CONFIDENTIAL DRAFT Further information on National 5 Specimen

advertisement
CONFIDENTIAL DRAFT
Further information on National 5 Specimen
Question Paper, National 5 Specimen Coursework
and National 4 Added Value assessment
Computing Science
Key points
Computing Science Courses combine aspects of Standard Grade and Intermediate1 Computing
Studies, Intermediate 2 Computing, and Intermediate 2 Information Systems.
At National 5, Course assessment will consist of two components: a question paper and an
assignment.
The question paper requires learners to demonstrate aspects of breadth and application in
theoretical contexts. Learners will apply breadth of knowledge from across the Units and depth of
understanding to answer appropriately challenging questions in computing science contexts.
The assignment requires learners to successfully respond to challenge and demonstrate
application in a practical context. Learners will apply knowledge and skills from the Units to solve
an appropriately challenging computing science problem.
Course assessment will be out of 150 marks.
To pass the Course at National 4, learners must pass all Units including Computing Science
Assignment (National 4), the Added Value Unit. Learners will draw on and apply skills and
knowledge of software and information systems design and development to solve an appropriately
challenging Computing Science problem.
National 5 Specimen Question Paper
(publication by 28 February 2013)
The purpose of the question paper is to assess breadth of knowledge from across the Course,
depth of understanding, and application of this knowledge and understanding by answering
appropriately challenging questions.
This question paper will give learners an opportunity to demonstrate the following skills, knowledge
and understanding:




applying aspects of computational thinking across a range of contexts
analysing problems within computing science across a range of contemporary contexts
the ability to communicate how a program works
communicating understanding of key concepts related to software design and development,
and information system design and development, clearly and concisely using appropriate
terminology
 understanding of the legal implications and environmental impact of contemporary information
system technologies
 applying computing science concepts and techniques to create solutions across a range of
contexts
The question paper will have 90 marks (60% of the total mark).
CONFIDENTIAL DRAFT
CONFIDENTIAL DRAFT
Approximately 50% of the marks will be awarded for questions related to Software Design and
Development.
Approximately 50% of the marks will be awarded for questions related to Information System
Design and Development.
The question paper will have two Sections.
Section 1 will have 20 marks and will consist of short answer questions. This Section will give
learners an opportunity to demonstrate breadth of knowledge from across the areas specified in the
Course Specification and in the Course Assessment Specification. Questions will be mainly
straightforward KU questions, at ‘C’ level with a balanced sampling across both Units.
Section 2 will have 70 marks and will consist of approximately six to eight extended response
questions, each with approximately 8–12 marks. This section will give learners an opportunity to
demonstrate application of KU to answer appropriately challenging problem-solving questions by
drawing on and applying knowledge as outlined in the Course Specification and in the Course
Assessment Specification.
Questions will assess application of understanding (rather than direct recall), include extended
descriptions and explanations, and be more integrative, drawing on understanding of one or more
topics across the Units. Questions related to programming will either use some form of
‘pseudocode’ or allow candidates to answer in any appropriate programming language.
Approximately 20 marks will be allocated for ‘A-discriminator’ questions, which could be integrative
(requiring combination of understanding from two topics), detailed explanations, and/or application
of computational thinking skills.
National 5 Specimen Coursework
(publication by 30 April 2013)
The assignment is designed to assess practical application of knowledge and skills from the
Course to develop a solution to an appropriately challenging computing science problem.
The assignment will have 60 marks (40% of the total mark). It will be set by SQA and conducted
under some supervision and control.
The assignment will assess learners’ skills in analysing a problem (10 marks), designing a solution
to the problem (10 marks), implementing a solution to the problem (20 marks), testing (10 marks)
and reporting on that solution (10 marks).
Evidence will be internally marked by centre staff in line with SQA marking instructions.
National 4 Added Value Unit
(publication by 30 April 2013)
The assessment method for the Computing Science Added Value Unit is an assignment. The
Assignment will assess learners’ skills in analysing a problem, designing and implementing a
solution using an appropriate programming or software application and testing and reporting on the
functionality of that solution.
Evidence will be internally marked by centre staff in line with SQA guidelines.
CONFIDENTIAL DRAFT
CONFIDENTIAL DRAFT
National 4 and National 5 Sample
Questions and Tasks
CONFIDENTIAL DRAFT
CONFIDENTIAL DRAFT
Computing Science
Examples of types of questions for National 5 Question Paper
Section 1
Section 1 will have 20 marks and will consist of short answer questions. Questions will be
mainly straightforward KU questions, at ‘C’ level with a balanced sampling across both Units.
Possible types of Section 1 question are shown below.
Example 1
Examine the following pseudocode:
FOREACH member FROM gender
IF gender(member) = ‘M’ OR gender(member) = ‘F’ THEN
Set totalm = totalm + 1
ELSE
Set totalf = totalf + 1
END IF
END FOREACH
State the most suitable data structure and data type for gender.
Example 2
Which of the following is an advantage of a peer-to-peer network?
Tick one box.

