Computing: Software Development - Solutions
AssessmentContributions towards the study score
U3O1 Programming practice SAC 10%U3O2 Analysis & Design SAT 15%U4O1 Software Solutions SAT 15%U4O2 Interactions & Impact SAC 10%
Written examination 50%
Written examination
When & where
Thursday 14th November 20193:00pm to 5:15pm
Reading Time:15 minutes
Writing Time: 120 minutes
LocationSchool should have notified you!
Materials
BringPens & pencilsHighlighters & erasersSharpeners & rulersCalculator – Scientific Watch
Don’t BringWhiteoutDictionary
Structure
Three sections
Section A (20 marks)Multiple Choice Questions
Section B (20 marks)Short-answer questions
Section C – Case Study (60 marks)Short and extended-answer questions
Total marks = 100
Timing
120 minutes writing time/ 100 marks
1 mark = 1 minute 12 seconds2 marks = 2 min 24 sec3 marks = 3 min 36 secs4 marks = 4 min 48 sec
Keep an eye on the time!
Reading Time
15 minutes
Read every question carefully – Section A, B, C & Case StudyYou cannot mark the paper in anyway during this timeStart to develop a plan!!!Answer the questions you are confident with first!
Writing Time
You do not have to complete the questions in orderStart by answering the questions you feel the most comfortable withGood idea to start with the multiple choiceThis might help you remember parts of the course
Contents
The exam content will be based upon the study design
Key knowledge Key skills Glossary Problem-solving methodology
Key knowledge checklist
U3O1: Programming practiceDon’t know
Know a little
Know a lot
1 characteristics of data types
2 types of data structures, including one-dimensional arrays (single data type, integer index) and records (varying data types, field index)
3 methods of representing designs, including data dictionaries, object descriptions, mock-ups and pseudocode
4 formatting and structural characteristics of input and output, including XML file formats
5 a programming language as a method for developing working modules that meet specific needs
6 processing features of a programming language, including instructions, procedures, methods, functions and control structures
7 techniques for linear and binary searching
8 techniques for checking that modules meet design specifications, including trace tables and test data
9 purposes and characteristics of internal documentation, including comments and meaningful names.
U3O2: Analysis and design
Don’t know
Know a
little
Know a lot
1Project management concepts and processes, including milestones and dependencies (concepts), and task identification, sequencing, time allocation, resources and documentation using Gantt charts (processes)
2 Techniques for collecting data to determine needs and requirements, including interviews, surveys and observation
3Tools and techniques for depicting the interfaces between solutions, users and networks, including use case diagrams created using Unified Modelling Language
4 Features of context diagrams and data flow diagrams
5 Features of functional and non-functional requirements
6 Constraints that influence solutions, including economic, legal, social, technical and useability factors
7 Factors that determine the scope of solutions
8 Features and purposes of software requirements specifications
9 Techniques for generating design ideas
10 Criteria for evaluating alternative design ideas and the efficiency and effectiveness of solutions
11 Methods of expressing software designs using data dictionaries, object descriptions, mock-ups and pseudocode
12 Factors influencing the design of solutions, including useability, affordability, security, interoperability and marketability
13 Characteristics of user experiences, including efficient and effective user interfaces
14 Naming conventions for solution elements
15 Security considerations influencing the design of solutions, including data protection and authentication
16 Styles of modern application architecture, including mobile, rich client, peer-to-peer and internet applications
17 Types of goals and objectives of organisations and information systems
18 Key legal requirements relating to the ownership and privacy of data and information
U4O1: Software solutions
Don’t know
Know a
little
Know a lot
1 Ways in which file size, storage medium and organisation of files affect access of data.
2 Uses of data structures to organise and manipulate data, including associative arrays (or dictionaries or hash tables).
3 Procedures and techniques for handling and managing files, including security, archiving, backing up and disposing of files.
4 Processing features of a programming language, including instructions, procedures, methods, functions and control structures.
5Algorithms for sorting, including selection sort and quick sort and their suitability for a given purpose, measured in terms of algorithm complexity and sort time.
6 Characteristics of efficient and effective solutions.
7 Techniques for checking that coded solutions meet design specifications, including construction of test data.
8 Validation techniques, including existence checking, range checking and type checking.
9 Techniques for testing the useability of solutions and forms of documenting test results.
10 Techniques for recording the progress of projects, including annotations, adjustments to tasks and timeframes, and logs.
