Upload
ngokhanh
View
234
Download
2
Embed Size (px)
Citation preview
1
Briefing Session on
2013 HKDSE ICT Exam
22/23 ov 2013
Breakdown of elective
No. of candidates No. of schools
1
2A
2B
2C
2D
2
Options offered
No. of options No. of schools
1
2
3
4
3
Popularity
Combination No. of schools
C
D
A
CD
4
Interesting Figures (1)
Paper Max Mark
1 92
2A 54
2B 49
2C 48
2D 55
5
Interesting Figures (2)
Selection of Prog Lang (2D)
Total %
Pascal 796 69.1
C 286 24.8
Visual Basic 45 3.9
Java 25 2.2
1,152 100
6
7
Performance Compulsory Part
Average no. of MC items correct = 2
High correlation with Paper 2s and SBA
8
Performance Elective Part
Equating performance of candidates (Elective Part) can be reflected on the
same scale (Equipercentile method )
Performance (Paper 1) of students in
2D > 2A > 2B > 2C
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)
9
Grading Procedures
Sample script selection
Standardisation
Post-marking exercise
Panel of judges grading meeting
Internal meeting
Public Exam Board meeting
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)
ICT
Level %
5**
5*+
5+
4+ 2
3+
2+
1+
10
11
Levels attained
HKDSE Level 4 comparable to
HKAL Grade D
L5** Top 10% of L5
L5*+ Top 40% of L5 (L5* = next 30%)
12
SBA
13
SBA Reminders
Students have to
complete their reports on their own
acknowledge sources properly in their work
to avoid plagiarism
New measures: Prevention & handling
of Malpractice
14
ICT Exemplars
Exemplars with annotated notes
P1B 1 exemplar @ Level @ language
P2 selected levels
Uploaded to www.hkeaa.edu.hk
http://www.hkeaa.edu.hk/
Assessing Student Learning
for the ICT Curriculum
Briefing Session on 2013
HKDSE ICT Examination
[ 1B & 2B ]
Paper 1B Qu 1 ~ (a) (i)
John connects the printer to the network at P instead of Q. What is the advantage
and disadvantage of this? Adv : easy to control
Disadv : can be used only when the
desktop computer is on
Student Performance : OK
Paper 1B Qu 1 ~ (a) (ii) The printer is equipped with RAM and
ROM. When John prints a document, what will the RAM and ROM store?
Student Performance : RAM: print data
ROM: printers firmware
OK, some not know printer has RAM and ROM, and their functions
Reflection for T&L: RAM & ROM are generic main storage, not
only for computer
Paper 1B Qu 1 ~ (b) (i) Suggest two possible ways to link up the
desktop computer and the smartphone.
Student Performance : Good
WiFi network
Bluetooth
USB cable
Paper 1B Qu 1 ~ (b) (ii) X and Z are two different cables. What is
the major difference in functional characteristic between them?
Student Performance : data transfer rate
Max. length cable segment
Not good, some talk about analog and digital signal
Reflection for T&L: Teach student what is the meaning of
functional characteristics
Paper 1B Qu 1 ~ (c)
The rear part of the router is shown in the diagram below. Mark X and Y on the diagram to indicate where the cables X and Y should be
connected.
X LAN
Y WAN
Paper 1B Qu 1 ~ (d)
Someone suggests that John build a Domain Name System (DNS) to improve his network
services. John disagrees with this suggestion.
(i) What network service does a DNS mainly provide?
(ii) Do you agree with Johns view? Explain briefly.
(i) DNS resolves domain names into IP
(ii) He does not need DNS because it is just a LAN
Student Performance :Good
Paper 1B Qu 2 ~ (a)
Janice is planning the annual Charity Run for her school. She uses graphics software to create
a map with the route of the Charity Run and
posts it on the schools web site. Janice decides to store the map as MAP.JPG instead
of MAP.BMP. Give one benefit of her decision.
smaller file size/ supported by many browsers
Student Performance :Good
Paper 1B Qu 2 ~ (b)
Janice finds that the email client program classifies Alans email as spam. What does she
Suggest two protocols for receiving email that Janice may use
POP3, IMAP
need to do to prevent this happening again? Add his email address in non-spam list
Janice tries to reply to all the email accounts involved
Student Performance :Good Alan and Betty
Paper 1B Qu 2 ~ (c)
The notebook computer is equipped with a solid-state drive (SSD) instead of a general hard disk.
