SDD Trial Paper From 2018 PDF

Title SDD Trial Paper From 2018
Author dinesh saravanan
Course Software Design and Development
Institution Higher School Certificate (New South Wales)
Pages 27
File Size 419.9 KB
File Type PDF
Total Downloads 33
Total Views 150

Summary

SDD Trial Paper from 2018. This included an option topic Programming Paradigms...


Description

Software Design and Development HSC Trial Examination

General Instructions Reading time - 5 minutes Working time - 3 hours No calculators

Total marks - 92 Section I - 20 marks Section II - 60 marks Section III - 12 marks This is a real trial examination which I sat during my HSC in 2018. This does not contain the option topic as it was not part of this exam. The option topic was given as a separate exam and is located on boredofstudies.org.

1

2

Section I 20 marks Attempt questions 1-20 Allow about 35 minutes for this section 1

Which of the following is a responsibility of software developers? (A) (B) (C) (D)

2

In 1995 Microsoft released Windows 95 with Microsoft Network (MSN) client software which included Internet Explorer 3 for free. Internet Explorer 3 had similar functionality as the dominant browser, Netscape, at the time. The Microsoft versus Netscape course case is an example of the legal implications of which of the following types of integration software? (A) (B) (C) (D)

3

Censorship Laws Peer to peer PC to Web Request for tender

Which of the following factors below is a major influence in changing the nature of software solutions? (A) (B) (C) (D)

4

Ensuring software is very cheap Ensuring software addresses inclusivity issues Ensuring software is capable of generating malware Ensuring software brand loyalty to an operating system

Accounting software The Structured Approach Web-based software Working in a team

Use the diagram below to answer Question 4.

3

Which of the following system modelling tools is represented in the diagram above? (A) (B) (C) (D) 5

Which of the following is used in the appropriate testing of standard modules in software solutions? (A) (B) (C) (D)

6

A structure chart A Data dictionary A context diagram A dataflow diagram

Drivers Large file sizes Prototyping Sentinel values

Use the following code to answer Question 6. REM Draw graph REM requires parameters date and market PRINT ”Printing graph for”, date,market RETURN: True REM end of subroutine draw graph Which description best describes the code above? (A) (B) (C) (D)

7

Which of the following is an advantage of a computer network when developing software? (A) (B) (C) (D)

8

Declaration Machine code Module Stub

Access to resources Internet speed Web-based software Maintaining market position

The following data needs to be stored for many people: Name, Age, Telephone Number, Address and Postcode. Which of the following data structures is appropriate? (A) (B) (C) (D)

Simple record Array of records File of real numbers Two-dimensional array

4

9

In which stage of the software development cycle is an existing system analysed? (A) (B) (C) (D)

Maintaining Planning and designing Implementation and testing Defining and understanding

10 A programmer wants to create a program that will input two numbers and output the biggest. Which of the following algorithms will correctly complete this task? (A) BEGIN ENTER Number1 and enter Number2 IF Number1 Number2 THEN PRINT Numbers are equal ELSE IF Number1 > Number2 THEN PRINT Number1 is bigger ELSE PRINT Number2 is bigger END IF END IF END (B) BEGIN ENTER Number1 and enter Number2 IF Number1 = Number2 THEN PRINT Numbers are equal ELSE IF Number1 < Number2 THEN PRINT Number1 is bigger ELSE PRINT Number2 is bigger END IF END IF END (C) BEGIN ENTER Number1 and enter Number2 IF Number1 = Number2 THEN PRINT Numbers are equal ELSE IF Number1 > Number2 THEN PRINT Number1 is bigger ELSE PRINT Number2 is bigger END IF END IF END

5

(D) BEGIN ENTER Number1 and enter Number2 IF Number1 Number2 THEN PRINT Numbers are equal ELSE IF Number1 < Number2 THEN PRINT Number1 is bigger ELSE PRINT Number2 is bigger END IF END IF END 11 A programmer wants to write a program to hold the Names and Scores of five students. Then display the Names and Scores in reverse order. Which algorithm correctly completes this task? BEGIN Names[0] = ”billy”; Names[1] = ”mary”; Names[2] = ”johno”; Names[3] = ”sally”; Names[4] = ”frank”; Scores[0] = 75; Scores[1] = 82; Scores[2] = 68; Scores[3] = 93; Scores[4] = 87; END

//Declare Names as an array of Strings

//Declare Scores as an array of Numbers

(A) BEGIN DisplayArrays() FOR count = 0 TO arraysize Display Names[count] got a score of Scores[count] NEXT END (B) BEGIN DisplayArrays() count = arraysize - 1; WHILE count ≥ 0 Display Names[count] ” got a score of ” Scores[count] count = count - 1 ENDWHILE END

