You are on page 1of 214

Briefing Session on

2014 HKDSE ICT Exam

28/29 Nov 2014

1
Programme
Introduction
Paper 1A, Paper 1B, Paper 2A
Break
Paper 2B, Paper 2C, Paper 2D
Q&A

2
Breakdown of elective

No. of candidates

1 7,400
2A 879
2B 226
2C 5,114
2D 1,163 3
Interesting Figures
Paper Min/Max Mark Attained

1 0-92
2A 0-53
2B 2-51
2C 0-52
2D 0-57

4
Performance – Compulsory Part
Average no. of MC items correct = 26
High correlation with Paper 2s and SBA

5
Performance – Elective Part
Equating – performance of candidates
(Elective Part) can be reflected on the
same scale (Equipercentile method )
Performance (Paper 1) of students in
2D > 2A > 2C > 2B
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)

6
Grading Procedures 
Sample script selection
Standardisation
Post-marking exercise
Panel of judges grading meeting
Internal meeting
Public Exam Board meeting
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)

7
ICT (All candidates)
Level %
5** 0.7
5*+ 2.9
5+ 7.1
4+ 23.8
3+ 48.8
2+ 77.8
1+ 93.6
8
Levels attained
HKDSE Level 4 comparable to
HKAL Grade D
L5** Top 10% of L5
L5*+ Top 40% of L5 (L5* = next 30%)

9
SBA (1)
There was a serious plagiarism case
involved a student who directly copied a
report from another student. A zero mark
was given to the SBA and a downgrade
by one level in ICT was imposed on the
student.

10
SBA (2)
A few students submitted a report
without any prototype of ICT
applications. Students are advised to
not only summarise the data and
information collected, but also carry out
further in-depth analysis with critical
thinking.

11
SBA – Reminders
2015 Exam (new arrangement)
4 assessment criteria
Record of assessment (various formats)

12
2014 ICT Exemplars
Paper 1B: 2 exemplars (1 with annotated
note) @ Level @ language
Paper 2 – selected levels available
Uploaded to www.hkeaa.edu.hk

13
Paper 1A

14
Statistics(1)
Average no. of MC items correct
Eng = 28
Chi = 25
Best five: Q.7, 12, 14, 17, 35
Poor five: Q.3, 4, 6, 26, 31
Discrimination power:
High five: Q.14, 17, 25, 29, 32
Low five: Q.1, 3, 8, 9, 15
15
Statistics(2)
The majority choose a different answer

Question Key Majority


3 A D
8 A B
9 D C
26 D B

16
Marking
Quality control: standardisation,
checkmarking, control scripts, etc.
Marking schemes
Marking guidelines agreed after standardisation
may not exhaust all possible answers
professional discretion and judgment in
accepting alternative answers (correct and well-
reasoned)

17
Question Paper Design
Difficulty level up to
Comprehensive knowledge & understanding
Advanced skills & excellent use of software
Unfamiliar, complex issues
Communicate complicated ideas & solutions with
coherent use of terminology

Reference: HKDSE ICT Level Descriptors

18
DSE ICT 2014

Briefing Session

Paper 1B (Q1, 3, 5)

28.11.2014(Fri) and 29.11.2014(Sat)

Q1

Satisfactory
 quantity of lunch set
Q1

Poor
 validation check for non-numerical data

Fair
 the money to be paid for the lunch sets
 waiting time
the output data should be considered as
the needs of the waiters
Q1

Good

Satisfactory
 tool or an application available in spreadsheet software
Q1

Poor
 Sorting
 advantages of database software over spreadsheet
software
Q3

Fair
Q3

Poor
Q3

(i)&(iii) Good
(ii) Poor
Q5

Satisfactory
 email, searching and downloading information through
the Internet
Q5

Very good
 Easy to use, higher efficiency
Q5

Satisfactory
 Cross-platform

Fair
HKDSE ICT 2014

Exam paper marking review

Marking guideline
 Fairness
 Marker not do GUESS of student answer
 Professional
 As students are studying ICT,
 Answer should be more technical /
professional
 Others
 Not accept too general answer
 Not accept answer seems direct copy from
qu
Function of marking review

Know the Know the


suggested marking
answer flexibility

Know Enhance
candidate teaching
performance strategies
1B Qu 2
1B Qu 2
1B Qu 2
1B Qu 2

 A company has branch offices in


different countries. The computer
networks in the offices form a wide area
network. Ms Wong regularly visits the
offices. She will use a notebook
computer to connect to the wide area
network.
1B Qu 2

(a) Other than email, suggest three types


of computer applications Ms Wong can
use to transfer files.
1B Qu 2a – 3 applications for file transfer
IM Accept [Cloud] at
P2P marking stage
FTP Not accept

[software /

Cloud platform ‘name’]

Good
More practice
Except some state
conncetion method
on software
like WiFi, IR categories
1B Qu 2