Give two benefits to Janice of using a SSD.
higher data transfer rate. consumes less electricity. smaller in size. better shock resistance. Lighter more durable.
Student Performance : Good
Paper 1B Qu 2 ~ (c) Janice uploads the videos and pictures to the
schools web site and the web site includes a statement All rights reserved. If the statement were removed, would the school own the
copyright of the web site? Explain briefly.
Yes, copyright ownership does not
require any registration or declaration.
Paper 1B Qu 2 ~ (d) (i) To promote the Charity Run, Janice writes an
article in the school newsletter and inserts the following code for linking to the schools web site. Give one advantage of using this code over a bar code.
Student Performance :
store more data. a higher error correction capability. can be scanned in different orientation. be
made up of more types of data
OK, but some show no experience in it
Reflection for T&L: More actual demo to student
Paper 1B Qu 2 ~ (d) (ii) What is the benefit of using this code in the
school newsletter?
faster to input the URL reduce typing errors
Student Performance : OK, but some of the answer are too simple (e.g.
convenience)
Reflection for T&L: More concrete answer, higher level questioning at
lessons
Paper 1B Qu 2 ~ (d) (iii) Describe another kind of use of this code.
phone number / product information.
Student Performance : Good
Paper 1B Qu 3
Amy, Billy and Charles work in different offices in a company. Read their conversation about using computers and answer the questions below.
Amy: Charles, your office does not have a good ergonomic environment.
Billy: Charles, you have installed a Bit Torrent (BT) program on your computer. You should delete it.
Charles: No, I will still keep the BT program and use it.
Amy: Charles, we installed the same anti-virus software at the same time but only your computer is infected.
Paper 1B Qu 3 ~ (a) Give two possible features of the setup of
Charles office that could easily lead to eye strain when using the computer.
improper viewing angle of the monitor /
improper height of the monitor /
distance from the monitor to his eyes too close /
insufficient light /
close to the window without curtain
Student Performance : Good, but some state features not related to
set-up, or not related to eye strain
Reflection for T&L: Care about EVERY word in the question
Paper 1B Qu 3 ~ (b) Billy and Charles have different views on the use
of the BT program.
(i) Give a reason to support Billys recommendation.
(ii) Give a reason to support Charles decision.
(i) Charles would download some software that the sources come
from unidentified individual users; the software might be privacy
copies.
(ii) Charles can share working files with other colleagues efficiently.
Student Performance :OK, but some student think BT is fast / illegal / virus
Reflection for T&L: Clear general misconception of their usual experience
Paper 1B Qu 3 ~ (c) Why is only Charles computer infected?
Give two possible reasons.
Student Performance :
infected with new computer virus deactivates his anti-virus software. does not regularly update the definition
database of the anti-virus software.
Good, but some state their Anti-virus software are different
Reflection for T&L: Care about EVERY word in the question
Paper 1B Qu 3
Charles: The operating system of my computer uses Unicode instead of Big-5 code and GB code.
Billy: Unicode only includes around 20,000 Chinese characters.
Amy: Not any more. As of September 2012, Unicode includes more than 110,000 characters.
Paper 1B Qu 3 ~ (d) (ii) Referring to Amys comment, do the 110,000
characters include traditional and simplified
Chinese characters only? Explain briefly.
Other than the Chinese characters, there are characters
of other languages
Student Performance : Good, but some mentioned the following only
Number Character English character
Reflection for T&L: State more related examples
Paper 1B Qu 3 ~ (d) (i) To represent a set of 20,000 characters
using binary code, what is the minimum
number of bits required? Show your
calculation. 214 < 20,000 < 215
15 bits are needed.
Student Performance : Good
Paper 1B Qu 3 ~ (d) (ii) Referring to Amys comment, do the 110,000
characters include traditional and simplified
Chinese characters only? Explain briefly.
Other than the Chinese characters, there are characters
of other languages
Student Performance : Good, but some mentioned the following only
Number Character English character
Reflection for T&L: State more related examples
Paper 1B Qu 3
Amy, Billy and Charles go to a public library and want to use workstations.
Amy: There is an empty seat but the workstation has not been logged out.
Charles: The email account has not been logged out. There is a coupon attached to the email. Let me print it
so we can use it.
