133
1 Briefing Session on 2013 HKDSE ICT Exam 22/23 ov 2013

Briefing Session on 2013 HKDSE ICT Exam

Embed Size (px)

Citation preview

  • 1

    Briefing Session on

    2013 HKDSE ICT Exam

    22/23 ov 2013

  • Breakdown of elective

    No. of candidates No. of schools

    1

    2A

    2B

    2C

    2D

    2

  • Options offered

    No. of options No. of schools

    1

    2

    3

    4

    3

  • Popularity

    Combination No. of schools

    C

    D

    A

    CD

    4

  • Interesting Figures (1)

    Paper Max Mark

    1 92

    2A 54

    2B 49

    2C 48

    2D 55

    5

  • Interesting Figures (2)

    Selection of Prog Lang (2D)

    Total %

    Pascal 796 69.1

    C 286 24.8

    Visual Basic 45 3.9

    Java 25 2.2

    1,152 100

    6

  • 7

    Performance Compulsory Part

    Average no. of MC items correct = 2

    High correlation with Paper 2s and SBA

  • 8

    Performance Elective Part

    Equating performance of candidates (Elective Part) can be reflected on the

    same scale (Equipercentile method )

    Performance (Paper 1) of students in

    2D > 2A > 2B > 2C

    Refer to Grading Procedures & standards-referenced

    Reporting in the HKDSE Exam (HKEAA)

  • 9

    Grading Procedures

    Sample script selection

    Standardisation

    Post-marking exercise

    Panel of judges grading meeting

    Internal meeting

    Public Exam Board meeting

    Refer to Grading Procedures & standards-referenced

    Reporting in the HKDSE Exam (HKEAA)

  • ICT

    Level %

    5**

    5*+

    5+

    4+ 2

    3+

    2+

    1+

    10

  • 11

    Levels attained

    HKDSE Level 4 comparable to

    HKAL Grade D

    L5** Top 10% of L5

    L5*+ Top 40% of L5 (L5* = next 30%)

  • 12

    SBA

  • 13

    SBA Reminders

    Students have to

    complete their reports on their own

    acknowledge sources properly in their work

    to avoid plagiarism

    New measures: Prevention & handling

    of Malpractice

  • 14

    ICT Exemplars

    Exemplars with annotated notes

    P1B 1 exemplar @ Level @ language

    P2 selected levels

    Uploaded to www.hkeaa.edu.hk

    http://www.hkeaa.edu.hk/

  • Assessing Student Learning

    for the ICT Curriculum

    Briefing Session on 2013

    HKDSE ICT Examination

    [ 1B & 2B ]

  • Paper 1B Qu 1 ~ (a) (i)

    John connects the printer to the network at P instead of Q. What is the advantage

    and disadvantage of this? Adv : easy to control

    Disadv : can be used only when the

    desktop computer is on

    Student Performance : OK

  • Paper 1B Qu 1 ~ (a) (ii) The printer is equipped with RAM and

    ROM. When John prints a document, what will the RAM and ROM store?

    Student Performance : RAM: print data

    ROM: printers firmware

    OK, some not know printer has RAM and ROM, and their functions

    Reflection for T&L: RAM & ROM are generic main storage, not

    only for computer

  • Paper 1B Qu 1 ~ (b) (i) Suggest two possible ways to link up the

    desktop computer and the smartphone.

    Student Performance : Good

    WiFi network

    Bluetooth

    USB cable

  • Paper 1B Qu 1 ~ (b) (ii) X and Z are two different cables. What is

    the major difference in functional characteristic between them?

    Student Performance : data transfer rate

    Max. length cable segment

    Not good, some talk about analog and digital signal

    Reflection for T&L: Teach student what is the meaning of

    functional characteristics

  • Paper 1B Qu 1 ~ (c)

    The rear part of the router is shown in the diagram below. Mark X and Y on the diagram to indicate where the cables X and Y should be

    connected.