(b) In an international airport, Ms Wong


can directly connect to the free Wi-Fi
network. Ms Wong finds that the speed
of the Internet connection is slow
although the network signal is strong.
Why?
1B Qu 2b – Wifi signal strong, bandwidth low

Too many connection Simply [share]


 share bw/
 1 mark
Has bandwidth limit 
prevent occupied

Most can state [Too many


connection] Scenario + reason
Not much can state
[Share] Term : [Share]
1B Qu 2

(c) When Ms Wong visits the branch office


in Singapore, she needs to install a client
program to connect to the Wi-Fi network
in the office. Give two benefits of using
this client program for this purpose.
1B Qu 2c – client program for connection

Security (authen / Accept [Network


encrypt) / activities monitoring
/ recording]
Resource control

Most can state out


[security], but not in depth Security 
Less can state reason general term, be
other than security more specific
1B Qu 2

(d) Ms Wong goes on a business trip to


Vietnam. She needs to bring her
notebook computer, tablet computer and
smart phone to connect to the Internet
through a data port on the wall of her
hotel room. State the hardware she
should have and describe the network
connection briefly.
1B Qu 2d – travel router setup
Wall > cable > wireless
router > WiFi > devices
Not accept
/ [share network
Wall > cable > Notebook connection of
as hotspot > WiFi > mobile device]
devices

Most can state the


connection and Answer should
router but some echoing the
missed [wireless] scenario of the qu
1B Qu 2

 Ms Wong’s colleague in Hong Kong,


David, creates a simple web page for Ms
Wong so that she can send files back to
the server in Hong Kong when visiting
branch offices.
1B Qu 2

(e) To construct the web page, David uses


a text editor to write HTML code instead
of using a web authoring tool. Give one
benefit of each tool.
1B Qu 2e – text editor vs web authoring tools
Txt : in all OS / Technical answer

concise code are well accepted

Auth. Tool : [convenient] is not


WYSIWYG / user accepted
friendly

Unexpected fair
performance Answer seems simple, but
as overlooked  student
Students answer are too
using too general terms
general, not technically
(like simple, convenient)
specific
without elaboration
1B Qu 2

(f) Ms Wong sends David a data file using


the Public Key Infrastructure (PKI)
technology.
What is the benefit of having the PKI?
1B Qu 2fi – benefit of PKI
Avoid
unauthorized Authorize
access /
authenticate authenticate
sender

Generally ok Be care of
spelling
1B Qu 2

(f) Ms Wong sends David a data file using


the Public Key Infrastructure (PKI)
technology.
Briefly describe a way that PKI is used to complete the
file transfer.
1B Qu 2fii – describe PKI in file transfer
Ms Wong use David
Correct sender
public / own private

David use own


Correct key of
private / Ms Wong who
public

Satisfactory Emphasis the


components all need to be
(as not first year involved in the answer
(sender, direction, which
has this type of qu) key of who)
1B Qu 4
1B Qu 4
1B Qu 4
1B Qu 4
1B Qu 4

 Mr Chan develops a computer system in


a school. He creates a table, STUDENT,
to store student information. The first five
fields of STUDENT are listed below:
1B Qu 4

(a) (i) Mr Chan does not use Hong Kong


identity card numbers as LOGINID. Why
not? Explain briefly
1B Qu 4ai – not using HKID as LOGIN-ID
Not accept
Personal data incorrect spelling,
/ Privacy not accept too
general answer
like [important]

Spelling of Terms
Concept of [private] vs
[personal] Not use too general
terms or otherwise
Spelling : 私穩 , piracy
need elaboration
1B Qu 4

(a) (ii) Mr Chan uses email addresses as


LOGINID. Why? Explain briefly.
1B Qu 4aii – why using email as LOGIN-ID

Email is
Expression
similar to
unique
[unique] 
accept

Satisfactory, except
Emphasize
some mentioned the
function of email in answer stick with
forget password scenario provided
1B Qu 4

(a) (iii) Mr Chan should not use CLASS


and CLASSNO as a composite key field
to identify records. Why not? Explain
briefly.
1B Qu 4aiii – not using CLS & CLS-NO.

Will change
@ year same
every year
code different
student

Student know they


are not unique, but
may not able to
Do practice of

mention yearly this scenanio

difference
1B Qu 4

(b) Suppose that there are four records in


STUDENT, as shown below.
1B Qu 4

(b) (i) Mr Chan executes the following SQL


command. What is the output?
SELECT CLASS, USERNAME FROM
STUDENT ORDER BY CLASS
1B Qu 4bi – SELECT statement result
1A Ho King Wan Output field in
1B Wong Pak Ting order
1B Fan Hoi Kan
1C Cheng Ching Yee Record in order

Good SQL  2 marks


Marking logic
1B Qu 4

(b) (ii) Of the passwords in the four records,


which one is the most secure?
1B Qu 4bii – which pw most secure

3HgQ7@e Can locate


the record

Very good Keep …


1B Qu 4

(b) (iii) Suggest two principles for

designing a good password.