11 Factors that influence the effectiveness of project plans.
12 Strategies for evaluating the efficiency and effectiveness of solutions and project plans.
U4O2: Interactions and impact
Don’t know
Know a little
Know a lot
1 Characteristics of wired and wireless networks
2 Reasons why individuals and organisations use information systems
3 Goals and objectives of information systems
4 Types of interactions (inputs and outputs) generated by information systems
5 Key legislation that affects how organisations control the storage, communication and disposal of their data and information.
6 Characteristics of data that has integrity, including accuracy, timeliness, reasonableness, authenticity, correctness
7Types and causes of accidental, deliberate and events-based threats to the integrity and security of data and information shared between information systems
8 Physical and software controls used by organisations to secure the storage and communication of data in a networked environment
9 Role of hardware, software and technical protocols in managing, controlling and securing data shared between information systems
10 Advantages and disadvantages for stakeholders affected by the operation of information systems
11 The impact of diminished data integrity on dependent systems
12 Tools and techniques for tracing transactions between users of information systems.
13 Data management practices that cause conflict between information systems, including data mining
14 Technical underpinnings of intranets, the internet and virtual private networks
Multiple choice
You need a pencil – and an eraser!Answer questions on multiple choice answer sheetCircle the answer on the question booklet itselfThen colour in the answer sheet
You do not have to complete questions in orderStart with the questions you feel most comfortable withRead each question carefully a number of timesUnderstand what the question is asking?
Underline key words
QuestionA physical control used to prevent unauthorised access to data and information is
A. encryptionB. locks on doorsC. username and passwordD. system protection software
QuestionA procedure checks user input for reasonableness. This type of check is called
A. user acceptance testing.B. evaluation.C. validation.D. testing.
Complete the questions you canThen move onto Sections B & C
Remember to come back to these later!!!
Do not leave any of the multiple choice questions blankYou have a 25% chance of guessing the correct answer
Question 1Testing involves establishing tests and expected results.
At what stage of the problem-solving methodology does testing occur?
A. designB. analysisC. evaluationD. development
Question 2Trace tables are used to test algorithms.
Which of the following best describes the characteristics of a trace table?
A. multi-column, multi-row, shows each variableB. multi-column, multi-row, shows each variable and the result displayedC. multi-column, multi-row, shows actual result, gives evidence of the test workingD. multi-column, multi-row, shows expected result, shows actual result, gives evidence of the test working
Question 3XML describes a set of rules for
A. displaying words in a document.B. inserting pictures into a document.C. designing the layout of a web page.D. formatting data for transferring and storage.
Question 6The Privacy Act 1988 is best described as legislation that outlines how
A. individuals should use personal information.B. organisations should collect and use health records.C. organisations should collect and use personal information.D. organisations should collect and use copyright information.
Question 8Mobile application architecture involves
A. facilitating the streaming of media.B. writing software for wireless devices.C. eliminating dedicated backend servers.D. providing functionality independent of a server.
Question 9An example of an evaluation criterion that measures the efficiency of a software solution is that the software solution should
A. generate accurate output.B. have an intuitive and easy-to-use interface.C. produce the output within a practical time frame.D. produce output that does not require the user to source additional information or perform additionalcalculations.
Question 10Joe has downloaded some information from the internet for his school project. Part of his project is toprovide details of the integrity of his information.
This means Joe must check his information for characteristics including
A. accuracy, effectiveness, security and timeliness.B. accuracy, timeliness, reasonableness and security.C. accuracy, authenticity, timeliness and reasonableness.D. accuracy, authenticity, effectiveness and reasonableness.
Question 12The following numbers are to be sorted in ascending order.
14, 7, 69, 27, 15, 23, 11, 10
After the second pass, the numbers are in the following order.
7, 10, 69, 27, 15, 23, 11, 14
What type of algorithm was used to sort the array?
A. quick sortB. bubble sortC. binary sortD. selection sort
Question 13The following is an example of pseudocode.
WHILE X is not equal to 9Add 1 to X
END WHILE
The lines of pseudocode above are best described as a
A. control structure.B. procedure.C. function.D. method.
Short answer questions
Answer structure
Use the number of marks as a guide to the number of points needed
1 mark = 1 word or sentence2 marks = 2 points or sentences3 marks = 3 points or sentences4 marks = 4 points or sentences
Number of Lines
The number of lines gives an indication of how much to write - you can write more or lessYou can use blank spaceBetter answers tend to be concise
Handwriting
Write as neatly as possible, legible is good! Print if you must.Write with ink pen rather than pencilStart each point on a new lineUnderline key words in each sentence
Verbs = Doing Words
Identify the doing words in each question
Underline the verb or doing word
Question (1 mark)State one control structure used in programming.
