(2013) PowerPoint-ICT-1113 PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 133

Briefing Session on

2013 HKDSE ICT Exam

22/23 Nov 2013

1
Breakdown of elective

No. of candidates No. of schools


1 7,759 490
2A 862 55
2B 269 27
2C 5,607 367
2D 1,239 104

2
Options offered

No. of options No. of schools


1 431
2 55
3 4
4 0

3
Popularity

Combination No. of schools


C 314
D 64
A 39
CD 31

4
Interesting Figures (1)
Paper Max Mark

1 92
2A 54
2B 49
2C 48
2D 55

5
Interesting Figures (2)
Selection of Prog Lang (2D)

Total %
Pascal 796 69.1
C 286 24.8
Visual Basic 45 3.9
Java 25 2.2
1,152 100

6
Performance – Compulsory Part
Average no. of MC items correct = 23
High correlation with Paper 2s and SBA

7
Performance – Elective Part
Equating – performance of candidates
(Elective Part) can be reflected on the
same scale (Equipercentile method )
Performance (Paper 1) of students in
2D > 2A > 2B > 2C
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)

8
Grading Procedures 
Sample script selection
Standardisation
Post-marking exercise
Panel of judges grading meeting
Internal meeting
Public Exam Board meeting
Refer to Grading Procedures & standards-referenced
Reporting in the HKDSE Exam (HKEAA)

9
ICT (All candidates)
Level %
5** 0.7
5*+ 2.9
5+ 7.4
4+ 24.9
3+ 51.3
2+ 78.0
1+ 93.5
10
Levels attained
HKDSE Level 4 comparable to
HKAL Grade D
L5** Top 10% of L5
L5*+ Top 40% of L5 (L5* = next 30%)

11
SBA
No major irregularity cases

12
SBA – Reminders
Students have to
complete their reports on their own
acknowledge sources properly in their work
to avoid plagiarism
New measures: Prevention & handling
of Malpractice

13
2013 ICT Exemplars
Exemplars with annotated notes
P1B – 1 exemplar @ Level @ language
P2 – selected levels
Uploaded to www.hkeaa.edu.hk

14
Assessing Student Learning
for the ICT Curriculum

Briefing Session on 2013


HKDSE ICT Examination
[ 1B & 2B ]
Paper 1B – Qu 1 ~ (a) (i)

• John connects the printer to the network at


P instead of Q. What is the advantage
and disadvantage of this?
Adv : easy to control
Disadv : can be used only when the
desktop computer is on

Student Performance : OK

Paper 1B – Qu 1 ~ (a) (ii)

• The printer is equipped with RAM and


ROM. When John prints a document, what
will the RAM and ROM store?
RAM: print data
ROM: printer’s firmware
• Student Performance :
– OK, some not know printer has RAM and
ROM, and their functions

• Reflection for T&L:


– RAM & ROM are generic main storage, not
only for computer
Paper 1B – Qu 1 ~ (b) (i)

• Suggest two possible ways to link up the

desktop computer and the smartphone.

WiFi network
• Student Performance :
Bluetooth
USB cable
– Good
Paper 1B – Qu 1 ~ (b) (ii)

• X and Z are two different cables. What is


the major difference in functional
characteristic between them?
data transfer rate
Max. length cable segment
• Student Performance :
– Not good, some talk about analog and digital
signal

• Reflection for T&L:


– Teach student what is the meaning of

“functional characteristics”

Paper 1B – Qu 1 ~ (c)

• The rear part of the router is shown in the


diagram below. Mark ‘X’ and ‘Y’ on the diagram
to indicate where the cables X and Y should be
connected.
X  LAN
Y  WAN
Paper 1B – Qu 1 ~ (d)

• Someone suggests that John build a Domain


Name System (DNS) to improve his network
services. John disagrees with this suggestion.
– (i) What network service does a DNS mainly provide?
– (ii) Do you agree with John’s view? Explain briefly.

