2023 CSC Examination
2023 CSC Examination
Question/Answer booklet
COMPUTER
SCIENCE
Place one of your candidate identification labels in this box.
Ensure the label is straight and within the lines of this box.
In words
Ref: 23-017
*CSC* CSC
COMPUTER SCIENCE 2
Total 100
Instructions to candidates
1. The rules for the conduct of the Western Australian external examinations are detailed in
2. Write your answers in this Question/Answer booklet preferably using a blue/black pen.
Do not use erasable or gel pens. Wherever appropriate, fully labelled diagrams, tables
and examples should be used to illustrate and support your answers.
3. You must be careful to confine your answers to the specific questions asked and to follow
any instructions that are specific to a particular question. Where no specific instructions
are given, you should feel free to use a range of formats to express your knowledge and
understandings.
This section contains 20 questions. You must answer all questions. Write your answers in the
spaces provided.
Supplementary pages for planning/continuing your answers to questions are provided at the end
of this Question/Answer booklet. If you use these pages to continue an answer, indicate at the
original answer where the answer is continued, i.e. give the page number.
Question 1 (2 marks)
Outline two legal obligations developers need to consider when creating new software.
One:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
Two:
Question 2 (2 marks)
Question 3 (3 marks)
Explain the role of the control unit (CU), arithmetic logic unit (ALU), registers and program
counter in performing the following A = B + C.
Question 5 (3 marks)
Question 6 (5 marks)
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(a) Compare the terms ‘referential integrity’ and ‘domain integrity’. (2 marks)
Aggregation:
Concatenated field:
Calculated field:
Question 7 (3 marks)
As a programmer, you have been asked to create an algorithm to hold numerical scores for a
basketball team. These scores are then used to calculate the average score for each player.
Which data type would be the most appropriate to use in the algorithm? Justify your answer.
(a) Outline a purpose for each of the following layers within the Department of Defence (DoD)
transmission control protocol/internet protocol (TCP/IP) model. (3 marks)
Transport layer:
Network layer:
Application layer:
(b) Apart from the number of bits required, identify two differences between the IP4 and IP6
protocols. (2 marks)
One:
Two:
Question 9 (8 marks)
(a) Describe one difference between the following programming concepts and identify
one benefit of each: (4 marks)
● modularisation
● functions.
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(b) Create the function SecondsToMinutes, which will convert seconds to minutes.
(4 marks)
The main module is shown below:
Main module
begin
Input(seconds)
minutes SecondsToMinutes(seconds)
Print(seconds, “equals”, minutes)
end.
Function:
(a) Explain how a program evaluation review technique (PERT) chart can be used to
manage a project. (3 marks)
(c) Draw a PERT chart below illustrating the following information. (6 marks)
9 Test system 10 7
10 Dummy activity 5 5, 8, 9
11 User test 8 10
Question 11 (6 marks)
Question 12 (6 marks)
A business is experiencing slow performance with its network. It has become worse after its
recent expansion, with more employees and devices connected to the network.
They have employed your services as a network consultant. You have identified two factors that
could be affecting the network – bandwidth and network design.
Describe each of the two factors and outline one solution for each that could improve the
network performance.
Bandwidth:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
Network design:
Question 13 (4 marks)
Describe how the following strategies are used to compromise the security of networks.
Denial of service:
IP spoofing:
Question 14 (6 marks)
a0
b 50
c=a+b
IF a > 0 THEN
c = b/a
ENDIF
Prnt ‘The value of c is’ c
Denominator = Input_num/0
Result = b/denominator
Describe each of the following errors with reference to the partial algorithm above.
Syntax error:
Run-time error:
Logical error:
Question 15 (7 marks)
(a) Describe one benefit of normalising data in a database to 3rd normal form (NF). (2 marks)
Field Description
StudentName Student first and surname
Note: a student is enrolled in one course. One course has many students. One course
has many subjects. One subject has many projects. One project has many students.
Question 16 (3 marks)
Explain how a code of conduct policy promotes ethical and lawful use of technology and data.
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
Question 17 (4 marks)
The context diagram (CD) below is supposed to reflect the following information.
Customers upload their 3D model in a supported file. They select the types of materials,
finishings and colours, dimensions and quantity. The business receives the model and prepares
a quote. The quote is sent to the customer. The customer confirms the quote, the job is sent to
the suppliers. The supplier accepts the job and provides a date for completion. Confirmation
and payment details are sent to the customer. The customer pays. The business provides
confirmation to the supplier to complete the job. The model is completed and sent to the
customer with the receipt. The business pays the supplier.
There are several errors in the CD. Indicate four errors on the CD by numbering the errors 1 to
4 and outline each of the errors indicated in the table below. Ensure the number corresponds to
the number identified on the CD.
Question 18 (7 marks)
An insurance company has hired you as a consultant to review its claims processes. You decide
to use several data gathering techniques to assess the current situation.
Observation:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(b) You decide that further information is required and provide a questionnaire to all staff
and conduct several interviews. Outline three differences between questionnaires and
interviews. (3 marks)
One:
Two:
Three:
Question 19 (4 marks)
(a) Describe one difference between the following data validation techniques: (2 marks)
● range checking
● type checking.
