Information Technology



Similar documents
Information Technology

Information and Digital Technology

2011 HSC Information Technology Marking Guidelines

2015 HSC Information and Digital Technology Web and software applications Marking Guidelines

Information and Digital Technology

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

VCE VET INFORMATION TECHNOLOGY (General)

2015 HSC Information and Digital Technology Digital animation Marking Guidelines

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Level 1 Fundamentals of computing systems and customer care (7266/ )

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Information Processes and Technology

Remote Deposit Terms of Use and Procedures

Release: 1. PRSTS303A Test installed security equipment/system

VCE VET INFORMATION TECHNOLOGY

FBLA Computer Problem Solving aligned with Common Core FBLA: Computer Problem Solving RST RST

Employability Skills Summary

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

(Self-Study) Identify How to Protect Your Network Against Viruses

Sample Career Ladder/Lattice for Information Technology

I.T. CHAPTER 2. Which three computer components contain hazardous materials and require special handling for disposal? (Choose three.

Release: 1. BSBCMN406A Maintain business technology

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Laptop Operation Guidelines

JOB AND PERSON SPECIFICATION

AURC465349B Prepare a vehicle repair quotation

Information Technology Curriculum Framework (TVET)

Supplier Security Assessment Questionnaire

Chapter 4 System Unit Components. Discovering Computers Your Interactive Guide to the Digital World

Before you begin. Chapter 1: Advising on resource requirements 1

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Chromebook Procedures and Information for Students and Parents

DETAIL AUDIT PROGRAM Information Systems General Controls Review

2010 Software Development GA 3: Written examination

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

INTRODUCTION. National Competency Standard for Application Developers Commission on Information and Communications Technology

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Position description and specification

Computer Maintenance Technology Blueprint

PRSSM419A Install networked security system

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

CPPSEC4016A Install networked security system

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk)

Getting started with the e.dentifier2

Module 1 Concepts of Infor mation Technology (IT) Module Goals

How To Manage A Network Safely

CLASS SPECIFICATION Systems Support Analyst II

ASTFFL6 - SQA Unit Code H54H 04 Prepare for flood damage emergencies

DATABASE ANALYST I DATABASE ANALYST II

VCE VET INFORMATION AND COMMUNICATIONS TECHNOLOGY

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Level 3 Customer support provision for the IT professional ( / )

PSPSOHS602A Develop OHS information and data analysis and reporting and recording processes

Contents. Before you begin. Learning outcomes Competency standard How to use this book

Discovering Computers Living in a Digital World

JGSC Laptop Agreement

CITY OF BOULDER *** POLICIES AND PROCEDURES

Database Management Tool Software User Guide

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA (206) Computer and Phone Support Handbook

4ITP10: IT Maintenance Plan (RO)

UBC Incident Response Plan

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Acceptable Use of Computing and Information Technology Resources

CPPSEC2021A Install security equipment and systems

Business Education Standards

POLICY ON OCCUPATIONAL HEALTH AND SAFETY RISK MANAGEMENT

GCE APPLIED ICT A2 COURSEWORK TIPS

Lecture 6: Operating Systems and Utility Programs

CLASS SPECIFICATION Systems Support Analyst I

OHS Training Guidelines

Fact Sheet: Slips, trips and falls

Phone: Caro MI URL:

OCR LEVEL 2 CAMBRIDGE TECHNICAL

Information Resources Security Guidelines

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

Assessment of Learning Report. Computer Science Networking CPC. Fall 2008 Spring 2010

Information Security Policy

Honeywell Internet Connection Module

Business Process Management & Workflow Solutions

Installing, Configuring and Administering Microsoft Windows

2015 HSC Business Services Marking Guidelines

Create a Job Requisition. Create a Job Requisition. Concept

Higher National Unit specification: general information

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Network Security Policy

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Transcription:

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Total marks 80 Section I Pages 2 6 General Instructions Reading time 5 minutes Working time 2 hours Write using black or blue pen Black pen is preferred Board-approved calculators may be used Write your Centre Number and Student Number at the top of pages 9, 11, 13 and 15 15 marks Attempt Questions 1 15 Allow about 20 minutes for this section Section II Pages 9 16 35 marks Attempt Questions 16 19 Allow about 50 minutes for this section Section III Page 17 15 marks Attempt Question 20 Allow about 25 minutes for this section Section IV Page 18 15 marks Attempt Question 21 Allow about 25 minutes for this section 3260

Section I 15 marks Attempt Questions 1 15 Allow about 20 minutes for this section Use the multiple-choice answer sheet for Questions 1 15. 1 Which type of software package would be most appropriate for producing a high quality colour brochure? (A) Text editing (B) (C) Web authoring Image capturing (D) Desktop publishing 2 The help desk activities of a local organisation are now being provided by an overseas company. What is this an example of? (A) Leasing (B) Outsourcing (C) The use of an internal client (D) The use of an external client 3 Which of the following is responsible for the legal enforcement of Occupational Health and Safety (OHS) standards? (A) Unions (B) Local council (C) WorkCover NSW (D) Professional associations 2

Use the diagram of the motherboard shown to answer Questions 4 5. X Y Z W 4 At which position would the RAM be located? (A) (B) (C) (D) W X Y Z 5 What technique should be used to remove a buildup of dust from the components shown in the diagram? (A) (B) (C) (D) Shake the computer Apply a glass cleaning spray Wipe with a damp cloth and mild detergent Spray compressed air and use an anti-static brush 3