(i) DNS resolves domain names into IP


(ii) He does not need DNS because it is just a LAN

• Student Performance :Good

Paper 1B – Qu 2 ~ (a)

• Janice is planning the annual Charity Run for


her school. She uses graphics software to create
a map with the route of the Charity Run and
posts it on the school’s web site.
– Janice decides to store the map as MAP.JPG instead
of MAP.BMP. Give one benefit of her decision.
smaller file size/ supported by many browsers

• Student Performance :Good

Paper 1B – Qu 2 ~ (b)


Suggest two protocols for receiving email that
Janice may use POP3, IMAP

• Janice finds that the email client program


classifies Alan’s email as spam. What does she
need to do to prevent this happening again?
Add his email address in non-spam list

• Janice tries to reply to all the email accounts

involved Alan and Betty


• Student Performance :Good

Paper 1B – Qu 2 ~ (c)

• The notebook computer is equipped with a solid-


state drive (SSD) instead of a general hard disk.
Give two benefits to Janice of using a SSD.

• higher data transfer rate.


• consumes less electricity.
• smaller in size.
• better shock resistance.
• Lighter
• more durable.

• Student Performance :

– Good
Paper 1B – Qu 2 ~ (c)

• Janice uploads the videos and pictures to the


school’s web site and the web site includes a
statement ‘© All rights reserved’. If the statement
were removed, would the school own the
copyright of the web site? Explain briefly.
Yes, copyright ownership does not
require any registration or declaration.
Paper 1B – Qu 2 ~ (d) (i)

• To promote the Charity Run, Janice writes an


article in the school newsletter and inserts the
following code for linking to the school’s web site.
Give one advantage of using this code over a
bar code.
• store more data.
• a higher error correction capability.
• can be scanned in different orientation. be
made up of more types of data

• Student Performance :
– OK, but some show no experience in it
• Reflection for T&L:
– More actual demo to student
Paper 1B – Qu 2 ~ (d) (ii)

• What is the benefit of using this code in the


school newsletter?
• faster to input the URL
• reduce typing errors

• Student Performance :
– OK, but some of the answer are too simple (e.g.
convenience)

• Reflection for T&L:


– More concrete answer, higher level questioning at
lessons
Paper 1B – Qu 2 ~ (d) (iii)

• Describe another kind of use of this code.

phone number / product information.

• Student Performance :

– Good
Paper 1B – Qu 3

• Amy, Billy and Charles work in different offices in a


company. Read their conversation about using
computers and answer the questions below.

– Amy: Charles, your office does not have a good ergonomic


environment.

– Billy: Charles, you have installed a Bit Torrent (BT) program on


your computer. You should delete it.

– Charles: No, I will still keep the BT program and use it.

– Amy: Charles, we installed the same anti-virus software at the


same time but only your computer is infected.
Paper 1B – Qu 3 ~ (a)

• Give two possible features of the setup of


Charles’ office that could easily lead to eye
strain when using the computer.
improper viewing angle of the monitor /
improper height of the monitor /
distance from the monitor to his eyes too close /
insufficient light /
close to the window without curtain

• Student Performance :
– Good, but some state features not related to
set-up, or not related to eye strain
• Reflection for T&L:
– Care about EVERY word in the question

Paper 1B – Qu 3 ~ (b)

• Billy and Charles have different views on the use


of the BT program.
– (i) Give a reason to support Billy’s recommendation.

– (ii) Give a reason to support Charles’ decision.


(i) Charles would download some software that the sources come
from unidentified individual users; the software might be privacy
copies.
(ii) Charles can share working files with other colleagues efficiently.

• Student Performance :OK, but some student think


BT is fast / illegal / virus
• Reflection for T&L:
– Clear general misconception of their usual experience
Paper 1B – Qu 3 ~ (c)

• Why is only Charles’ computer infected?

Give two possible reasons.


• infected with new computer virus
• deactivates his anti-virus software.
• does not regularly update the definition
database of the anti-virus software.
• Student Performance :
– Good, but some state their Anti-virus software
are different
• Reflection for T&L:
– Care about EVERY word in the question
Paper 1B – Qu 3

• Charles: The operating system of my computer uses


Unicode instead of Big-5 code and GB code.

• Billy: Unicode only includes around 20,000 Chinese


characters.

