For internal use of KMB students only
Assessment is an integral part of teaching and learning. The most important aims of assessment in the Diploma Programme are that it should support curricular goals and encourage appropriate student learning. Both external and internal assessments are used in the Diploma Programme.
Target Setting
PAPER 1: 30/40 = 52.5%
IA : 22/30= 22%
TOTAL : 74.5%
GRED : 7
PAPER 1 – Q1
a - 6/6 marks (concept)
b - 4/6 marks (mix)
c - 5/8 marks (issues)
TOTAL: 15/20
15 x 2 =30/40
Read the scenario, identify:
the IT systems and how it works,
stakeholders
issues / concerns
impact to specific stakeholders
Read the question, plan and organize the answer
allocate time proportionately
understand the command term asked (identify, describe, explain..)
outline what kind of response is expected
use of ITGS terminologies (i.e. identification, recognition and authentication etc.)
specific examples with description/explanation
Brainstorming the answers for part (c)
Avoid:
using the words something, thing, stuff. - wherever these words are used, they should have been replaced by IT terminology.
using symbols such as &, + or --> - wherever these words appear there should have been English text
using markscheme format (created specially for examiners) and learn to write full response
Common mistake:
General answer
Answer that is understood
Answer no well addressing the scenario
Limited elaboration (not clear)
Repetition of answer
Too dramatic with speculation
Too brief
The first sentence in a definition usually has four parts. You can regard it as a fill in the blank process _the term_& _verb_& _category_& _narrowing fact_
It is then followed by an example that meets these conditions or by further clarification further description or example
Example: Part (a) Define the term spam. (2 marks]
Spam is un solicited email sent in bulk to list of participants. It usually comes from an unknown source and can contain advertising or other unwanted information
Explanation of how this fits the structure for a. •define• question.
Spam & is & solicited email & sent in bulk to a list of participants.
It is then followed by an example that meets these conditions with further clarification about the nature of the solicited email: It usually comes from an unknown source and can contain advertising or other unwanted information.
Read the scenario, identify:
the IT systems and how it works,
stakeholders
issues / concerns
impact to specific stakeholders
Read the question, plan and organize the answer
allocate time proportionately
understand the command term asked (identify, describe, explain..)
outline what kind of response is expected
use of ITGS terminologies (i.e. identification, recognition and authentication etc.)
specific examples with description/explanation
Brainstorming the answers for part (c)
Avoid:
using the words something, thing, stuff. - wherever these words are used, they should have been replaced by IT terminology.
using symbols such as &, + or --> - wherever these words appear there should have been English text
using markscheme format (created specially for examiners) and learn to write full response
Common mistake:
General answer
Answer that is understood
Answer no well addressing the scenario
Limited elaboration (not clear)
Repetition of answer
Too dramatic with speculation
Too brief
A describe requires an identification of the method that shows understanding and one additional condition or example.
Example:
Part(a) Describe one method that can be used for biometric identification of a person.[2 marks]
Facial recognition can be used to identify a person. The facial features of a person are captured by a camera and then key points of the image are matched with a stored image in a database. If there is a high enough percentage of matching points between the two images. the person is identified.
Explanation of how this fits the structure for a 'describe' question.
Facial recognition can be used to identify a person. (no marks) The facial features of a person are captured by a camera and then key points of the image are matched with a stored image in a database. (1 mark for description of how the facial recognition system works). If there is a high enough percentage of matching points between the two images, the person is identified.(1 mark for indicating how the identification is achieved which answers the question.)
Note:
Tips for 'Explain' question
Maximum mark is 6 marks
Offer more than 3 main points
Suggestion 4 points
Use the strategy outline-expand-impact
Tips for steps / how it works
Store
Input
Convert
Process (compare with dbase)
Output if true
Output if false
use of ITGS terminology.
ITGS terminology refers to both terminology relating to IT systems and to terminology relating to social and ethical considerations.
Not all terminology relating to social and ethical considerations are indicated in Strand 1.
There may be additional ones that are specifically related to the question.
Includes both references to IT systems involved and to social and ethical considerations (i.e. impacts, issues, solutions depending upon the question)
The question is answered. If a question asks for advantages and disadvantages, then both must be addressed in the response.
Analysis/interpretation throughout the response
Judgement (big picture - overall perspective) at the end which answers the question. This is not simply a summary of all of the facts that have been presented
Guideline:
OUTLINE (specific situation + stakeholder)
EXPAND ( IT background- how the system contribute to the issue + example)
NEW DIMENSION (impact )
EVALUATION (weigh up / solution)
Example:
Outline: The action of monitoring on workers by employers without their knowledge can be considered as intrusion of human privacy.
Expand (E.g.) One of the most common ways is through the use of packet sniffers that can sniffs every packet of data traveling across the network
Impact: Unfortunately, without a full understanding of the risks, employers may open themselves up to potential lawsuits. In addition, such techniques may result in low morale among employees who resent being told that they cannot engage with personal activities and that their every move is being monitored.
Evaluation: As a conclusion; to make sure the smoothness in performing work, monitoring is required; to advance the argument that monitoring is appropriate, employees should be notified that the employer will treat all activities sent, received, or stored in the system as business activities, which the company is entitled to review and monitor; if not thus action considered as invasion of privacy
Note:
Maximum mark is 8 marks
Offer more than 5 main points
Suggestion 7 points
Positive and negative unless the question asking about CONCERN
Critical Thinking – explanation, analysis and evaluation
These trigger words often signal critical thinking. The bold words are the key terms in the various criteria.
Explanation – Because, as a result of, due to, therefore, consequently, for example
Analysis – Furthermore, additionally, however, but, conversely, likewise, in addition, on the other hand, whereas
Evaluation ؘ– My opinion, overall, although, despite, on balance, weighing up
Identify 2 requirements to enable telecommuting
high speed internet connection, computer equipment
Define what is telecommuting
is the use of telecommunication to work outside the traditional office or workplace, usually at home or in a mobile situation
To what extent do the benefits of teleworking outweigh the concern of teleworking.
Outline: Employers feel it is more difficult to supervise employees who are ‘out of sight’.
Expand: This is because every workers might have different time ‘working hours’ or maybe worker might have to access individually via company’s network
Impact: Task perform by teleworker might not be at the standard quality, or might be doing at the very last minute or might not be submitted at the required time
Evaluation: There are several software tools that can be used for monitoring employees. Web cams can provide a video feed of an employee at his computer, screen capture sw can allow viewing of the activities. However monitoring can be seen as a ‘ Big Brother’ approach implying a lack of trust resulting in decreased in productivity