1B Qu 4biii – 2 principles of good pw


Capital letter,
Pw length
small letter,
Pw complexity number, symbol
Pw nature  same reason

Very good Answer to 2 mark


 2 different
domains
1B Qu 4

(c) Mr Chan exports data from some fields


in STUDENT into a spreadsheet file.
Unauthorised persons might be able to
access the file. How can Mr Chan protect
the data? Give two methods.
1B Qu 4c – file access setting
Spreadsheet set pw
Software level
protect /

Set file or folder


OS level
access /
Encrypt
Encrypt /

Storage
Storage location

Fair

More practice on
Most can state pw
access right (VM
protect & encryption
can help)
but not access right

1B Qu 4

(d) (i) Mr Chan wants to add an extra field

CNAME to STUDENT to store students’


Chinese names. Which code, Unicode,
GB code or Big-5 code, should he use?
Justify your answer.
1B Qu 4di – chinese character encoding

Unicode : more support Can state the


to diff character set
adv of
GB/Big5 : less space
unicode  ok

Good, as already More emphasis on


happened in qu adv of GB / Big5  in
year(s) before case need to answer
1B Qu 4

(d) (ii) Mr Chan uses a word processor to


print some letters to be sent to students
to inform them about their login
information and asking them to activate
their accounts. Suggest an efficient way
for him to do this.
1B Qu 4dii – advance word processing fct

Mail merge Be care about


spelling
mistake

Satisfactory, except
More practice on
some simply write
[mailing], or [合拼] these type of
keywords
Briefing Session on
2014 HKDSE ICT Exam Paper 2A
Question 1

Question 1

Candidate Performance :
(i) Very Good. (ii) Good. (iii) Fair. (iv) Satisfactory.

Most candidates are able to manage simple SQL statements involving filtering,
ordering and grouping.

(a)(ii) wrongly used ‘=‘ instead of ‘LIKE’

(a)(iii) wrongly used ‘<>’ instead of ‘not in (subquery)’

* Accept grouping field(s) is/are not the same as the field(s) in the select clause.
Question 1

Candidate Performance :
(b) Fair. (c) Poor

(b) Less than 25% candidates can both correctly explain the problem and know the
term “referential integrity”.

(c) Candidates are lack of database design experience.


Some of them are able to suggest adding the field Qty into the table, but only a
small number of them correctly decompose the SALES into two tables.

Some candidates don’t quite understand the usage of “ISBN”


Question 2

Question 2

Candidate Performance :

(a)(i) Satisfactory. (a)(ii) Satisfactory. (a)(iii) Fair.

(a)(i) Half number of candidates know the advantage of indexing

(a) (ii) Only a small number of candidates are able to use SQL command to
create index correctly;
Some of them are not able to identify the primary key.
Question 2

Candidate Performance :
(a)(iii) Fair. (b)(i) Fair. (ii) Poor

(a)(iii) A lot of candidates don’t know how the index file be used.

(b) (i) Most candidates don’t know criterion of the field(s) for indexing.

(ii) Many candidates don’t know the disadvantage of indexing.


Question 2

Candidate Performance :
(c) Good. (d) Satisfactory. (e) Satisfactory.

(c) Most students well answered the question.


* Accept both CDOB <= “1990-12-31” and year(CDOB) <=1990
* Not Accept YEAR(…) <= “1990” since the return of the function YEAR() is an integer.

* Accept “1990-12-31”,‘1990-12-31’, #31/12/1990#,{31/12/1990} and …


* Not Accept 31/12/1990, 31-12-1999

(e) Much better than past years. Less candidates directly explain the SQL command.

Question 2

Candidate Performance :
(f)(i) Satisfactory.

(ii) (iii) Many students can point out the advantage of normalization, but don’t know
the drawback of it.
Question 3

Question 3

Candidate Performance :
(a) Very Good

* Get 1 mark when one of the entities is correct


* Get 1 mark when one of the relationship is correct
* Get 1 mark when one of the cardinality is correct
Question 3

Candidate Performance :
(b) Fair. (c) (i) Poor. (c)(ii) Poor.

(b) Many candidates don’t know the meaning of “Prototype”.

(c) (i) Many candidates don’t understand the scenario and even don’t know the
meaning of data conversion.

(c) (ii) Candidates are lack of database operation experience.


Question 3

Candidate Performance :
(d) (i) Satisfactory. (ii) Fair.

(d) (i) Many candidates think the problem is caused by lack of network bandwidth

(d) (ii) Many candidates think limiting the number of access can solve the problem,
but this does not actually improve the situation.

* Not accept “upgrade the computer”


Question 4

Candidate Performance :
(a) (i) Very Good.
Question 4

Candidate Performance :
(a) (ii) Fair. (iii) Poor.

(a) (ii) Half of candidates can correctly identify the redundant field.

(a) (iii) Candidates show insufficient knowledge of domain integrity and get confused
with data validation check.
Question 4

Candidate Performance :
(b) (i) Good. (ii) Good.