Billy: The security of the workstations is very low. Secure Sockets Layer (SSL) should be used.
Paper 1B Qu 3 ~ (e) (i) Describe two illegal offences that Charles would
do if he accessed the email and printed the
coupon. He accesses the email account without authorization. He steals the coupon.
Student Performance : Good, especially in THEFT offences. But some
mentioned privacy instead of illegal access
Reflection for T&L: A good example to show illegal access vs privacy
Paper 1B Qu 3 ~ (e) (ii) Can SSL prevent Charles from accessing
the email account mentioned above? Explain briefly.
Student Performance :
No, SSL is used to secure the data
transmission. (encryption)
Good, except some only mentioned more secure, which is not acceptable
Reflection for T&L: Dont simply repeat wordings in the question
Paper 1B Qu 4 Sarah is a librarian in a secondary school.
She uses a table in a database, LOAN, to
store the book circulation records.
Paper 1B Qu 4 ~ (a) Suggest a primary key for LOAN.
Suggest a validation check on each of the following fields.
Student Performance : Good, except some not using question example for
answer reference
Reflection for T&L: Give explanation with reference to question scenario
Paper 1B Qu 4 ~ (b) Sarah executes a SQL command on
LOAN with four records, as shown below. SELECT STUID, COUNT(*) FROM LOAN GROUP BY
STUID
Student Performance : Good
Paper 1B Qu 4 ~ (c) Sarah wants to send a reminder email to the students
whose fines total more than $10. She uses column E to store Y if the email is needed, and N otherwise. She
enters a formula into E2 and then copies it to the other cells in column E. Write the formula in E2.Suggest a validation check on each of the following fields.
Sarah enters the following formula into H3 and then copies it into H4:H5 so as to calculate the sum of all fines in each form. =SUMIF(C2:C160,$G$3, $D$2:$D$160)
Student Performance : Poor, especially in Relative & Absolute Addressing
Reflection for T&L: More effort on Excel Addressing
Paper 1B Qu 4 ~ (d) Sarah copies the worksheet into a
document in a word processor by creating
a dynamic link. For each of the following
actions, is there any change in the
worksheet? If yes, describe the change
Student Performance : Good
Paper 1B Qu 4 ~ (e) Sarah creates a presentation file with
hyperlinks and multimedia elements and
posts it on the schools web site. A student downloads and opens the file. He finds
some technical problems regarding the
hyperlinks and multimedia elements.
Describe two possible technical problems.
Student Performance : Good
Paper 1B Qu 5 ~ (a)
Student Performance : Good, student understand need of
initialization, and some basic operation
Paper 1B Qu 5 ~ (a)
Student Performance : Not good, some student not good in explaining
change
Reflection for T&L: More practice in describing change
Paper 1B Qu 5 ~ (c) In this sales promotion, ALG3 is used to
calculate the actual payment, PAYMENT, for Mary. ALG3 includes ALG1 and ALG2. Complete ALG3.
Student Performance : OK, but some not good in subprogram / modularizing
the program
Reflection for T&L: More practice in subprogram / modularizing the
program
Paper 1B Qu 5 ~ (d) The department store has another sales
promotion. The 20 members with the highest total spending each month can enjoy 20% off all year round. A computer application system is used to find these 20 members. Should the system be a single-user system or a
multi-user system? Explain briefly.
Should the system be a batch processing system or a real-time system? Explain briefly.
Student Performance : Good
Briefing Session on
2013 HKDSE ICT Exam Paper 2A
Question 1
Question 1
Candidate Performance :
(a) Very Good. (b) Satisfactory. (c) Satisfactory.
Most candidates are able to manage simple SQL statements involving filtering,
ordering and grouping.
* Accept grouping field(s) is/are not the same as the field(s) in the select clause.
* Accept TRUE, TRUE, TRUE and .T. to represent boolean data type.
Question 1
Candidate Performance :
(d) Fair. (e) (i) Fair. (ii) Poor.
(d) Some candidates cannot handle this more complicated SQL statement. Some of
them cannot distinguish the usage of where clause and having clause and put aggregate function in the where clause.
* Not Accept YEAR() = 2012 since the return of the function YEAR() is an integer.
(e)(i) Some candidates directly explain the working flow of this SQL statement, but
cannot show the background purpose of it.
