names in the array before finding a match.
37.
Pierre has almost finished the development of a software solution for a client and has undertaken a range of tests. He knows he must also conduct usability testing.
Which one of the following statements best outlines usability testing?
Correct Answer
C. Plan a set of tests for users to perform prior to implementation of the software solution, record the results and make any necessary modifications to the software solution after the tests.
Explanation
Usability testing involves planning a set of tests for users to perform before implementing the software solution. The results of these tests are recorded, and any necessary modifications to the software solution are made based on the feedback received from the users. This process ensures that the software solution is user-friendly and meets the needs and expectations of the users.
38.
A large computer game development company has developed a number of apps. It stores data about users of these apps in a number of databases. The company regularly reviews this data to identify patterns and to make decisions about the next game to develop or what advertising to promote in the apps.
This practice is referred to as
Correct Answer
A. Data mining.
Explanation
The practice described in the question involves reviewing data about users of apps in order to identify patterns and make decisions about game development and advertising. This process is commonly known as data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used for decision-making purposes. In this case, the company is using data mining to inform their decisions about game development and advertising strategies based on the patterns they identify in the data about their app users.
39.
Aditya has a blog that helps gamers with hacks. The blog has over a thousand subscribers. Each subscriber provides general contact details, including email addresses, when they subscribe. Aditya has had a marketing company contact him and request access to his database. The marketing company will identify the interests of the subscribers and provide targeted advertisements that Aditya can add to his emails. He agrees and will be paid for the service.
Aditya has been emailing his subscribers once a week and now includes the targeted advertising. Some of his subscribers have started to complain; one even suggested that Aditya was breaking the law.
Which legislation is Aditya’s subscriber referring to when suggesting that Aditya was breaking the law?
Correct Answer
B. Privacy Act 1988
Explanation
Many students selected the Spam Act, however,
as the organisation shared private data it may be
breaching the Privacy Act.
40.
One method of representing a software design is using a data dictionary, which
Correct Answer
C. Defines each data element, including name, description, type and format.
Explanation
A data dictionary is a method of representing a software design that defines each data element used in the software solution. It includes important information such as the name, description, type, and format of each data element. This allows developers and other stakeholders to have a clear understanding of the data being used in the software solution, ensuring consistency and accuracy in its implementation.
41.
A program stores the following data in memory:
“Johan”, “Symonds”, 25, 3.24, FALSE
The most appropriate data structure to store it is
Correct Answer
C. ​​​​​​​a record.
Explanation
A record holds data of different data types.
42.
Daniel created a new screen for an existing application. Which of the following would allow him to evaluate his solution?
Correct Answer
C. Checking the error logs of the new solution.
Explanation
Error logs provide valuable data for evaluation.
43.
Kerri wrote the following statement: All calculations must be 100% correct.
This is an example of
Correct Answer
B. An evaluation criterion.
Explanation
This is a statement that can be evaluated.
44.
Which of the following statements is correct regarding Use Case Diagrams?
Correct Answer
D. An “includes” Use Case must always be performed when the base case is.
Explanation
Definition.
45.
Which of the following statements best describes a Waterfall development model?
Correct Answer
A. Each stage must be fully completed before continuing to the next stage.
Explanation
In a waterfall development model, you do not go back to a previous stage.
46.
Which of the following statements is true regarding the critical path?
Correct Answer
B. Any task whose delay will delay the overall project is on the critical path.
Explanation
Definition.
47.
The purpose of a Use Case Diagram is to show the relationship between
Correct Answer
D. Users and system processes.
Explanation
The UCD is designed to show how users interact with the system.
48.
A developer has been asked to complete a Software Requirements Specification for a new mobile banking application. Which of these should be included in the SRS?
Correct Answer
B. Non-functional requirements for the new system.
Explanation
C and D part of development.
49.
Many businesses provide a safe and secure way for more people to access work network systems from home.
This secure connection is called
Correct Answer
A. A virtual private network.
Explanation
The internet is usually the pathway through which a VPN would operate, and the VPN allows access to an intranet.
However, it is the VPN which creates the secure connection.
50.
Simone is writing a software solution that summarises the daily sales for a food truck store. She must read through the sales file one line at a time.
The most appropriate control structure for this process would be
Correct Answer
A. An iteration.
Explanation
Iteration allows looping through code, in this case reading one line from the file at a time.