• Amy: Not any more. As of September 2012, Unicode


includes more than 110,000 characters.
Paper 1B – Qu 3 ~ (d) (ii)

• Referring to Amy’s comment, do the 110,000

characters include traditional and simplified

Chinese characters only? Explain briefly.


Other than the Chinese characters, there are characters
of other languages

• Student Performance :
– Good, but some mentioned the following only
• Number
• Character
• English character
• Reflection for T&L:
– State more related examples
Paper 1B – Qu 3 ~ (d) (i)

• To represent a set of 20,000 characters


using binary code, what is the minimum
number of bits required? Show your
calculation.
214 < 20,000 < 215
15 bits are needed.

• Student Performance :

– Good
Paper 1B – Qu 3 ~ (d) (ii)

• Referring to Amy’s comment, do the 110,000

characters include traditional and simplified

Chinese characters only? Explain briefly.


Other than the Chinese characters, there are characters
of other languages

• Student Performance :
– Good, but some mentioned the following only
• Number
• Character
• English character
• Reflection for T&L:
– State more related examples
Paper 1B – Qu 3

• Amy, Billy and Charles go to a public library and want to


use workstations.
• Amy: There is an empty seat but the workstation has not
been logged out.
• Charles: The email account has not been logged out.
There is a coupon attached to the email. Let me print it
• so we can use it.
• Billy: The security of the workstations is very low.
Secure Sockets Layer (SSL) should be used.
Paper 1B – Qu 3 ~ (e) (i)

• Describe two illegal offences that Charles would

do if he accessed the email and printed the


coupon. He accesses the email account without authorization.
He steals the coupon.

• Student Performance :
– Good, especially in THEFT offences. But some
mentioned privacy instead of illegal access

• Reflection for T&L:


– A good example to show illegal access vs privacy
Paper 1B – Qu 3 ~ (e) (ii)

• Can SSL prevent Charles from accessing


the email account mentioned above?
Explain briefly.
No, SSL is used to secure the data
transmission. (encryption)

• Student Performance :
– Good, except some only mentioned more
secure, which is not acceptable

• Reflection for T&L:


– Don’t simply repeat wordings in the question
Paper 1B – Qu 4

• Sarah is a librarian in a secondary school.


She uses a table in a database, LOAN, to
store the book circulation records.
Paper 1B – Qu 4 ~ (a)

• Suggest a primary key for LOAN.


• Suggest a validation check on each of the
following fields.

• Student Performance :
– Good, except some not using question example for
answer reference

• Reflection for T&L:


– Give explanation with reference to question scenario
Paper 1B – Qu 4 ~ (b)

• Sarah executes a SQL command on


LOAN with four records, as shown below.
SELECT STUID, COUNT(*) FROM LOAN GROUP BY
STUID

• Student Performance :

– Good
Paper 1B – Qu 4 ~ (c)

• Sarah wants to send a reminder email to the students


whose fines total more than $10. She uses column E to
store ‘Y’ if the email is needed, and ‘N’ otherwise. She

enters a formula into E2 and then copies it to the other


cells in column E. Write the formula in E2.Suggest a
validation check on each of the following fields.
• Sarah enters the following formula into H3 and then
copies it into H4:H5 so as to calculate the sum of all
fines in each form.
=SUMIF(C2:C160,$G$3, $D$2:$D$160)

• Student Performance :
– Poor, especially in Relative & Absolute Addressing

• Reflection for T&L:


– More effort on Excel Addressing
Paper 1B – Qu 4 ~ (d)

• Sarah copies the worksheet into a


document in a word processor by creating
a dynamic link. For each of the following
actions, is there any change in the
worksheet? If yes, describe the change

• Student Performance :
– Good
Paper 1B – Qu 4 ~ (e)

• Sarah creates a presentation file with


hyperlinks and multimedia elements and
posts it on the school’s web site. A student
downloads and opens the file. He finds
some technical problems regarding the
hyperlinks and multimedia elements.
Describe two possible technical problems.