(e)(ii) Many candidates dont know how to use outer join.
*Accept left outer join and left join *Not accept = NULL
Question 1
Candidate Performance :
(e) (iii) Poor.
Only a few candidates can answer MINUS / EXCEPT.
Some candidates understand this question is asking for combining two SQL
statements, but they only know the word UNION.
Question 2
Candidate Performance :
(a) Fair.
Some candidates dont
know how to determine
which is foreign key.
Question 2
Candidate Performance :
(b) Poor.
Many candidates dont know the usage of data dictionary.
Question 2
Candidate Performance :
(c) Satisfactory
Many candidates dont know why SQL View can be used to protect the data privacy.
Question 2
Candidate Performance :
(d) Satisfactory
(i) Most candidates can explain the problem, but they dont know the term referential integrity and the concept related to foreign key.
Question 3
Candidate Performance : Fair
This is a very traditional question, but some candidates still dont understand the difference of usage between database and spreadsheet
Question 3
Candidate Performance : (b) Excellent
Some candidate are weak at data representation, e.g. use 888 for an integer.
* Accept 2013-03-20,2013-03-20,20/03/2013,#20/03/2013#,{20/03/2013} and * Not Accept 20/03/2013, 20-03-2013
Question 3
Candidate Performance :
(c) Satisfactory
Many candidates know this suggestion can reduce the required storage size, but not
many of them can answer the potential disadvantage with the concept of data
validation.
Question 3
Candidate Performance :
(d) Fair
Most candidates dont know what should be done before data migration.
Question 4
Candidate Performance :
(a) Good.
Some candidates cannot
identify the job title. Some
candidates wrongly think
programmer is responsible for
designing the conceptual
database schema.
Question 4
Candidate Performance :
(b) Good
* Get 1 mark when one of the entities is correct
* Get 1 mark when one of the relationship is correct
* Get 1 mark when one of the cardinality is correct
Question 4
Candidate Performance :
(c) Satisfactory
Many candidates can answer both advantage and disadvantage of the combination.
Question 4
Question 4
Candidate Performance :
(d) Satisfactory
(i) Most candidates know that the system should not disclose the name of buyers.
(ii) Some candidates only concentrate on the ordering and dont know the provide proper information means to protect data privacy. MID should not be selected.
Question 4
Candidate Performance :
(e) Satisfactory
The majority of the candidates can answer correct subquery.
(f) Fair
Many candidates can answer this question.
Paper 2B Qu 1
Paper 2B Qu 1 (a) What does the value 80 after the colon in
the URL mean?
Network mask: Default gateway:
Student Performance : Good, except some wrote wrongly
Reflection for T&L: More practice in keywords
Paper 2B Qu 1 (b) function of the gateway benefit to Vicky of enabling VPN DHCP is used in the network. How does this
help the network connection
Student Performance : Poor, especially in VPN and DHCP. Some wrote their
definition but not benefit
Reflection for T&L: Clear concept between difference of definition vs
advantage in using
Paper 2B Qu 1 (c) Suggest two changes in the settings of the
router which would improve the security
Vicky finds that the tablet computer is out of order. She buys a new one which is of the same
model and uses the same settings as the old
one. However she cannot connect it to the WiFi
network. Why? What change in the settings of
the router should she make?
Student Performance : Good, knowing MAC is unique
Paper 2B Qu 1 (d) Vicky enables automatic channel selection
instead of the fixed channels for the router. Why?
Student Performance : Poor, most simply mentioned the benefit is
automatics
Reflection for T&L: Dont simply repeat wordings in the question
Paper 2B Qu 1 (e) Vicky has a notebook computer. The
network supports wired and wireless
connections. Vicky decides to use the
wired connection for the notebook
computer. Apart from bandwidth, suggest
and describe two reasons to support her
decision.
Student Performance : Good
Paper 2B Qu 2
Paper 2B Qu 2 (a) Give an example of the analog data.
Give an example of the digital data.
Where does the conversion from analog data to digital data take place?
Where does the conversion from digital data to analog data take place?
Student Performance : Good
Paper 2B Qu 2 (b) Briefly describe the data flow in these cameras
to illustrate the simplex mode.
The security system uses synchronous transmission. Give one advantage and one disadvantage of using synchronous transmission.