    X LAN

    Y WAN

  • Paper 1B Qu 1 ~ (d)

    Someone suggests that John build a Domain Name System (DNS) to improve his network

    services. John disagrees with this suggestion.

    (i) What network service does a DNS mainly provide?

    (ii) Do you agree with Johns view? Explain briefly.

    (i) DNS resolves domain names into IP

    (ii) He does not need DNS because it is just a LAN

    Student Performance :Good

  • Paper 1B Qu 2 ~ (a)

    Janice is planning the annual Charity Run for her school. She uses graphics software to create

    a map with the route of the Charity Run and

    posts it on the schools web site. Janice decides to store the map as MAP.JPG instead

    of MAP.BMP. Give one benefit of her decision.

    smaller file size/ supported by many browsers

    Student Performance :Good

  • Paper 1B Qu 2 ~ (b)

    Janice finds that the email client program classifies Alans email as spam. What does she

    Suggest two protocols for receiving email that Janice may use

    POP3, IMAP

    need to do to prevent this happening again? Add his email address in non-spam list

    Janice tries to reply to all the email accounts involved

    Student Performance :Good Alan and Betty

  • Paper 1B Qu 2 ~ (c)

    The notebook computer is equipped with a solid-state drive (SSD) instead of a general hard disk.

    Give two benefits to Janice of using a SSD.

    higher data transfer rate. consumes less electricity. smaller in size. better shock resistance. Lighter more durable.

    Student Performance : Good

  • Paper 1B Qu 2 ~ (c) Janice uploads the videos and pictures to the

    schools web site and the web site includes a statement All rights reserved. If the statement were removed, would the school own the

    copyright of the web site? Explain briefly.

    Yes, copyright ownership does not

    require any registration or declaration.

  • Paper 1B Qu 2 ~ (d) (i) To promote the Charity Run, Janice writes an

    article in the school newsletter and inserts the following code for linking to the schools web site. Give one advantage of using this code over a bar code.

    Student Performance :

    store more data. a higher error correction capability. can be scanned in different orientation. be

    made up of more types of data

    OK, but some show no experience in it

    Reflection for T&L: More actual demo to student

  • Paper 1B Qu 2 ~ (d) (ii) What is the benefit of using this code in the

    school newsletter?

    faster to input the URL reduce typing errors

    Student Performance : OK, but some of the answer are too simple (e.g.

    convenience)

    Reflection for T&L: More concrete answer, higher level questioning at

    lessons

  • Paper 1B Qu 2 ~ (d) (iii) Describe another kind of use of this code.

    phone number / product information.

    Student Performance : Good

  • Paper 1B Qu 3

    Amy, Billy and Charles work in different offices in a company. Read their conversation about using computers and answer the questions below.

    Amy: Charles, your office does not have a good ergonomic environment.

    Billy: Charles, you have installed a Bit Torrent (BT) program on your computer. You should delete it.

    Charles: No, I will still keep the BT program and use it.

    Amy: Charles, we installed the same anti-virus software at the same time but only your computer is infected.

  • Paper 1B Qu 3 ~ (a) Give two possible features of the setup of

    Charles office that could easily lead to eye strain when using the computer.

    improper viewing angle of the monitor /

    improper height of the monitor /

    distance from the monitor to his eyes too close /

    insufficient light /

    close to the window without curtain

    Student Performance : Good, but some state features not related to

    set-up, or not related to eye strain

    Reflection for T&L: Care about EVERY word in the question

  • Paper 1B Qu 3 ~ (b) Billy and Charles have different views on the use

    of the BT program.

    (i) Give a reason to support Billys recommendation.

    (ii) Give a reason to support Charles decision.

    (i) Charles would download some software that the sources come

    from unidentified individual users; the software might be privacy

    copies.

    (ii) Charles can share working files with other colleagues efficiently.

    Student Performance :OK, but some student think BT is fast / illegal / virus

    Reflection for T&L: Clear general misconception of their usual experience

  • Paper 1B Qu 3 ~ (c) Why is only Charles computer infected?