Sequence.
Question (2 marks)Give one example of a physical security control. Explain its purpose.
Barrier techniques
Barrier techniques include using locks on doors which stop people from physically accessing the hardware where data is stored.
Question (2 marks)Explain the purpose of a software requirement specification (SRS).
An SRS is a complete description of what the solution will do, including the requirements, constraints and scope
The SRS is used as input to the design stage, and used as a guide when designing the solution. The SRS also forms the basis of evaluation to determine whether the final software version delivers on the SRS promises.
Question (3 marks)Aardvark Security requires a solution that will send an alert to a security officer if an alarm is activated. State which non-functional requirement will be most important – response rates or portability. All officers will be using issued the same device. Justify your answer.
Response rates
The alert needs to get to the officer in time for them to respond to the alarm.
Portability is not as important because each officer will be using the same device.
Question (4 marks)State two different types of constraints that will influence a software solution. Give an example of each constraint.
Economic
The requirements included in the solution may be limited depending on the amount of money available for the project
Usability
The input method used to enter data may affect how the software solution is designed.
Link to case study
Question (2 marks)Daniel needs to complete a backup medical records each day. He is trying to decide to back up the data locally or back up the data to the cloud.
Discuss why a local back up would be a better choice.
A local back up would be better because in the case of data loss they will need internet access to retrieve the backup from the cloud.
As the backup contains medical records it would be important that these records are restored quickly, and securely.
Question (4 marks)The following criteria are to be used to evaluate the most appropriate design:
• Criterion 1 – The PIMS solution will provide parking tickets in a form that is complete.• Criterion 2 – The PIMS solution user interface must be clear and easy to understand.
Which option – Option A or Option B – should Kirsten choose? Explain why
Option A
All the information can be entered on the one screen so it improves the chance that the data will be complete
Sections have been used to clearly identify the data required to improve understandability
Option B may use different screens so it is difficult to check for completeness but this is also unclear what data may be needed.
Steps/procedure/strategy
Question (3 marks)Suggest a strategy that she might use to evaluate the timeliness of the notifications being sent to the parking officers.
1. After one month2. Count the number of tickets issued3. Compare to the number of notifications sent
Question (3 marks)David backs up all his files to the cloud on a Friday night.
Recommend a procedure David could complete to check if the back-up is completed successfully.
1. Calculate the expected size of the backup2. Complete the backup3. Compare the actual size to the expected size
Question (3 marks)Recommend a strategy that could be used to assess the effectiveness of a project plan in managing a project.
1. Set a criterion based on effectiveness e.g. timeliness2. Collect data about the actual time taken for each task3. Use the data to evaluate if the criterion was achieved
U3O1: Programming practice
Data types
Data types include:
Boolean Integer Floating point Character String
Question (4 marks)An example of an animal’s weight is 56.5 kilograms.
Indicate the most appropriate data type for each field.
Chose from integer, floating point, string, character or Boolean
ACIS No String – as it contains a spaceWeight Floating point – example givenGender CharacterBreeding Defects Boolean – only two possible values
Data structuresA data structure is used to organise and store data
Array Record Associative array
Question (4 marks)Duc needs to store members name, age and phone number in a data structure. Indicate which option would be the most appropriate – an array, record or associative array. Justify your answer.
Record.
A record is a data structure that can store data of different data types so it will fulfil Duc’s requirements.
An array can only store data if the same data type.
While an associate array can only store two values that are related, not three.
Design tools
Data dictionary Object descriptors Mock-up diagram Pseudocode
Pseudocode
Question (1 mark)Identify the output of the following procedure
BEGINA ← 1REPEAT
A ← (A * A) + 1UNTIL A > 2PRINT A
END
OUTPUT: 5
Question (1 mark)Identify the output of the following procedure
BEGINA ← 4B ← 2REPEAT
A ← A + 1B ← B * 2
UNTIL B > APRINT A, B
END
OUTPUT: 6, 8
Question (6 marks)A procedure starts. It sets Variable A to 1 and Variable B to 2. A loop is started. Variable A is doubled andVariable B has 1 added to it. The loop continues until Variable A is bigger than or equal to Variable B. The procedure then stops.