• Student Performance :
– Good
Paper 1B – Qu 5 ~ (a)

• Student Performance :
– Good, student understand need of
initialization, and some basic operation
Paper 1B – Qu 5 ~ (a)

• Student Performance :
– Not good, some student not good in explaining
‘change’

• Reflection for T&L:


– More practice in describing ‘change’
Paper 1B – Qu 5 ~ (c)
• In this sales promotion, ALG3 is used to
calculate the actual payment, PAYMENT, for
Mary. ALG3 includes ALG1 and ALG2.
Complete ALG3.

• Student Performance :
– OK, but some not good in subprogram / modularizing
the program

• Reflection for T&L:


– More practice in subprogram / modularizing the
program
Paper 1B – Qu 5 ~ (d)

• The department store has another sales


promotion. The 20 members with the highest
total spending each month can enjoy 20% off all
year round. A computer application system is
used to find these 20 members.
– Should the system be a single-user system or a
multi-user system? Explain briefly.
– Should the system be a batch processing system
or a real-time system? Explain briefly.

• Student Performance :
– Good
Briefing Session on
2013 HKDSE ICT Exam Paper 2A
Question 1

Question 1

Candidate Performance :
(a) Very Good. (b) Satisfactory. (c) Satisfactory.

Most candidates are able to manage simple SQL statements involving filtering,
ordering and grouping.

* Accept grouping field(s) is/are not the same as the field(s) in the select clause.

* Accept TRUE, ‘TRUE’, “TRUE” and .T. to represent boolean data type.
Question 1

Candidate Performance :
(d) Fair. (e) (i) Fair. (ii) Poor.

(d) Some candidates cannot handle this more complicated SQL statement. Some of
them cannot distinguish the usage of “where clause” and “having clause” and put
aggregate function in the “where clause”.

* Not Accept YEAR(…) = “2012” since the return of the function YEAR() is an integer.

(e)(i) Some candidates directly explain the working flow of this SQL statement, but
cannot show the background purpose of it.

(e)(ii) Many candidates don’t know how to use outer join.

*Accept “left outer join” and “left join” *Not accept … = NULL
Question 1

Candidate Performance :
(e) (iii) Poor.

Only a few candidates can answer “MINUS” / “EXCEPT”.

Some candidates understand this question is asking for combining two SQL
statements, but they only know the word “UNION”.
Question 2

Candidate Performance :
(a) Fair.

Some candidates don’t


know how to determine
which is foreign key.
Question 2

Candidate Performance :
(b) Poor.

Many candidates don’t know the usage of data dictionary.


Question 2

Candidate Performance :
(c) Satisfactory

Many candidates don’t know why SQL View can be used to protect the data privacy.
Question 2

Candidate Performance :
(d) Satisfactory

(i) Most candidates can explain the problem, but they don’t know the term
“referential integrity” and the concept related to foreign key.
Question 3

Candidate Performance : Fair

This is a very traditional question, but some candidates still don’t understand the
difference of usage between database and spreadsheet
Question 3

Candidate Performance : (b) Excellent

Some candidate are weak at data representation, e.g. use ‘888’ for an integer.

* Accept “2013-03-20”,‘2013-03-20’,“20/03/2013”,#20/03/2013#,{20/03/2013} and …


* Not Accept 20/03/2013, 20-03-2013
Question 3

Candidate Performance :
(c) Satisfactory

Many candidates know this suggestion can reduce the required storage size, but not
many of them can answer the potential disadvantage with the concept of data
validation.
Question 3

Candidate Performance :
(d) Fair

Most candidates don’t know what should be done before data migration.
Question 4

Candidate Performance :
(a) Good.

Some candidates cannot


identify the job title. Some
candidates wrongly think
programmer is responsible for
designing the conceptual
database schema.
Question 4

Candidate Performance :
(b) Good

* Get 1 mark when one of the entities is correct


* Get 1 mark when one of the relationship is correct
* Get 1 mark when one of the cardinality is correct
Question 4

Candidate Performance :
(c) Satisfactory

Many candidates can answer both advantage and disadvantage of the combination.

Question 4

Question 4

Candidate Performance :
(d) Satisfactory

(i) Most candidates know that the system should not disclose the name of buyers.

(ii) Some candidates only concentrate on the “ordering” and don’t know the “provide
proper information” means to protect data privacy. MID should not be selected.
Question 4

Candidate Performance :
(e) Satisfactory

The majority of the candidates can answer correct subquery.