* Not accept “manage the database”


Question 4

Candidate Performance :
(c) Satisfactory.

Some candidates don’t understand what is candidate key and get confused with
foreign key.
Question 4

Candidate Performance :
(d) Very Poor.

Many candidates don’t know there are “distributed database model” and “parallel
database model”. Some of them concentrate on the cost and hardware
requirements of the database model.
Question 4

Candidate Performance :
(e) Satisfactory.
Test candidates’ mathematics ability.

(i) Distributed database: 300,000 + 100,000 x 5 = 800,000


Parallel database: 900,000 + 100,000 x 2 = 1,100,000
Distributed database model is better.

(ii) 300,000 + n x 5 = 900,000 + n x 2


n = 200,000
When there are more than 200,000 queries per month, the parallel database
model is better.
DSE ICT 2014

Briefing Session

Paper 2B (Q1, 3)

28.11.2014(Fri) and 29.11.2014(Sat)

Q1

Satisfactory
Q1

Good
Q1

Satisfactory

Good
Q1

Good
Q1

Good
Q3
Q3

Good
Q3

Satisfactory
Q3

Good
Paper 2B
2B Qu 2

 Susan sets up a peer-to-peer network for


the Sports Day of a secondary school.
She uses a UTP cable to connect and
transfer files between Computer A and
Computer B, as shown below:
2B Qu 2
2B Qu 2
2B Qu 2
2B Qu 2

(a) The IP configuration of Computer A is


IP address: 192.168.1.20
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.10
Computer A and Computer B are in the same
network. Write down a possible IP
configuration for Computer B.
 IP address:
 Subnet mask:
 Default gateway:
2B Qu 2a – network configuration
IP : 192.168.1.X (X<>0
or 255 or 20)

SM : 255.255.255.0
GW : 192.168.1.Y (Y<>0
or 255)

Very good Keep …, but add

some more
challenges to
students
2B Qu 2

(b) Susan successfully builds the network


linking the two computers. However, she
cannot use Computer A to transfer a file
to Computer B. Give two possible
settings that lead to this problem.
2B Qu 2b – access rights

Firewall setting
Antivirus with
description,
Folder access
FTP port closed
setting

Satisfactory, but More elaboration

some simply wrote to general terms

[block]
2B Qu 2

 A technology company sponsors the


school’s purchase of DevX
communication devices. Two pieces of
DevX can establish a contactless
communication channel by bringing them
close together. They support multiple
communication channels with other
DevX at the same time.
2B Qu 2

(c) Susan considers setting up a peer-to-


peer network and a client-server network.
(i) Complete the following diagram to illustrate the peer-
to-peer network formed by four pieces of DevX.
2B Qu 2ci – P2P network connection

Fair, most only draw


More practice to P2P
arrows connecting
network,
neighbouring devices
only Emphasis diff. between
drawing & actual
2B Qu 2

(c) (ii) Give a reason to support the use of


the peer-to-peer network.
2B Qu 2cii – reason to support setup P2P

No single point of Lower cost


failure Lower technical
requirement

most student More emphasis


cannot mention
on technical
single point of
failure answer
2B Qu 2

 Susan implements the contactless


communication for registration in all
events in the Sports Day. Each
participant carries a DevX as his or her
identity card to register at the event.
Participants’ registration information

should be stored in a computer. Susan


has two solutions, shown below:
2B Qu 2
2B Qu 2

(d) (i) Some registration information will be


transmitted from the computer to
participant’s DevX and displayed on the

DevX. Give two examples of the


registration information.
2B Qu 2di – example of DevX

Name / ID / Personal info


participating Event info
activities

Good More daily


experience
Answer need to be
categorized
2B Qu 2

(d) (ii) Susan decides to use Solution 1.


Give two advantages of Solution 1 over
Solution 2.
2B Qu 2dii – adv of different network connection

registration takes less Mobility


time as no need to plug
cable Connectivity
Support multiple
connection

Satisfactory More different


connection scenario
for student to
comment on
2B Qu 2

(d) (iii) Suggest two other daily uses of


DevX.
2B Qu 2diii – example of daily use
Sharing contact
Food
Contactless
payment ordering ….
Electronic identity

Satisfactory More
everyday
experience
圖片來源:
http://media.timesfreepress.com/img/photos/2011/07/12/071311_WEB_c_COMEDY641_v_t618
.jpg?ba5b5b122dd3d37cc13d83e92a6a0ec0d5bfa32a;
http://gallery.hd.org/_exhibits/bizarre/_more2008/_more03/supermarket-receipt-age-check-21-
for-garlic-bread-or-newspaper-mono-1-DHD.gif
2B Qu 4
2B Qu 4
2B Qu 4

 Ms Wong and Peter are going to set up a


network in the hall of a museum.
Thousands of visitors visit the hall every
day. The hall will provide a web-based
entertainment system and wireless
Internet connections for visitors via their
mobile devices. Ms Wong drafts the
network design shown below:
2B Qu 4
2B Qu 4