Write this as pseudocode.*Answers will vary*BEGIN
A ← 1B ← 2WHILE A>B DO {
A ← A * 2B ← B + 1
}ENDWHILE
END
Question (3 marks)Complete the following algorithm so that, at its end, the variable largestAge contains the largest number in the 1-D array of integers, ages. The array contains 1000 elements and ages [ 0 ] is not used.*NOTE arrays usually begin with A[0] as the first element*BEGIN
largestAge ← 0FOR i ←1 to 1000
IFages[ i ] > largestAge THENlargestAge ← ages[ I ]
ENDIFENDFOR
END
Question (6 marks)A school stores its Year 12 students’ names and ages in two separate arrays – Names [ ] and Ages [ ].The position of the students’ names in Names [ ] is the same as the position of their ages in Ages [ ].
Write pseudocode to print the names and ages of all students who are 18 or over where the number ofstudents in Year 12 is stored in the variable NoOfStudents.
BEGINFOR position ← 1 to NoOfStudents
IF Age[position] => 18 THENPRINT Names[position]PRINT Ages[position]
ENDIFENDFOR
END
Question (3 marks)The algorithm below contains five lines, three of which are not shown. Length and Width are variables.Write the next three lines of the algorithm that is needed to swap the contents of Length and Width. You may introduce other variables as needed.
Length ← 5Width ← 7
Temp ← LengthLength ← WidthWidth ← Temp
Question (6 marks)After Election Day, the council needs to prepare a list of those who have not voted.
The voters’ electoral roll contains a number of fields, including Surname, GivenName, StreetAddress, Suburb, Postcode and Voted.
To do this, it is necessary to read each voter’s details from the Electoral Roll file and display the fields Surname, GivenName, StreetAddress, Suburb and Postcode for those who are recorded as false in the Voted field. Each record is read until the EndOfFile is reached.
Write pseudocode for a procedure to perform this process.
BEGINREPEAT
READ Surname, GivenName, StreetAddress, Suburb, Postcode, VotedIF (Voted = False) THEN
DISPLAY Surname, GivenName, StreetAddress, Suburb, PostcodeENDIF
UNTIL EndOfFileEND
Question 2 (3 marks)The algorithm below contains 12 lines, five of which are not shown.
Competition_Score stores the score each student received in a competition. Two types of certificates are to be printed for students based on their scores. The variable Certificate stores the type of award to be printed.
A high-distinction certificate is printed when a student gets a score between 95 and 100. A pass certificate is printed when a student gets a score between 50 and 94. No certificate is printed if the score is less than 50.
Complete the algorithm to ensure that it functions as expected.*answers may vary*BEGIN
IF Student in Student Details File THENIF Competition_Score >= 50 THEN
IF Competition_Score >= 95 THEN Award equals “High Distinction” ELSEIF Award equals “Pass”
ENDIFENDIFPRINT “Certificate” Award
ENDIFEND
XML filesXML files are used to organise and transport data between software solutions.
Designed to be easy to read by both people and software.
XML uses tags to give data structure and meaning
<title>Star Wars</title>
Each piece of data is known as an element
Question (3 marks)When a parking officer issues a parking ticket, the following record (in XML format) is sent from the mobile phone application to the council’s fines payments system.
</infringement><?xml version=”1.0” encoding=”UTF-8”?><infringement><reg_pl> </reg_pl><bay_num> </bay_num><park_off> </park_off><c_make> </c_make><c_model> </c_model><c_col> </c_col><reason> </reason><time> </time><date> </date></infringement>
List three fields that the mobile phone application will send to the fines payments system in the XML file.
reg_plbay_numpark_off
Question (2 marks)Explain an advantage of an XML file over a plain text file.
An XML file uses tags to organise the data, where a text file does not.
An advantage of an XML file is the structure of the data is transported along with the data between solutions.
Processing features
Instructions Procedures Functions Methods Control structures (sequence, selection and repetition)
Question (2 mark)Explain how a procedure differs from a function.
A procedure is a self-contained section of code that completes a task.
A function is a procedure that returns a value to another part of the program.
Question (2 mark)State two control structures used in algorithm.