Student Performance : Poor, cannot well describe
Reflection for T&L: Concept is simple, need more practice in describe
Paper 2B Qu 2 (c) Data captured by the cameras is stored on
the server. Optical fibre instead of CAT5 cable is used for the new cameras but the network throughput does not improve. Give two upgrade suggestions for improving the network throughput
Briefly describe the data flow in the new IP cameras, to illustrate the duplex mode.
Student Performance : Good
Paper 2B Qu 2 (d) In each of the following cases, which protocol,
UDP or TCP, should be used? Explain briefly.
The visual images are sent to a server for storage.
Security officers can instantly view the visual images of the lobby.
Student Performance : Poor, cannot well describe
Reflection for T&L: Need more practice in describe
Paper 2B Qu 3
Paper 2B Qu 3 (a) Describe two network tests that Mr Chan
has to do during the testing stage.
The museum plans to allow visitors to use their own mobile devices. Give two considerations that the museum should bear in mind before implementing this plan.
Student Performance : Good, students show good ability in design
test plan if objectives are clear
For museum consideration, students answers are too technical
Paper 2B Qu 3 (b)
One day, four APs are out of order. Problem encounter Relocation ?
Student Performance : Good
Paper 2B Qu 3 (c) An IT company will donate as many as APs Mr
Chan wants. Someone suggests that Mr Chan
should mount more APs, for example, one AP
every 5 m2. Give two disadvantages of this
suggestion
Student Performance : Good, except some wrote need budget to buy
Reflection for T&L: Care about EVERY word in the question
Paper 2B Qu 3 (d)
Mr Chan needs to install Y instead of network cables for connecting X1 and X2 to the server. Give one reason to explain why network cables should not be used.
What major task will X1 perform when interacting with the other five APs in the hall?
Student Performance : Good
Paper 2B Qu 4
Paper 2B Qu 4 (a) Patients medical data is sent from the
server to doctors messaging devices through the hospitals WiFi network
instead of the public mobile network. Give
two reasons to support the use of the WiFi
network.
Student Performance : Good
Paper 2B Qu 4 (b) Patients medical data collected from the
medical sensors is sent to doctors
messaging devices via the server. What
are the major functions of the server
regarding network management? Give
two examples.
Student Performance : Good
Paper 2B Qu 4 (c) Packet switching is used for the data
transmission between the server and doctors messaging devices. Circuit switching should not be used in this case. Why
not?
Describe the packet switching mechanism for the data transmission.
Student Performance : Poor, cannot well describe, and also not clear in
packet vs circuit switching
Reflection for T&L: Need more practice in describe, and more teaching
in packet vs circuit switching
Paper 2B Qu 4 (d) The network design uses Cloud storage,
that is, online storage managed by third
parties through the Internet.
Give two benefits of using Cloud storage
Give two potential problems of using Cloud storage.
Student Performance : Good
Paper 2B Qu 4 (e) The bedside device is a mobile device which
allows a patient to move around the hospital with
the device. It forms a personal area network
(PAN) with medical sensors for communication,
as shown below.
Student Performance : Poor, student not have good knowledge in PAN
Reflection for T&L: Need more teaching in PAN
2013 ICT Paper 2C
/
/ Codec/
Codec
60 1024 1024 8 / 200 60 8 / 200
= 2516582.4 bit/s 2.4 Mbps (2.5Mbps)
MP4 / MKV / AVI (H264, AVCHD) / WMV / FLV / MOV (, )
codec, FFmpeg, DivX, Xvid, x264, mpeg
( )
/
Q.2
HTML /
/ (frame) / CSS / / (layer) (, )
/ /
/ / / / / / / / (, )
5184 3456 24
= 51 / 51.3 / 51.26 MB
/ / / /
/ (, , )
HKDSE ICT Paper 2C Q.3 - 4
( )
/ / ( )
( )
( / )
/ JavaScript(1) (+1) (1) / (+1)
1 (1)1 (+1) ( )
2 (1)2(+1) ( )
(1) (+1)
/ // /
/ / )
44,100 (44.1 1024 )
16/16
phase Amplitude / loudness / volume
(2)
(2)
(1)
(1) (+1)
2013 HKDSE ICT-D workshop
2013-11-22 2013-11-23
Q1
Q1
Q1
Q1
Q2
Q2
Q2
Q2
Q3
Q3
Q3
Q3
Q4
Q4
Q4
Q4