[Year 12 IT Apps] are we in the cone of silence or ...AND MCQ 11

Geoff Moss geoffmoss37 at bigpond.com
Wed Nov 10 17:28:36 EST 2010


Janet

I tended to think along the same lines as your techie as well on MCQ 3.

Correct for 16 too.  The primary keys are indicated by the key and the links 
do not relate only primary key fields.

Mark, in MCQ 11 (on our website Post Mortem) your reasoning is correct, 
except you indicated D was correct instead of C.  Thanks again for your 
first up Post Mortem.  I, among others applaud your efforts to put your 
evaluationout there.

Regards

Geoff Moss
RMIT

----- Original Message ----- 
From: "Bane, Janet A" <bane.janet.a at edumail.vic.gov.au>
To: "Year 12 IT Applications Teachers' Mailing List" 
<itapps at edulists.com.au>
Sent: Wednesday, November 10, 2010 10:27 AM
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...


I have just been speaking to our technician who is a gun at these things. 
He was scratching his head about question 3 as well and didn't think any of 
the suggested answers would work.  When pushed, he suggested d - virus 
protection software might be the answer.  The reason being that it might 
detect a hacker trying to get into password protected files. I'm still not 
sure!

Question 16 was pretty easy IMO - answer is B.   The common field *Music 
teacher ID* is in all three tables, so its common fields in different 
tables.

regards



Janet Bane
Patterson River SC

________________________________

From: itapps-bounces at edulists.com.au on behalf of ATKINSON-BUCK, Damien
Sent: Wed 10-Nov-10 10:11 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...



I think the key is that CCTV is the only one that detects anything, B & C 
are keeping the data safe and A is non-existent.

I have issues with the wording of MC 16 - assuming A is correct, but 
shouldn't it be Primary and Foreign keys in different tables?



Damien Atkinson-Buck
Member of Academic Staff (Secondary)

________________________________

cid:image002.jpg at 01CA7D93.5FFD22D0 <http://myivanhoe.net/>



PO BOX 91 The Ridgeway, Ivanhoe, Victoria 3079 Australia
Telephone +61 3 9490 3848 Facsimile +61 3 9490 3490
mailto:damien.atkinson-buck at ivanhoe.com.au 
<mailto:damien.atkinson-buck at ivanhoe.com.au>
http://myivanhoe.net <http://myivanhoe.net/>








From: Paul Miller [mailto:pmiller at olsh.vic.edu.au]
Sent: Wednesday, 10 November 2010 9:43 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...



Not a great question, but in my opinion, I would say that a keyboard swipe 
authenticates the user and has the possibility of logging all actions on the 
computer. But then I would have imagined that auditor trails/logs would be 
the form of detection, not the keyboard swipe. Ridiculously, I would 
probably agree and say that of the 4 options, CCTV would be the best.



From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au] 
On Behalf Of Bane, Janet A
Sent: Wednesday, 10 November 2010 9:18 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...



I'm still ruminating on that one...



I googled keyboard swipe and even they couldn't tell me what it was.  Is it 
something like they use at the bank where a card gets swiped through some 
magnetic reader and it reads customer details?  I can't see how that would 
detect unauthorised access to a pasword protected file though....



Encryption software.   Hmm   It doesn't say the password is encrypted.  So 
I'm not sure thats relevant either



Closed circuit TV - well it could detect if someone trying to access a file, 
if it was zoomed right in at the keyboard, at the right place at the right 
time - surely not a practical solution though!



Virus protection software - maybe, although I wouldn't have thought 
detecting unauthorised access to a password protected file would be its 
primary function.



So if I had to have a punt I would go for c.  maybe!



regards



Janet Bane
Patterson River SC



________________________________

From: itapps-bounces at edulists.com.au on behalf of Mark Scott
Sent: Wed 10-Nov-10 8:37 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: Re: [Year 12 IT Apps] are we in the cone of silence or ...



Too easy, but having said that...