(f) Fair

Many candidates can answer this question.

Paper 2B – Qu 1

Paper 2B – Qu 1 (a)

• What does the value ‘80’ after the colon in

the URL mean?


• Network mask:
• Default gateway:

• Student Performance :
– Good, except some wrote 埠 wrongly

• Reflection for T&L:


– More practice in keywords
Paper 2B – Qu 1 (b)

• function of the gateway


• benefit to Vicky of enabling VPN
• DHCP is used in the network. How does this
help the network connection

• Student Performance :
– Poor, especially in VPN and DHCP. Some wrote their
definition but not benefit

• Reflection for T&L:


– Clear concept between difference of definition vs
advantage in using
Paper 2B – Qu 1 (c)

• Suggest two changes in the settings of the

router which would improve the security

• Vicky finds that the tablet computer is out of


order. She buys a new one which is of the same
model and uses the same settings as the old
one. However she cannot connect it to the WiFi
network. Why? What change in the settings of
the router should she make?

• Student Performance :
– Good, knowing MAC is unique
Paper 2B – Qu 1 (d)

• Vicky enables automatic channel selection


instead of the fixed channels for the router.
Why?

• Student Performance :
– Poor, most simply mentioned the benefit is
“automatics”

• Reflection for T&L:


– Don’t simply repeat wordings in the question

Paper 2B – Qu 1 (e)

• Vicky has a notebook computer. The


network supports wired and wireless
connections. Vicky decides to use the
wired connection for the notebook
computer. Apart from bandwidth, suggest
and describe two reasons to support her
decision.

• Student Performance :
– Good
Paper 2B – Qu 2

Paper 2B – Qu 2 (a)

• Give an example of the analog data.


• Give an example of the digital data.
• Where does the conversion from analog
data to digital data take place?
• Where does the conversion from digital
data to analog data take place?

• Student Performance :
– Good
Paper 2B – Qu 2 (b)

• Briefly describe the data flow in these cameras


to illustrate the simplex mode.
• The security system uses synchronous
transmission. Give one advantage and one
disadvantage of using synchronous
transmission.

• Student Performance :
– Poor, cannot well describe

• Reflection for T&L:


– Concept is simple, need more practice in ‘describe’
Paper 2B – Qu 2 (c)

• Data captured by the cameras is stored on


the server. Optical fibre instead of CAT5
cable is used for the new cameras but the
network throughput does not improve.
Give two upgrade suggestions for
improving the network throughput
• Briefly describe the data flow in the new IP
cameras, to illustrate the duplex mode.

• Student Performance :
– Good
Paper 2B – Qu 2 (d)

• In each of the following cases, which protocol,


UDP or TCP, should be used? Explain briefly.
– The visual images are sent to a server for storage.

– Security officers can instantly view the visual images


of the lobby.

• Student Performance :
– Poor, cannot well describe

• Reflection for T&L:


– Need more practice in ‘describe’
Paper 2B – Qu 3

Paper 2B – Qu 3 (a)

• Describe two network tests that Mr Chan


has to do during the testing stage.
• The museum plans to allow visitors to use
their own mobile devices. Give two
considerations that the museum should
bear in mind before implementing this plan.
• Student Performance :
– Good, students show good ability in design
test plan if objectives are clear
– For museum consideration, students answers
are too technical
Paper 2B – Qu 3 (b)

• One day, four APs are out of order.

– Problem encounter
– Relocation ?

• Student Performance :
– Good
Paper 2B – Qu 3 (c)

• An IT company will donate as many as APs Mr


Chan wants. Someone suggests that Mr Chan
should mount more APs, for example, one AP
every 5 m2. Give two disadvantages of this
suggestion

• Student Performance :
– Good, except some wrote need budget to buy

• Reflection for T&L:


– Care about EVERY word in the question
Paper 2B – Qu 3 (d)

• Mr Chan needs to install Y instead of network


cables for connecting X1 and X2 to the server.
Give one reason to explain why network cables
should not be used.
• What major task will X1 perform when
interacting with the other five APs in the hall?
• Student Performance :
– Good
Paper 2B – Qu 4

Paper 2B – Qu 4 (a)

• Patients’ medical data is sent from the


server to doctors’ messaging devices
through the hospital’s WiFi network
instead of the public mobile network. Give
two reasons to support the use of the WiFi
network.