(a) (i) Peter suggests connecting the


access point to the router instead of
Switch P. What is the advantage and
disadvantage of his suggestion?
2B Qu 4ai – adv & disadv of relocation of nodes to network
Adv : Release the Adv : more secure to local
loading of Switch P. LAN as wireless network
cannot have direct access
Disadv : It is difficult to Disadv : Access to Local
control the connections LAN take more processing /
with visitors’ mobile Access to Local LAN may
devices have limitation

Poor More thinking on adv


and disadv of
different ways of
connection
2B Qu 4

(a) (ii) Ms Wong decides to connect the


web server to Switch P. What is the
advantage and disadvantage of her
decision?
2B Qu 4aii – adv & disadv of relocation of nodes to network
Adv : Better network Adv : More direct access to
security control of the Web Server from Local LAN
web server. Disadv : less secure as
Web Server can be directly
Disadv : Increase the accessed by workstation in
loading of Switch P. Local LAN but not protected
by Router

Poor More thinking on adv


and disadv of
different ways of
connection
2B Qu 4

(a) (iii) The five workstations should only


be used to access the entertainment
system. What network settings need to
be used to prevent users from doing
other network activities?
2B Qu 4aiii – access control in network

URL / IP level Setup firewall


restriction + / proxy server
description

Poor More teaching is


needed on filtering
/ access control
2B Qu 4

(b) Ms Wong uses her workstation to


access a web page but cannot do so.
Suggest three ways of troubleshooting
the connectivity problem and explain
your answer briefly. Name the
commands and tools used if appropriate.
2B Qu 4b – network troubleshoot technique

ipconfig (self) Use other


ping (others) computers to try
browsing
Browser (web)

Poor
Ask student to
Most know the
command but not
explain the usage
explain of the command
2B Qu 4

(c) Peter suggests that Ms Wong establish


an access control list which includes
MAC addresses of visitors’ mobile
devices. This would mean that only
these mobile devices can connect to the
access point.
(i) Ms Wong disagrees with Peter’s suggestion.
Give two reasons to support her opinion.
2B Qu 4ci – adv & disadv of MAC filter

Too many user  Practicality


difficult to manage Management
Device may change [time consuming]
 difficult to update  ok

Good Keep ..
2B Qu 4

(c) (ii) Apart from the access control list,


suggest two security measures Ms
Wong can implement when setting up
the access point.
2B Qu 4cii – AP access control

Hide SSID
Add access
Use encryption password
method

Fair Need more


practice of setting
basic function of
AP
資訊及通訊科技

試卷二(C)

多媒體製作及網站建構

Q.1

莉莉和小明正參與博物館資訊亭發展計畫。
他們設計了一個網頁,以展示星座影像。當
在網頁輸入星座名稱後,其星座影像會在一
個跳出式視窗內展示。下圖為一個示例。
Q.1

(a) (i)莉莉建議以向量圖形建構星座影像。舉出
一個理由,以支持莉莉的建議。

在視窗擴展時,影像將不會扭曲/模糊(質量)。
/影像在調整大小時將不會丟失任何資料,和影
像調整大小後將不會出現粗糙的邊緣。/
檔案較細小。
Q.1

(ii)小明建議以點陣圖形建構星座影像。舉出一個
理由,以支持小明的建議。

它是常用的格式,並能以大部分點陣為本的軟件
/瀏覽器讀取。(不同平台/操作系統)
No plug – in is required.
Smaller file size  better picture quality  higher
resolution  bitmap is most suitable for pictures /
images 
It has a high quality to display photo and
supported by many browser.
Q.1

(b)莉莉搜尋兩個星座,並產生兩個跳出式視
窗,如下所示:
Q.1

試寫出跳出式視窗的兩個控制屬性,可使視
窗避免重疊。

調整屏幕上的顯示位置。
調整跳出式視窗的大小(寬度/高度)。
或舉出一例子:
window.open(href,windowname,'width=400,height=200,l
eft=50,top=100,scrollbars=yes');

<target=_blank><target=_centre>/並排,縮小
Q.1

(c)莉莉進行網頁測試。
(i)她在沒有鍵入任何星座名稱下按「遞交」
按鈕,下列跳出式視窗即時出現。
Q.1

試描述這個互動網頁如何進行此數據確認。

使用客戶端手稿程式來檢查空白的輸入。

Program/local computer/browser is used to


check the blank input/check the field existence.