Would be interested in what people thought of MC Q3

thanks
Mark Scott
Luther College

"The busier you get, the slower you walk" anon


-----Original Message-----
From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au] 
On Behalf Of Brendyn Hancock
Sent: Wednesday, 10 November 2010 8:06 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] are we in the cone of silence or ...

All

Exam comments.

B

Brendyn Hancock
ICT Manager
Nagle College
PO Box 507
BAIRNSDALE VIC 3875
p 03 5152 6122 ext954
f 03 5152 6220

Disclaimer: This email and any attachments may be confidential. If received 
in error, please contact us and delete all copies. Before opening or using 
attachments check them for viruses and defects.
Regardless of any loss, damage or consequence, whether caused by the 
negligence of the sender or not, resulting directly or indirectly from the 
use of any attached files our liability is limited to resupplying any 
affected attachments. Any representations or opinions expressed are those of 
the individual sender, and not necessarily those of Nagle College. < 
http://www.nagle.vic.edu.au <http://www.nagle.vic.edu.au/> >



Scanned by Sonar.
Date: 2010-11-10 08:06:23.144
From: bhancock at nagle.vic.edu.au
To: itapps at edulists.com.au
Profile: default_out
Mail id: challenge-9336782927b78-0

_______________________________________________
http://www.edulists.com.au <http://www.edulists.com.au/>  - FAQ, resources, 
subscribe, unsubscribe IT Applications Mailing List kindly supported by 
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html - 
Victorian Curriculum and Assessment Authority and http://www.vitta.org.au 
<http://www.vitta.org.au/>   - VITTA Victorian Information Technology 
Teachers Association Inc

_______________________________________________
http://www.edulists.com.au <http://www.edulists.com.au/>  - FAQ, resources, 
subscribe, unsubscribe
IT Applications Mailing List kindly supported by
http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html - 
Victorian Curriculum and Assessment Authority and
http://www.vitta.org.au <http://www.vitta.org.au/>   - VITTA Victorian 
Information Technology Teachers Association Inc



________________________________

The contents of this email are confidential. Any unauthorised use of the 
This email (including any attachments) is confidential. If you are not the 
intended recipient you must not copy, use, disclose, distribute or rely on 
the information contained in it. Confidentiality and legal privilege 
attached to this communication are not waived or lost by reason of mistaken 
delivery to you. Our Lady of the Sacred Heart College Bentleigh does not 
guarantee that this email or attachments are unaffected by computer virus, 
corruption or other defects. Any views expressed in this message are those 
of the individual sender and may not necessarily reflect the views of Our 
Lady of the Sacred Heart College Bentleigh.





Privacy, Virus and Copyright Warning

The information contained in this electronic message (e-mail), and any files 
transmitted with it:

* is intended for the named recipients only. If you have received this in 
error, please advise the sender and delete it and any copies immediately;
* Any personal information in this email must be used in accordance with the 
Privacy Act 1988 and this always applies even if it has been sent to you in 
error.
* represents the views of the sender and does not necessarily represent the 
views or formal advice of Ivanhoe Grammar School;
* may be subject to Copyright, so no further use should be made of it 
without the author's permission.

The School does not represent or warrant that the email or any files 
attached do not contain errors or are free from computer viruses or other 
defects nor does it accept responsibility for any loss or damage resulting 
directly or indirectly from the use of the email or any attached files.

Important - This email and any attachments may be confidential. If received 
in error, please contact us and delete all copies. Before opening or using 
attachments check them for viruses and defects. Regardless of any loss, 
damage or consequence, whether caused by the negligence of the sender or 
not, resulting directly or indirectly from the use of any attached files our 
liability is limited to resupplying any affected attachments. Any 
representations or opinions expressed are those of the individual sender, 
and not necessarily those of the Department of Education and Early Childhood 
Development.



--------------------------------------------------------------------------------


> _______________________________________________
> http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe
> IT Applications Mailing List kindly supported by
> http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html - 
> Victorian Curriculum and Assessment Authority and
> http://www.vitta.org.au  - VITTA Victorian Information Technology Teachers 
> Association Inc 



More information about the itapps mailing list