    Give two possible reasons.

    Student Performance :

    infected with new computer virus deactivates his anti-virus software. does not regularly update the definition

    database of the anti-virus software.

    Good, but some state their Anti-virus software are different

    Reflection for T&L: Care about EVERY word in the question

  • Paper 1B Qu 3

    Charles: The operating system of my computer uses Unicode instead of Big-5 code and GB code.

    Billy: Unicode only includes around 20,000 Chinese characters.

    Amy: Not any more. As of September 2012, Unicode includes more than 110,000 characters.

  • Paper 1B Qu 3 ~ (d) (ii) Referring to Amys comment, do the 110,000

    characters include traditional and simplified

    Chinese characters only? Explain briefly.

    Other than the Chinese characters, there are characters

    of other languages

    Student Performance : Good, but some mentioned the following only

    Number Character English character

    Reflection for T&L: State more related examples

  • Paper 1B Qu 3 ~ (d) (i) To represent a set of 20,000 characters

    using binary code, what is the minimum

    number of bits required? Show your

    calculation. 214 < 20,000 < 215

    15 bits are needed.

    Student Performance : Good

  • Paper 1B Qu 3 ~ (d) (ii) Referring to Amys comment, do the 110,000

    characters include traditional and simplified

    Chinese characters only? Explain briefly.

    Other than the Chinese characters, there are characters

    of other languages

    Student Performance : Good, but some mentioned the following only

    Number Character English character

    Reflection for T&L: State more related examples

  • Paper 1B Qu 3

    Amy, Billy and Charles go to a public library and want to use workstations.

    Amy: There is an empty seat but the workstation has not been logged out.

    Charles: The email account has not been logged out. There is a coupon attached to the email. Let me print it

    so we can use it.

    Billy: The security of the workstations is very low. Secure Sockets Layer (SSL) should be used.

  • Paper 1B Qu 3 ~ (e) (i) Describe two illegal offences that Charles would

    do if he accessed the email and printed the

    coupon. He accesses the email account without authorization. He steals the coupon.

    Student Performance : Good, especially in THEFT offences. But some

    mentioned privacy instead of illegal access

    Reflection for T&L: A good example to show illegal access vs privacy

  • Paper 1B Qu 3 ~ (e) (ii) Can SSL prevent Charles from accessing

    the email account mentioned above? Explain briefly.

    Student Performance :

    No, SSL is used to secure the data

    transmission. (encryption)

    Good, except some only mentioned more secure, which is not acceptable

    Reflection for T&L: Dont simply repeat wordings in the question

  • Paper 1B Qu 4 Sarah is a librarian in a secondary school.

    She uses a table in a database, LOAN, to

    store the book circulation records.

  • Paper 1B Qu 4 ~ (a) Suggest a primary key for LOAN.

    Suggest a validation check on each of the following fields.

    Student Performance : Good, except some not using question example for

    answer reference

    Reflection for T&L: Give explanation with reference to question scenario

  • Paper 1B Qu 4 ~ (b) Sarah executes a SQL command on

    LOAN with four records, as shown below. SELECT STUID, COUNT(*) FROM LOAN GROUP BY

    STUID

    Student Performance : Good

  • Paper 1B Qu 4 ~ (c) Sarah wants to send a reminder email to the students

    whose fines total more than $10. She uses column E to store Y if the email is needed, and N otherwise. She

    enters a formula into E2 and then copies it to the other cells in column E. Write the formula in E2.Suggest a validation check on each of the following fields.

    Sarah enters the following formula into H3 and then copies it into H4:H5 so as to calculate the sum of all fines in each form. =SUMIF(C2:C160,$G$3, $D$2:$D$160)

    Student Performance : Poor, especially in Relative & Absolute Addressing

    Reflection for T&L: More effort on Excel Addressing

  • Paper 1B Qu 4 ~ (d) Sarah copies the worksheet into a

    document in a word processor by creating

    a dynamic link. For each of the following

    actions, is there any change in the

    worksheet? If yes, describe the change

    Student Performance : Good

  • Paper 1B Qu 4 ~ (e) Sarah creates a presentation file with

    hyperlinks and multimedia elements and

    posts it on the schools web site. A student downloads and opens the file. He finds

    some technical problems regarding the

    hyperlinks and multimedia elements.