BEGINFOR i ← 1 to 4
Input ScoreTotal ← Total + Score
NEXTAverage = Total / 4PRINT Average
END
SequenceRepetition
SearchesLinearSearches through the array one item at a timeData can be in any order
BinaryChecks the middle valueDivides the array in half until the value is foundData must be sorted first
Question (2 marks)Describe one advantage of both a linear and binary search.
A linear search can be used when the data is not already sorted.
A binary search is much faster compared to a linear search. ‘divide and conquer’ approach
Question (2 marks)What would be the effect on the number of records read (on average) if the total number of records increased from 32 000 to 64 000 (doubled) using
a linear searchThe number of records that are read will double.
a binary searchOn average it would read one more record
Internal documentationInternal documentation consists of comments that are made within the code.Internal documentation describes complex sections of code to helps programmers understand the logic
Question (1 mark)State in which stage of the problem-solving methodology is internal documentation completed.
Trace tables
Question (3 marks)Complete the trace table assuming that the test data input was 3, 5, 6, 4 and 78.
BEGINFOR i ← 1 to 5
Input ATotal ← Total + A
NEXTPRINT Total
END
Trace tableVariable Value Value Value Value Value
I 1 2 3 4 5
A 3 5 6 4 78
Total 3 8 14 18 96
U3O2: Analysis and design
Software requirement specification
Functional requirements Non-functional requirements Constraints Scope Use case diagram Data flow diagrams
Question (2 marks)State two functional requirements of the solution
Register car arrivalsPrint parking ticketAny other use case
Question (2 marks)Describe what will be contained within the scope of the solution
The scope outlines what requirements will be included in the solution.It will also outline what requirements will not be included.
Use case diagramRepresent the functional elements of a system and how the users of the system interact with the functions
Question (3 marks)The manager of a real estate agency is having new software developed. The software will maintain the information on the system as well as add and remove new rentals. All agents need to be able to add the details of new clients who take up a rental property. Everyone must login.
Complete the use case diagram to show the stated requirements.
Data flow diagrams
Question (4 marks)Sally continues her analysis by drawing a context diagram and she has started a data flowdiagram (DFD).
a. List the entities involved.2 marks
VotersCouncil
There are three processes:
• Process A – Allocate votes to candidates• Process B – Prepare reports for each candidate• Process C – Check voter eligibility and record votes
From these processes, select the correct two for the circles labelled 1 and 2 in the DFD diagram.
b. Write your answers in the circles. 2 marks
1 = C 2 = A
Alternative design ideas
Question (3 marks)Which option would you recommend? Justify your answer
Option A includes a graph showing the growth of the stock so it is quick to calculate.It also includes a map of the property so it is easy to remember the location of the cattle.Option B requires both the growth and location to be calculated by the user.
Efficient and effective user interfaces
Efficiency Effectivenessless time Accuracyless money Completenessless effort Readability
AccessibleAttractivenessRelevanceUsabilityClarity
Question (2 marks)Explain how a drop down list improves the efficiency and effectiveness of data entry.
improves efficiency as it will take less time to input the data compared to a text box. improves effectiveness as it is more likely that the data selected is accurate.
Naming conventions
Hungarian notation camel Case PascalCase Hump Case
e.g. txtFirstName
Question (2 marks)Describe two features of a naming convention used.
In Hungarian notation the first three letters represent the type of object The remaining letters represent the purpose of the object.
All others use longer meaningful names, rather than shortened code-like names Filenames are no longer restricted to 8 dot 3, so meaningful variable names assist understanding
for someone unfamiliar with the code.
Project management
• Gantt charts • milestones• dependencies• tasks• sequencing• time • resources• ‘critical path’
Question 1 (5 marks)Kirsten plans to set up the parking infringement monitoring system (PIMS). She decides thatbuying the dedicated computer for the council office and the bluetooth printer as well as settingthem up will take four days; writing, testing and debugging the software for the dedicated computerwill take 25 days; writing, testing and debugging the application for the mobile phones will take20 days; and testing the whole system and making sure it works will take seven days.
a. Complete the Gantt chart below to show how the four tasks could be completed within40 days.
4 marks
b. The task ‘test system’ cannot begin until both programming tasks are completed.Show how this situation is represented on the Gantt chart above.
1 mark
Application architecture
MobilePeer to peerRich clientInternet applications
Question (2 marks)Explain how a mobile application differs from a rich client application.
A mobile app completes most of the processing on a central server.A rich client app completes most of the processing on the users device.