在按下“遞交”按鈕後,讀取輸入欄,如沒有
輸入星座名稱便會出現以上警告視窗
Q.1

(ii)她鍵入一個並不存在的星座名稱後按「遞
交」按鈕,數秒後下列跳出式視窗便會出現。
Q.1

試描述這個互動網頁如何進行此數據確認。

使用伺服器端手稿程式來校驗儲存於伺服
器內數據庫的星座。
server/database/Javascript
validate/exist/match
Q.1

博物館內有十個展覽區,配上編號1至10,展

示在以下博物館地圖。

莉莉以透明影像設計一條步行徑供遊客沿路
而行,如下所示:
Q.1

(d)莉莉再建構另外四個透明影像,各代表不

同的步行徑。她把所有影像與地圖結
合,讓遊客參觀時可選擇一條步行徑。
(i) 試舉出透明影像的一種檔案格式。

GIF/PNG
Q.1

(ii)試描述此地圖和這些透明影像如何讓遊客得
以透過網頁選擇一條步行徑。

地圖和影像是彼此覆蓋。
影像是可以通過CSS代碼控制,使所選擇的行
走路徑圖像顯示,並阻擋其他圖像顯示。

Overlap/layer/over/background/cover
Puttogether
Q.1

(e)莉莉希望於網頁中加入音頻檔案。試舉出
一個理由以支持使用以下格式:
(i) MP3

聲音是真實的/它包括人聲

(ii)MIDI
檔案較細小/可以容易進行精確的編輯
Q.1

(f)莉莉希望在一網頁內展示A.htm、B.htm和C.htm,其HTML
編碼如下所示:
<HTML>
<FRAMESETCOLS="*,*,200">
<FRAMESRC="A.htm">
<FRAMESRC="B.htm">
<FRAMESRC="C.htm">
</FRAMESET>
</HTML>
在以上視窗內寫上A、B和C,分別代表A.htm、B.htm和C.htm,
並繪畫一些線條以展示其大小。假設此視窗大小為1200x900。

Q.1
橫/柱框 A
A和B的大小相等
C的大小=200點
A和B的大小相等 B
C 200

C的大小=200點
A
B A和B的大小相等
C

A
C的大小=200點
B
C

200
Q.2

黃小姐是愛悅學校的一位項目統籌員,她將
統籌學校新網站的開發工作。
(a)黃小姐認為網站指南非常重要。試寫出網
站指南的兩個好處。
有助網站開發商了解網站結構。(主題/類別/
內容/資料/超連結)
有助用戶在網站內導航。(目標頁面)
鼓勵搜尋器將整個學校網站索引。(搜尋器
的關鍵字)x2
Q.2
某網頁設計如下圖所示:

Q.2

(b)(i)下方框內的網頁非常長。試建議一項網
頁設計功能,讓用戶更容易重回頁頂。

錨點(按鈕/返回頂部超連結)

只是按鈕/超連結/回頁首
回主頁
在上方框加入導覽列
Q.2

(ii)黃小姐直接列印此網頁,並發現很多分割
頁。其中一個分割頁的例子如下所示:
Q.2

試描述一個關於網頁設計的解決辦法。

創建一可列印版本和使用CSS來避免段落中
出現分頁。+

縮少字體 / 表格 + 有描述將不可以分開的位
置放在同一頁 +

「合適」列印格式/純文字版本
Q.2

(c)黃小姐決定於校訓「愛護我們的孩子!」
上採用「捲軸信息」效果。
(i) 試寫出一個理由,以支持黃小姐的決定。

可以吸引用戶的注意。

(ii)校長建議在超連結「進入」上採用同一效
果。你同意嗎?試簡略說明。
否,用戶將難以點擊移動中的連結。
Q.2

(d)網頁內其樣式的編碼如下:
<p style="text-align:center;font-size:30pt">學校開放日</p>
(i)黃小姐建議此樣式應在標記<head>內定義
為一個元素。試寫出一個理由,以支持黃小
姐的建議。
應用一風格至整個網頁。

 應用的時候不用每次打(可以重複使用)/
不需要逐個修改 
Q.2

(ii) 黃小姐決定將樣式定義儲存於一個獨立的
樣式表內。試寫出一個理由,以支持黃小姐
的決定。

必要時應用同一風格在網站內之網頁。

 可以應用到其他頁面 / 可以下載個樣式
表來參考
Q.2

(e) 學校將透過新網站提供現場視像,以便家長
觀看禮堂內的畢業典禮。試為黃小姐建議三個方
法以減輕網絡上的傳輸負荷。
降低幀速率(FPS)。
降低解析度。
限制網絡連接的數量/觀看者的數量 / 多點廣播。
提高頻寬。
提高壓縮比率 / 使用有更高壓縮率的文件格式或
檔案較細小。
降低位元率。
停止在伺服器內其他服務。  x 3
2014 DSE-ICT 2C

Question 3 & 4

• Grouping 群組/ select all 全選 Merge 合拼/ Combination 組合

• Select 選取 layer function 圖層功能 flatten layers 合拼圖層


• copy and paste cut link image together 
• Vertical flipping, mirroring 翻轉/反轉/鏡射
• Reflection 反射/invert 

• Rotate 旋轉 From left to right左右倒置

Fair:
• Some candidates just mentioned ‘interchange the left and right’ and
did not suggest a function that can be used.
• Tween 補間
• x 2
• Time interval between two images/ frame rate/ speed 

• Duration 

• Total numbers of images/ Total numbers of frames 

• Rotate resize color depth smooth  starting position


ending position 
• Path  Shape hint  偵速率
• x 2
• MP4 supports menus/subtitles/chaptering. 