    Describe two possible technical problems.

    Student Performance : Good

  • Paper 1B Qu 5 ~ (a)

    Student Performance : Good, student understand need of

    initialization, and some basic operation

  • Paper 1B Qu 5 ~ (a)

    Student Performance : Not good, some student not good in explaining

    change

    Reflection for T&L: More practice in describing change

  • Paper 1B Qu 5 ~ (c) In this sales promotion, ALG3 is used to

    calculate the actual payment, PAYMENT, for Mary. ALG3 includes ALG1 and ALG2. Complete ALG3.

    Student Performance : OK, but some not good in subprogram / modularizing

    the program

    Reflection for T&L: More practice in subprogram / modularizing the

    program

  • Paper 1B Qu 5 ~ (d) The department store has another sales

    promotion. The 20 members with the highest total spending each month can enjoy 20% off all year round. A computer application system is used to find these 20 members. Should the system be a single-user system or a

    multi-user system? Explain briefly.

    Should the system be a batch processing system or a real-time system? Explain briefly.

    Student Performance : Good

  • Briefing Session on

    2013 HKDSE ICT Exam Paper 2A

  • Question 1

  • Question 1

    Candidate Performance :

    (a) Very Good. (b) Satisfactory. (c) Satisfactory.

    Most candidates are able to manage simple SQL statements involving filtering,

    ordering and grouping.

    * Accept grouping field(s) is/are not the same as the field(s) in the select clause.

    * Accept TRUE, TRUE, TRUE and .T. to represent boolean data type.

  • Question 1

    Candidate Performance :

    (d) Fair. (e) (i) Fair. (ii) Poor.

    (d) Some candidates cannot handle this more complicated SQL statement. Some of

    them cannot distinguish the usage of where clause and having clause and put aggregate function in the where clause.

    * Not Accept YEAR() = 2012 since the return of the function YEAR() is an integer.

    (e)(i) Some candidates directly explain the working flow of this SQL statement, but

    cannot show the background purpose of it.

    (e)(ii) Many candidates dont know how to use outer join.

    *Accept left outer join and left join *Not accept = NULL

  • Question 1

    Candidate Performance :

    (e) (iii) Poor.

    Only a few candidates can answer MINUS / EXCEPT.

    Some candidates understand this question is asking for combining two SQL

    statements, but they only know the word UNION.

  • Question 2

    Candidate Performance :

    (a) Fair.

    Some candidates dont

    know how to determine

    which is foreign key.

  • Question 2

    Candidate Performance :

    (b) Poor.

    Many candidates dont know the usage of data dictionary.

  • Question 2

    Candidate Performance :

    (c) Satisfactory

    Many candidates dont know why SQL View can be used to protect the data privacy.

  • Question 2

    Candidate Performance :

    (d) Satisfactory

    (i) Most candidates can explain the problem, but they dont know the term referential integrity and the concept related to foreign key.

  • Question 3

    Candidate Performance : Fair

    This is a very traditional question, but some candidates still dont understand the difference of usage between database and spreadsheet

  • Question 3

    Candidate Performance : (b) Excellent

    Some candidate are weak at data representation, e.g. use 888 for an integer.

    * Accept 2013-03-20,2013-03-20,20/03/2013,#20/03/2013#,{20/03/2013} and * Not Accept 20/03/2013, 20-03-2013

  • Question 3

    Candidate Performance :

    (c) Satisfactory

    Many candidates know this suggestion can reduce the required storage size, but not

    many of them can answer the potential disadvantage with the concept of data

    validation.