U4O1: Software solutions
Access of data on files
Serial and random access Access speeds
Question (2 marks)Susan wishes to download an App for her Smart Phone. The file size of the App is 240MB and the average download speed of Susan’s internet connection is 16Mbps
Calculate the time required to downloaded the app.
240 MB / 16 Mbps240 MB x 8 = 1920 Mbps
1920/16 = 120 seconds = 2 minutes
Question (3 marks)Management of a Supermarket need to make a decision about whether they need to replace the current file server.
Their current server has a capacity of 250MB and they have 1000 different items of stock. Each stock record needs at 250KB storage space.
Recommend to the Supermarket if they should upgrade their file server. Use calculations to support your answer.
250 MB = 250 000 KB / 250 KB = 1 000 records on the server
They should get a new server immediately, as the server is operating at capacity. Before they can increase the number of stock items they will need more server storage space.
Sorting
Selection sortA selection sort works by identifying the smallest value in the arrayIt then moves the smallest value to the start of the array and then searches for the next smallest value
Quick sortFirst a value is selected as the pivotThen all items are sorted lower or higher than the pivot
Question (1 mark)The following numbers are to be sorted
14, 7, 69, 27, 15, 23, 11, 10
After the 2nd pass, the numbers are in the following order.
7, 10, 69, 27, 15, 23, 11, 14
What type of algorithm was used to sort the array?
ANSWER: Selection sort
Project progress
Three techniques can be used to record the progress of a project
Project log (diary) Annotations Amendments
Question (2 marks)Identify two techniques that could be used to record the progress of a project.
Project log (diary) with annotations Change log with detailed amendments
Evaluation
Does the working solution meet the requirements stated in the analysis stage?
An evaluation strategy includes
Criteria A timeline Data needed How the data will be collected?
Question (3 marks)Dan needs to evaluate if his online solution is easy to use.
Outline a strategy that can be used.
1. One month after the solution is released2. Collect opinions about the usability of the solution3. An online survey to collect the data
U4O2: Interactions and impact
Goals and objectives
GoalsGoals are general aimsProvide timely information
ObjectivesObjectives are specific and measureableProvide information in within 60 seconds of a request
Question (2 marks)Below are two aims of a new solution
The new internet application will increase profit The new internet application will increase sales by 10%
State which aim is an information system objective. Give a reason for your answer.
The new internet application will increase sales by 10%Objectives are specific and measurable and normally contain numbers or percentages
Data integrity
Refers to the quality of the data used within a software solution
Accuracy Timeliness Reasonableness Authenticity Correctness
Question (2 marks)Anita has created an app where members of the public will submit reviews about the surf conditions at beaches around Australia.
Discuss two factors that may affect the integrity of the data submitted.
1. TimelinessBy the time a review is submitted the conditions may have changed
2. AuthenticityIt is possible that some reviews may be made up
Key legislation
Laws in Australia set by the government that organisations have to follow including:
Privacy Act 1988 Privacy & Data Protection Act 2014 Health Records Act 2001 Copyright Act 1968 Charter of Human Rights 2006 Spam Act 2003
Question (2 marks)Name a key piece of legislation that affects how organisations communicate their data and information, and provide a specific example of how an organisation can fulfil this requirement.
Privacy Act 1988When data is communicated it can be encrypted to keep the data secure.
Data mining
Examining existing large data sets (that where collected for one purpose) to identify any unexpected patterns and relationships within the data (and using this for another purpose).
Question (2 marks)Describe two issues caused by data mining.
Data mining may result in the privacy of individuals to be breached and this may upset some people.
When searching through existing data sets this may slow down the performance of an information system frustrating users
Dependent systems
Many information systems get data from other information systems. Problems occur if the data acquired from other systems lacks integrity.
Different systems may have different data types and data structures which causes problems when data is transferred between systems.
Question (2 marks)Below are outputs from two systems of the same data at the same time.
Give a reason why the information provided differs
The two systems have used different data types to display the information.This has resulted in different outputs being produced.
Threats to data
Accidental Deliberate Event-basedUser error Malware FirePower outage Hackers Lighting strikeHardware failure Data theft Power surge
Security controls
Software PhysicalUsername & password Barrier techniques (locks)Encryption Biometric securityFirewall BackupsSystems protection Shred documentsAccess restrictions Power surge protector
Question (2 marks)Outline a security control used to reduce the chance of a power surge caused by lightning strike.
Power surge protector.A power surge protector will protect hardware from being damaged in the case of a power surge occurring.