6

(C) BEGIN DisplayArrays() count = arraysize - 1; WHILE count ≥ 0 Display Names[count] ” got a score of ” Scores[count] ENDWHILE END (D) BEGIN DisplayArrays() FOR count = 5 TO arraysize Display Names[count] ” got a score of ” Scores[count] NEXT END 12 Which of the following modelling tools identifies inputs, outputs and the processes involved? (A) (B) (C) (D)

Sdd IPO Chart Screen Design Sheet Storyboard Design Grid

13 The checkbox screen design element is used to get what type of data from a user? (A) (B) (C) (D)

Real Ticks String Boolean

14 What is used to store the results of processing from the ALU? (A) (B) (C) (D)

Accumulator Program Counter RAM ROM

15 Which file type would highlight inefficient or processor intensive operations? (A) (B) (C) (D)

Large Small Random Sequential

16 The creation of online help would occur during which stage of developing a software solution to a complex problem? (A) (B) (C) (D)

Defining and understanding the problem Implementing Planning and designing Testing and evaluating

7

17 In programming, a predefined bit or bit sequence that holds a binary value is known as (A) (B) (C) (D)

a breakpoint a driver a flag a sentinel

18 The array diagrams below shows the result of a sorting algorithm after the first and second passes. What type of sort is used?

(A) (B) (C) (D)

Binary Bubble Insertion Selection

19 Use the algorithm below to answer question 19. BEGIN CreateFile Open ContractsData for output For i = 1 TO 10 Display ”Please enter the details for the next person: ” Get fname, sname, birthday Write ContractsData from fname, sname, birthday NEXT i Let fname = ”xxx” Let sname = ”xxx” Write ContractsData from fname, sname, birthday Close ContractsData END CreateFile What type of file does this algorithm write to? (A) (B) (C) (D)

Array Random access Sentinel value Sequential

8

20 Which EBNF statement defines a simple integer? (A) digit = 0 |1 |2 |3 |4 |5 |6 |7 |8 |9 sign = + | - {} (B) sign = + | digit = 0 |1 |2 |3 |4 |5 |6 |7 |8 |9 integer = []{} (C) digit = 0 |1 |2 |3 |4 |5 |6 |7 |8 |9 integer = [sign] digit { digit } (D) sign = + | digit = 0 |1 |2 |3 |4 |5 |6 |7 |8 |9 integer = []{}

End of Section I

9

Section II 60 marks Attempt questions 21-27 Allow about 1 hour and 50 minutes for this section Question 21 (12 marks) ’Splashes’ is a family owned business which provides swimming lessons for all ages. They are currently using a paper based system to manage all their clients, instructors, bookings and payments. An example of a running day for them includes: 4 sessions per day (level 1, level 2, level 3, level 4) each running for 30 minutes each. A client arrives and informs them of their child’s name and the receptionist looks for the child’s card/file from a filing system which is then manually ticked of against the correct date to confirm attendance and payment. If a child is absent, a cross is placed next to their name. The client then pays a fee of $15 for the lesson. If a child is absent, they are still required to pay for missed lesson(s) the following week and book in for a catch up lesson(s). The business owner has realised that this manual system is not effective and costing her money due to human error. The owner wishes to invest in a new computer-based system to overcome these issues. (a) Construct a System Flowchart for the current paper-based system in this scenario. (3 marks)

10

(b) Explain the factors that should be considered by a software developer prior to investing time and money into a proposed software solution. (3 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ (c) Recommend, with justification, an appropriate software development approach for this scenario. (3 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................

11

(d) Explain the purpose of a Data Dictionary, using examples from the given scenario. (3 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ Question 27 (7marks) (a) An employee of an IT infrastructure company was fired for outsourcing their allocated work to a foreign contracting company for about one-fifth of their pay. Describe the issues that need to be considered when outsourcing. (3 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................

12

(b) Outline TWO legal issues that could arise from Software development. (2 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ (c) A teacher needs to locate a students exam paper in a stack of 100 exam papers sorted alphabetically What is the maximum number of comparisons the teacher will need to perform on the stack to locate the students paper using a Binary Search Method? Justify your answer. (2 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................

13

Question 23 (9 marks) (a) A computer programmer keeps a list of his contacts in a sorted table. As he does not add to this list of contacts very often, he keeps any new entries in an unsorted overflow table. When he needs to find a contact he performs a binary search on the sorted table and if the contact is still not found, he looks up the overflow table using a linear search. Describe an advantage and a disadvantage of using this method. (3 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................

Part (b) continues on the next page...

14

(b) The Extract(Start, Finish, DataString) subprogram copies the characters from the Start value to the Finish value from DataString. Construct an algorithm in pseudocode that will covert a date string formatted as ”MM/DD/YYYY” into a format of ”DD/MM/YYYY”. (4 marks) ................................................................................................................................................ ................................................................................................................................................ ................................................................................................................................................ ..........................................................................................................


Similar Free PDFs