6 Which document outlines the core values, philosophy and customer focus of a company? (A) Code of conduct (B) Mission statement (C) Organisational chart (D) Company objective statement 7 The symbol shown normally appears with a yellow background. What is indicated by this symbol? (A) First aid (B) Keep dry (C) Hazard or warning (D) Request for assistance 8 A computer system has been set up to save files as soon as they are edited. Which system would best carry out this function? (A) Dual (B) Batch (C) Real-time (D) Multi-user 9 What is the purpose of testing and tagging electrical equipment? (A) To confirm the age of the equipment (B) To check that the equipment is safe to use (C) To calculate how many times the equipment has been used (D) To check that the correct type of cable is attached to the equipment 4

10 A client has requested the list of users who have accessed a confidential file. Which of the following would contain the required information? (A) Audit trail (B) Hacking log (C) Version control (D) File permissions 11 Which item would an inexperienced operator refer to when loading envelopes into a new printer? (A) Style guide (B) (C) User manual Keyboard overlay (D) Technical reference 12 What is the function of a macro? (A) To automate tasks using a recorded script (B) To outline an organisation s formatting guidelines (C) To guide the user through a process using a set of steps (D) To provide a master document for creating other documents 13 Jo installed the latest version of an operating system with a single-user licence on her home computer. A friend borrowed this operating system software and installed it on another computer. The friend s action is a violation of what? (A) Privacy (B) (C) User authorisation Custom installation (D) The end-user licence agreement 5

14 Which type of virus or destructive software could appear to be useful, but will actually cause damage once installed or run by a user? (A) Hoax (B) (C) Worm Trojan (D) System Sector 15 A closed-question survey has been developed to obtain feedback from 3000 customers whose details are in a company database. What would be the most efficient method of conducting the survey? (A) Emails (B) Interviews (C) Memoranda (D) Group meetings 6

BLANK PAGE 7

BLANK PAGE 8 Board of Studies NSW 2011

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Section II 35 marks Attempt Questions 16 19 Allow about 50 minutes for this section Centre Number Student Number Answer the questions in the spaces provided. These spaces provide guidance for the expected length of response. Question 16 (6 marks) (a) (i) Define the term operating system. 1 (ii) Name an open-source operating system. 1 (b) Compare open-source operating system software with commercial operating system software in terms of the following features. (i) Purchase price... 2 (ii) Licensing agreements... 2 3261 9

BLANK PAGE 10 Board of Studies NSW 2011

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Section II (continued) Centre Number Student Number Question 17 (10 marks) (a) Complete the table below, describing the function of each computer component 4 listed. Component Motherboard Function CMOS battery RAM CPU (b) During normal use of a computer, a user notices that the screen suddenly develops unusual colours and the text becomes unreadable. No settings have been changed on the computer or the monitor. (i) Describe the process that the user could follow to eliminate the monitor and its associated cabling, as the possible cause of the problem. 2 Question 17 continues on page 12 3262 11

Question 17 (continued) (ii) It was determined that a faulty PCI graphics card was causing the problem. Write a procedure for the safe removal of the PCI graphics card. 4 End of Question 17 12 Board of Studies NSW 2011

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Section II (continued) Centre Number Student Number Question 18 (9 marks) A small business has recently extended its computer network to include the following components: Modem Wireless access point Scanner. (a) Describe ONE function of each of these components. (i) Modem... 1 (ii) Wireless access point... 1 (iii) Scanner... 1 (b) The business would like to hire a new help desk operator and network administrator. Outline TWO duties that each of these employees would be required to carry out. (i) Help desk operator... 2 (ii) Network administrator... 2 Question 18 continues on page 14 3263 13

Question 18 (continued) (c) Name ONE diagnostic tool, other than a virus scanner, that would be used as part of a regular maintenance schedule, and describe its purpose............. 2 End of Question 18 14 Board of Studies NSW 2011

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Section II (continued) Centre Number Student Number Question 19 (10 marks) (a) Outline a task that would be carried out using each of the following interfaces. (i) Graphical user interface... 1 (ii) Command line interface... 1 (b) What are the advantages of the following processes for a computer operating system? (i) Upgrade... 2 (ii) Optimise... 2 Question 19 continues on page 16 3264 15

Question 19 (continued) (c) Using examples, describe the benefits of replacing a generic driver with a driver supplied by the vendor......................... 4 End of Question 19 16 Board of Studies NSW 2011

2011 HIGHER SCHOOL CERTIFICATE EXAMINATION Information Technology Section III 15 marks Attempt Question 20 Allow about 25 minutes for this section Answer the question in a writing booklet. Extra writing booklets are available. In your answer you will be assessed on how well you: demonstrate knowledge and understanding relevant to the question communicate ideas and information using relevant workplace examples and industry terminology present a logical and cohesive response Question 20 (15 marks) A company wishes to update its current paper-based user documentation to online documentation. Provide advice to the management regarding the benefits to the company of online documentation. In your answer, you should consider the following: The characteristics of effective online documentation The importance of reviewing and signing off when changes are made to online user documentation The importance of obtaining feedback from users regarding the effectiveness of online documentation. Please turn over 3265 17

Section IV 15 marks Attempt Question 21 Allow about 25 minutes for this section Answer the question in a SEPARATE writing booklet. Extra writing booklets are available. Question 21 (15 marks) You are preparing material for new staff regarding OHS standards in an IT workplace. (a) Define a hazard and give an example from the IT environment. 2 (b) Using examples, explain why the work environment and ergonomic factors are important considerations in the workplace. 5 (c) Knowingly using unsafe equipment, bullying and lack of training are all examples of human factors that contribute to injury in the workplace. 8 Explain the role of the employer, employee and WorkCover in minimising these factors. End of paper 18 Board of Studies NSW 2011