• MP4 is fully compatible with H.264 /better compression 


• Small file size

• MP4 can be directly embedded within the HTML5 Internet standard / easier to be
inserted in web pages 

• Support streaming Plug-in is not required cross platform supported by

browsers 
• Better quality color depth is higher  compressed format more advance 
• 容量大 減少被修改的可能 無須轉換格式才可觀看

Fair:
• About a third of the candidates were able to name the correct technique.
• Candidates seemed to be unfamiliar with the differences between the
video file formats MP4 and FLV.
• A high proportion of candidates wrongly answered that MP4 could
support streaming while FLV could not.
• 500 kbps  60 s = 30000kb or 3.6 MB
• (3.5MB to 4MB or equivalent ) 
• 500x60, no unit 

• The actual file size is much smaller because data compression is used in
the video. 
• Bit rate is only 500kbps, so it is smaller than expected  Bit rate should be
used 
• Frame rate tween color depth  未經編碼
• (10  1024  1024  8)  16  2  60 = 43.7 KHz

• (40KHz to 44KHz or equivalent ) 

• Or

• dealing with the stereo in the expression

Fair
• Candidates were familiar with the relationship between the sampling rate
and the sample size of a video.
• Only a small number of the candidates were able to clearly explain how the
bit rate affects the size of a video file.
• Diffusion, polarizer (with description or self explained )
• Red eyes/ contrast/ brightening/ blur/ noise x2

• Video filters 
• Make file size smaller 
• 網頁過濾
• 年齡限制
• Name
• Photoshop 小畫家

Miss interpreted the technical terms in their answer!


• 1024 x 540 

• Or

• Correct aspect ratio (in whole number) less than 1024 x 540 

Fair:
• About a third of the candidates demonstrated an adequate knowledge of
photo editing.
• They were able to name filters and explain their effects clearly.
• Moreover, they were aware of the requirement of keeping the original
aspect ratio as well as the colour depth.
• 2x
• It has smaller file size. / It supports form filling. / It supports text copying. /
• It can be read by screen reader programs. / It can contain multiple images. /
• It can include multimedia elements (e.g. audio and video). / It can include
hyperlinks. /
• The text can be shown clearly (without zigzag) when its size is increased.

• can be encrypted, maintain format, read-only, cross-platform, better quality


for text
• JPEG is lossy compressed, easy to edit PDF, no distortion after enlarged

Poor
• Only a small number of the candidates were able to formulate satisfactory ideas
when analysing a comparison between the file formats PDF and JPG.
• The question page and the answer page are not synchronized /
not in the same horizontal line. 

• Note: accept concrete examples such as


• ‘It is very easy to answer Q8 in the text box of !7.’

• Printer friendly, Input wrong answer 


• Combine two frames / iframe / one-by-one
• Each design:
• Draft - practical (Synchroized)
• Design - concise (Navigation) 
• Explanation - clear 
Note:
1. The design should be workable if there are more than 10 questions.
2. For two similar designs, award the design with the higher mark only.

Satisfactory:
• About a third of the candidates pointed out the potential problem of the
design of the prototype.
• The majority of the candidates were able to suggest an appropriate design
to solve the problem.
• 2 + 4

• 3 + 6
• All questions depend on Question 1. (predictable) / trends
• Q is 2 times of P. /
• All answers are multiples of 
• For i from 1 to N
•  iterations
• P[i]  MyRand()
•  Assignment (index i)
• Q[i]  MyRand() or P[i]*2
•  All correct
Or
• temp = MyRand()
• For I from 1 to N
• P[i] = temp
• Q[i] = temp *2
• temp = temp + 1
Fair:
• About half of the candidates were able to trace the algorithm.
• Only a small number of the candidates were able to clearly describe how
to improve the script with the help of introducing the variable N.
• Candidates were generally unfamiliar with the concepts of looping and
iteration.
2014 HKDSE ICT-D

sharing workshop

2014-11-28

2014-11-29

Q1

Systems
Development
Answer Key

1. (a) (i) Implementation 1

(ii) Integration 1

(iii) A system test is done by developers while a UAT involves ultimate users to test the system with 1
authentic data. (people & data type)

(iv) Review and refine the previous process. 1

1. (a) (i) 實 施 1

(ii) 整 合 1

(iii) 系 統 測 試 是 由 開 發 人 員 進 行 , 而 用 戶 驗 收 測 試 則 是 由 用 戶 使 用 真 實 數 據 進 1
行 。( 人 員 與 數 據 )

(iv) 檢 討 及 改 進 前 一 個 階 段 1
Q1

Systems
Development
&
Algorithm
design
Answer Key

(b) (i) 3 1

(ii) 3
Start

Explanation of IVR to customers

Keypad number

Yes
9? End
No
Yes Module 1
1?