  • Question 3

    Candidate Performance :

    (d) Fair

    Most candidates dont know what should be done before data migration.

  • Question 4

    Candidate Performance :

    (a) Good.

    Some candidates cannot

    identify the job title. Some

    candidates wrongly think

    programmer is responsible for

    designing the conceptual

    database schema.

  • Question 4

    Candidate Performance :

    (b) Good

    * Get 1 mark when one of the entities is correct

    * Get 1 mark when one of the relationship is correct

    * Get 1 mark when one of the cardinality is correct

  • Question 4

    Candidate Performance :

    (c) Satisfactory

    Many candidates can answer both advantage and disadvantage of the combination.

  • Question 4

  • Question 4

    Candidate Performance :

    (d) Satisfactory

    (i) Most candidates know that the system should not disclose the name of buyers.

    (ii) Some candidates only concentrate on the ordering and dont know the provide proper information means to protect data privacy. MID should not be selected.

  • Question 4

    Candidate Performance :

    (e) Satisfactory

    The majority of the candidates can answer correct subquery.

    (f) Fair

    Many candidates can answer this question.

  • Paper 2B Qu 1

  • Paper 2B Qu 1 (a) What does the value 80 after the colon in

    the URL mean?

    Network mask: Default gateway:

    Student Performance : Good, except some wrote wrongly

    Reflection for T&L: More practice in keywords

  • Paper 2B Qu 1 (b) function of the gateway benefit to Vicky of enabling VPN DHCP is used in the network. How does this

    help the network connection

    Student Performance : Poor, especially in VPN and DHCP. Some wrote their

    definition but not benefit

    Reflection for T&L: Clear concept between difference of definition vs

    advantage in using

  • Paper 2B Qu 1 (c) Suggest two changes in the settings of the

    router which would improve the security

    Vicky finds that the tablet computer is out of order. She buys a new one which is of the same

    model and uses the same settings as the old

    one. However she cannot connect it to the WiFi

    network. Why? What change in the settings of

    the router should she make?

    Student Performance : Good, knowing MAC is unique

  • Paper 2B Qu 1 (d) Vicky enables automatic channel selection

    instead of the fixed channels for the router. Why?

    Student Performance : Poor, most simply mentioned the benefit is

    automatics

    Reflection for T&L: Dont simply repeat wordings in the question

  • Paper 2B Qu 1 (e) Vicky has a notebook computer. The

    network supports wired and wireless

    connections. Vicky decides to use the

    wired connection for the notebook

    computer. Apart from bandwidth, suggest

    and describe two reasons to support her

    decision.

    Student Performance : Good

  • Paper 2B Qu 2

  • Paper 2B Qu 2 (a) Give an example of the analog data.

    Give an example of the digital data.

    Where does the conversion from analog data to digital data take place?

    Where does the conversion from digital data to analog data take place?

    Student Performance : Good

  • Paper 2B Qu 2 (b) Briefly describe the data flow in these cameras

    to illustrate the simplex mode.

    The security system uses synchronous transmission. Give one advantage and one disadvantage of using synchronous transmission.

    Student Performance : Poor, cannot well describe

    Reflection for T&L: Concept is simple, need more practice in describe

  • Paper 2B Qu 2 (c) Data captured by the cameras is stored on

    the server. Optical fibre instead of CAT5 cable is used for the new cameras but the network throughput does not improve. Give two upgrade suggestions for improving the network throughput

    Briefly describe the data flow in the new IP cameras, to illustrate the duplex mode.

    Student Performance : Good

  • Paper 2B Qu 2 (d) In each of the following cases, which protocol,

    UDP or TCP, should be used? Explain briefly.

    The visual images are sent to a server for storage.

    Security officers can instantly view the visual images of the lobby.

    Student Performance : Poor, cannot well describe

    Reflection for T&L: Need more practice in describe

  • Paper 2B Qu 3

  • Paper 2B Qu 3 (a) Describe two network tests that Mr Chan

    has to do during the testing stage.