Centrally stored files are easily backed-up

Users must log into the server before they can gain access to the network

No specialist computer system is required to set up the network

It is easier to monitor the legality of files shared on the network
Section 2
Section 2 will have 70 marks and will consist of approximately 6 – 8 extended response
questions. Questions will assess application of understanding, rather than direct recall,
include extended descriptions and explanations and be more integrative, drawing on
understanding of one or more topics across the Units.
Possible types of Section 2 question are shown below.
Example 3
Greg is building a computer system to control the air temperature in his greenhouse. A
temperature sensor and heater will be attached to the finished computer.
(a) Greg purchases a motherboard on which he installs a processor and two memory
modules.
(i)
State the correct term for the motherboard connections that allow data and
instructions to be transferred between the processor and memory.
CONFIDENTIAL DRAFT
CONFIDENTIAL DRAFT
(ii) What additional hardware must be connected to the motherboard to allow the
temperature sensor to transfer data to the computer system?
(b) Greg starts to design his temperature control program. Part of his pseudocode is shown
below:
RECEIVE temperature FROM (Real) TEMPERATURE SENSOR
IF temperature >=10 THEN SEND on TO HEATER
IF temperature <=24 THEN SEND off TO HEATER
(i)
State the logic error Greg has made in the above design
(ii) Describe how the design could be improved to show that the above three steps will
repeat continuously until a switch is turned off.
(iii) Create a set of test temperature readings that can be used to test that the control
program works correctly for normal, extreme and exceptional input.
(c) Discuss one environmental impact resulting from Greg’s introduction of a temperature
control system in his greenhouse.
Example 4
Penny works for the NHS analysing information stored about ambulance callouts. One of
the tables from the database is shown below.
(a)
(i)
Field
Example Data
Callout Number
2012-238-3462
Vehicle Number
193
Callout Date
12/8/12
Distance Travelled (miles)
3.2
Time to Reach Call (minutes)
5
Reached within Target Time
Yes
State which field in the above database should be the key field.
(ii) Justify your answer to (i)
(b)
Penny produces the following report from the database:
Callout Number
Callout Date
2012-238-3462
12/8/12
Reached within
target time
Yes
Vehicle
Driver
Joanna
Smith
Explain how the database might have been created to enable the vehicle driver’s name
to have been included in this report.
(c)
The NHS is concerned about hackers changing the information in the database.
CONFIDENTIAL DRAFT
CONFIDENTIAL DRAFT
Describe one software precaution the NHS could take to prevent hackers
accessing the information.
Example Assignment Task for National 5 Computing Science
Assignment
The assignment is designed to assess practical application of knowledge and skills from the
Units to develop a solution to an appropriately challenging computing science problem.
Company Prize Draw
A number of departments at the company, TL Enterprise, have decided to run a monthly
prize draw. Each member of staff within a department has the choice to enter the draw at a
cost of £5 per ticket. The company has generously decided to match the amount paid in by
the employees; 70% of the total prize fund will go to the winner and 30% will go to charity.
Your task:
1
Create a structure to store and display employee information. The information should
include photographs of the employees.
2
Create a program that will randomly pick a monthly prize draw winner and check if
they have been entered into the prize draw. If they have been entered the program
should print a congratulatory message and the amount of prize money won. If they
have not been entered the program should repeat until a winner has been selected.
National 4 Added Value Unit Outcome and Assessment Standard
1
Develop, with guidance, a digital solution which will draw on and apply skills
and knowledge of software and information systems design and development
by:
1.1
1.2
1.3
1.4
Analysing a straightforward problem
Designing a solution to the problem
Creating a program or application as a solution to the problem
Testing and reporting on the solution to the problem
CONFIDENTIAL DRAFT
Download