No
Yes Module 2
2?

No
Q1
(ii)

Programming
Answer Key

(c) (i) The service can be based on the first-in-first-out policy. 1

(ii) [Pascal version] [Visual Basic version] 4


Qfirst = Qlast  Qfirst = Qlast 
Q[Qfirst]  Q[Qfirst] 
(Qfirst + 1) mod n ,  (Qfirst + 1) mod n , 
+1  mod n 
[C version] [Java version]
Qfirst == Qlast  Qfirst == Qlast 
Q[Qfirst]  Q[Qfirst] 
(Qfirst + 1) % n ,  (Qfirst + 1) % n , 

(iii) The queue is empty. 1

(d) (i) n - 1 1

(ii) Some record cannot be retrieved using POP(). 1


/ Some elements in the queue will be overwritten.
Q2

Programming
Answer Key

2. (a) (i) 2 false false true false true false 2

(ii) n2 or 36 1
Q2
Programming
Answer Key

(b) (i) The values they store are the same. 2

(ii) When i=j, he does not need to store the information as it must be false. 1
When j<i, the (j,i)-th element in A is the same as the (i,j)-th element with i<j, so these 1
entries need not to be stored.
The total number of entries with i<j is 15.
Q2

Programming
&
Programming
langauge
Answer Key

(c) (i) (1,5) (2,4) (2,6) (3,5) (4,6) (and their reverses) 2

(ii) false (or 0)  3


p,i or their reverses; i and j are interchangeable 

p,j

(d) The development of mobile applications requires a short development life cycle. Library 2
functions in object-oriented programming can help shorten the development life cycle.
(reusability)
Q3

Programming
&
Data Structure
Programming
&
Data Structure
Answer Key

3. (a) (i) Amy, Jade 2

(ii) any value larger than the array size / negative values 1

(iii) 4 1

(b) 4
Address Content Previous Next
0 START -1 3
1 John 3 4  negligible
2 Mary 4 -1
3 Susan 0 4
4 Fiona 3 2

 each row
Q3

(d)

Programming
&
Data Structure
Answer Key

Q4
Programming
&
Algorithm
Design
Answer Key

4. (a) (i) FALSE 3


TRUE
TRUE

(ii) It checks whether the string in ST is a palindrome (回文) or not. 1

(iii) for i from 1 to n/2 1


Q4

Programming
&
Algorithm
Design
Programming
Answer Key

Answer Key

Candidates’ Performance

1.This paper assessed candidates’


understanding of ‘Programming’,
‘Programming languages’ and ‘Systems
Development’, and the application of ICT
knowledge in real life.

2.Candidates’ performance was generally


satisfactory.
Candidates’ Performance

1 (a) Satisfactory: Testing is a very important phase in the system


development life cycle. Only a small number of candidates
demonstrated a comprehensive understanding of various tests in the
system development life cycle.
(b) Very good: A high proportion of the candidates were able to
identify the order of the keypad numbers and complete the flowchart
correctly.
(c) Satisfactory: Only a small number of candidates completed the
program in (ii) correctly. Particularly, many candidates were not
aware that the checking of an empty queue was necessary.
(d) Poor: Only a very small number of candidates knew the
capacity of the queue and the problem encountered when inserting
a new element in a full queue.
Candidates’ Performance

2 (a) Very good: A high proportion of the candidates understood the


accessibility of the maze with the array.
(b) Satisfactory: A high proportion of the candidates were able to
discover the symmetric property of the array and identify the minimum
number of elements needed.
(c) Satisfactory: A high proportion of the candidates were able to
provide a set of correct parameters in (i). However, some candidates
did not complete the program in (ii) by using the variable p.
(d) Poor: Only a very small number of the candidates demonstrated
a basic understanding of the use of object-oriented programming
(OOP). Most candidates gave the characteristics of OOP which were
not suitable for the development of a mobile application.
Candidates’ Performance

3 (a) Good: A high proportion of the candidates


demonstrated a sound understanding of the
representation of the linked list.
(b) Fair: Only a small number of the candidates were
able to perform the operations and described the final
content of the linked list correctly.
(c) Satisfactory: The minority of the candidates
understood the concept of traversal of linked list and
they were aware that the additional ‘Previous’ pointer
could help the traversal.
(d) Good: In (ii), some candidates misused ‘file size’
instead of ‘memory usage.’
Candidates’ Performance

4 (a) Very good: A very high proportion of the candidates


were able to trace the algorithm correctly.
(b) Satisfactory: About half of the candidates completed
the program correctly. Some candidates made careless
mistakes in the index of the string operation.
(c) Poor: Only a very small number of the candidates
provided a correct answer. Candidates were not aware
that the subprogram in (b) could be utilised. Moreover,
they made errors in writing a subprogram such as the
function definition and variable declaration. This showed
that candidates might have insufficient practice in writing
programs.

You might also like