    The museum plans to allow visitors to use their own mobile devices. Give two considerations that the museum should bear in mind before implementing this plan.

    Student Performance : Good, students show good ability in design

    test plan if objectives are clear

    For museum consideration, students answers are too technical

  • Paper 2B Qu 3 (b)

    One day, four APs are out of order. Problem encounter Relocation ?

    Student Performance : Good

  • Paper 2B Qu 3 (c) An IT company will donate as many as APs Mr

    Chan wants. Someone suggests that Mr Chan

    should mount more APs, for example, one AP

    every 5 m2. Give two disadvantages of this

    suggestion

    Student Performance : Good, except some wrote need budget to buy

    Reflection for T&L: Care about EVERY word in the question

  • Paper 2B Qu 3 (d)

    Mr Chan needs to install Y instead of network cables for connecting X1 and X2 to the server. Give one reason to explain why network cables should not be used.

    What major task will X1 perform when interacting with the other five APs in the hall?

    Student Performance : Good

  • Paper 2B Qu 4

  • Paper 2B Qu 4 (a) Patients medical data is sent from the

    server to doctors messaging devices through the hospitals WiFi network

    instead of the public mobile network. Give

    two reasons to support the use of the WiFi

    network.

    Student Performance : Good

  • Paper 2B Qu 4 (b) Patients medical data collected from the

    medical sensors is sent to doctors

    messaging devices via the server. What

    are the major functions of the server

    regarding network management? Give

    two examples.

    Student Performance : Good

  • Paper 2B Qu 4 (c) Packet switching is used for the data

    transmission between the server and doctors messaging devices. Circuit switching should not be used in this case. Why

    not?

    Describe the packet switching mechanism for the data transmission.

    Student Performance : Poor, cannot well describe, and also not clear in

    packet vs circuit switching

    Reflection for T&L: Need more practice in describe, and more teaching

    in packet vs circuit switching

  • Paper 2B Qu 4 (d) The network design uses Cloud storage,

    that is, online storage managed by third

    parties through the Internet.

    Give two benefits of using Cloud storage

    Give two potential problems of using Cloud storage.

    Student Performance : Good

  • Paper 2B Qu 4 (e) The bedside device is a mobile device which

    allows a patient to move around the hospital with

    the device. It forms a personal area network

    (PAN) with medical sensors for communication,

    as shown below.

    Student Performance : Poor, student not have good knowledge in PAN

    Reflection for T&L: Need more teaching in PAN

  • 2013 ICT Paper 2C

  • /

  • / Codec/

    Codec

  • 60 1024 1024 8 / 200 60 8 / 200

    = 2516582.4 bit/s 2.4 Mbps (2.5Mbps)

  • MP4 / MKV / AVI (H264, AVCHD) / WMV / FLV / MOV (, )

    codec, FFmpeg, DivX, Xvid, x264, mpeg

  • ( )

    /

  • Q.2

  • HTML /

    / (frame) / CSS / / (layer) (, )

  • / /

    / / / / / / / / (, )

  • 5184 3456 24

    = 51 / 51.3 / 51.26 MB

    / / / /

    / (, , )

  • HKDSE ICT Paper 2C Q.3 - 4

  • ( )

  • / / ( )

    ( )

  • ( / )

    / JavaScript(1) (+1) (1) / (+1)

  • 1 (1)1 (+1) ( )

    2 (1)2(+1) ( )

    (1) (+1)

  • / // /

    / / )

  • 44,100 (44.1 1024 )

    16/16

  • phase Amplitude / loudness / volume

  • (2)

    (2)

    (1)

  • (1) (+1)

  • 2013 HKDSE ICT-D workshop

    2013-11-22 2013-11-23

  • Q1

  • Q1

  • Q1

  • Q1

  • Q2

  • Q2

  • Q2

  • Q2

  • Q3

  • Q3

  • Q3

  • Q3

  • Q4

  • Q4

  • Q4

  • Q4