(b) Describe when you would use ‘type checking’ in an algorithm. (2 marks)
Question 20 (4 marks)
(b) Describe one advantage of using an iterative rapid application development (RAD)
system development methodology. (2 marks)
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
This section has four questions. Answer all questions. Write your answers in the spaces
provided.
Supplementary pages for planning/continuing your answers to questions are provided at the end
of this Question/Answer booklet. If you use these pages to continue an answer, indicate at the
original answer where the answer is continued, i.e. give the page number.
Refer to the information on pages 2 and 3 of the Source booklet to answer all parts of
It has been recommended that the movie theatre company consider conducting a feasibility
study before implementing a membership and reservation system.
(a) Outline four components that the feasibility study should address. (4 marks)
One:
Two:
Three:
Four:
The general manager is confused about the type of processing the company should incorporate.
(b) Describe two differences between ‘distributed’ and ‘parallel’ processing. (4 marks)
One:
Two:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(c) The general manager has heard about RAID and the different levels. Outline each of the
following levels. (3 marks)
Level 0:
Level 1:
Level 10:
Question 21 (continued)
(d) Use the information in the Source booklet on page 3, to create a context diagram (CD)
reflecting both the membership section and the reservation and ticket purchase section.
(5 marks)
(e) Draw a Level 0 data flow diagram (DFD) to model the membership and reservation and
ticket purchase system as described on page 3 of the Source booklet. (22 marks)
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
Question 21 (continued)
Due to time constraints, the company wants to implement a direct cut change-over method for
both locations after development.
(f) Describe why this is not recommended and suggest an appropriate implementation
method. (4 marks)
Refer to the information on page 4 of the Source booklet to answer Question 22 parts (a) to (e).
(a) Name the appropriate internal documentation below for each segment of code. (4 marks)
I #
II #
III #
IV #
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(b) Explain what would happen if a member tried to search a movie that is not on the
company’s list. (3 marks)
(c) Describe how the fixed (for) loop in the algorithm works. (2 marks)
Question 22 (continued)
(d) Describe how the ‘IF’ statement in the algorithm determines whether the selected movie
is in the list. (2 marks)
(e) Explain how you would modify the algorithm to allow the user to select multiple movies
from the list, rather than only one. (3 marks)
Question 22 (continued)
(j) Write in pseudocode the missing section in the Main Module for the first part of the case
statement. (7 marks)
It has been suggested that a centralised database system be used for the membership and
reservation system.
(a) Outline two reasons why this may have been suggested. (2 marks)
One:
Two:
It has been suggested by an outside consultant that the movie theatre company should use a
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
(b) Describe two reasons why a distributed database may not be a good idea. (4 marks)
One:
Two:
Question 23 (continued)
One:
Two:
Four:
Refer to the information on page 6 in the Source booklet to answer Question 23 part (e).
(e) Create an entity relationship (ER) diagram for the membership and reservation system.
Question 23 (continued)
(f) Describe two design considerations that you would consider in assisting the readability
and inclusivity of the movie theatre company’s database user interface. (4 marks)
One:
Two:
(g) Outline two methods the company can use to ensure their data is kept secure. (2 marks)
One:
Two:
Refer to the information on page 7 of the Source booklet to answer all parts of this Question.
(a) Identify six recommendations that could be implemented at each cinema location to
protect the building and the digital assets. (6 marks)
One:
Two:
Three:
Four:
Five:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
Six:
(b) From your recommendations in part (a), select the one which has the highest priority for
implementation. Justify your recommendation. (3 marks)
Question 24 (continued)
The storage requirement for the digital format movies will be considerably large in size as new
movies are added and old ones are either removed or archived.
(c) You decide that a storage area network (SAN) would work best. Justify this decision.
(3 marks)
Draw using CISCO symbols, the new network diagram on the following page.
End of questions
COMPUTER SCIENCE 36
Supplementary page
Question number:
Supplementary page
Question number:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
COMPUTER SCIENCE 38
Supplementary page
Question number:
Supplementary page
Question number:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
COMPUTER SCIENCE 40
Supplementary page
Question number:
Supplementary page
Question number:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
COMPUTER SCIENCE 42
Supplementary page
Question number:
Supplementary page
Question number:
DO NOT WRITE IN THIS AREA AS IT WILL BE CUT OFF
This document – apart from any third party copyright material contained in it – may be freely copied, or communicated on an
intranet, for non-commercial purposes in educational institutions, provided that it is not changed and that the School Curriculum and
Standards Authority (the Authority) is acknowledged as the copyright owner, and that the Authority’s moral rights are not infringed.
Copying or communication for any other purpose can be done only within the terms of the Copyright Act 1968 or with prior written
permission of the Authority. Copying or communication of any third party copyright material can be done only within the terms of the
Copyright Act 1968 or with permission of the copyright owners.
Any content in this document that has been derived from the Australian Curriculum may be used under the terms of the Creative
Commons Attribution 4.0 International (CC BY) licence.