• Student Performance :
– Good
Paper 2B – Qu 4 (b)

• Patients’ medical data collected from the


medical sensors is sent to doctors’
messaging devices via the server. What
are the major functions of the server
regarding network management? Give
two examples.

• Student Performance :
– Good
Paper 2B – Qu 4 (c)

• Packet switching is used for the data


transmission between the server and doctors’
messaging devices.
– Circuit switching should not be used in this case. Why
not?
– Describe the packet switching mechanism for the
data transmission.

• Student Performance :
– Poor, cannot well describe, and also not clear in
packet vs circuit switching

• Reflection for T&L:


– Need more practice in ‘describe’, and more teaching
in packet vs circuit switching
Paper 2B – Qu 4 (d)

• The network design uses Cloud storage,


that is, online storage managed by third
parties through the Internet.
– Give two benefits of using Cloud storage

– Give two potential problems of using Cloud


storage.

• Student Performance :
– Good
Paper 2B – Qu 4 (e)

• The bedside device is a mobile device which


allows a patient to move around the hospital with
the device. It forms a personal area network
(PAN) with medical sensors for communication,
as shown below.

• Student Performance :
– Poor, student not have good knowledge in PAN

• Reflection for T&L:


– Need more teaching in PAN
2013 ICT Paper 2C

• 毋須安裝/ 可利用瀏覽器觀看電影/ 跨平台(附註解) 


下載、串流傳輸、網上觀看 

• 容易發放更新版本 / 跨平台(附註解) 
有效管理客戶或電影記錄 / 防止電影被下載 
兼容很多常用視像放器。 / 毋須額外Codec。/
質量較佳(需要較少壓縮) 
毋須Codec。 
檔案較大。/不支援串流傳輸。 
較短等候時間 
節省時間 

(硬件)圖形顯示卡的運算能力差。/
沒有足夠記憶體。
沒有更新、不夠好 

(網絡)顧客電腦的網絡頻寬不足。/
伺服器因繁忙未及回應。/
網絡十分繁忙。
60 ×1024 × 1024 × 8 / 200 或 60 × 8 / 200 
= 2516582.4 bit/s 或 2.4 Mbps (2.5Mbps) 
MP4 / MKV / AVI (H264, AVCHD) / WMV / FLV / MOV
(, )
codec, FFmpeg, DivX, Xvid, x264, mpeg 
每秒掃瞄行數  (高度 )
解像度、每秒掃瞄像素數目 / 幀數目、像素寬度 

在逐行視像中,幀內所有行線逐行更新。 
逐行更新 

在交錯視像中,幀內所有行線隔行更新。 
一個一個(層)改變 
Q.2

是 否 
是 是 
否 否 
這兩個瀏覽器對某些HTML 編碼的翻譯不同。/
這兩個瀏覽器於墊或邊界的設定不同。 

表格 / 幀 (frame) / CSS / 圖像 / 層面 (layer)


(, )
搜尋器加入搜尋索引時採用這些數據。/ 彼得打算增加
被搜尋器搜尋得到的機會。/ 定義字符編碼格式。 

網頁 / 關鍵字 / 標題 / 作者 / 版權 / 產生日期 / 字符
編碼 / 網頁更新 / 轉發 (, )
(附描述)
(其他可行用途)
5184  3456  24 位元 
= 51 / 51.3 / 51.26 MB 

幀速率 / 解像度 / 檔案格式 / 過渡效果 /


音效 / 字幕 (,  , )
HKDSE ICT Paper 2C

Q.3 - 4

防止傀儡程式讀取這些文字。/
確保這項回應是由真人發出。/
防止註冊或輸入資料由軟件自動產生。
(防止點客攻擊/防止複製及貼上 )
它可由布拉耶 / 布萊葉閱讀器 / 讀屏軟件 讀取。

(盲人可使用替換文字 )

透過聲效讀出驗證碼內容。 (聲效驗證 )

(電腦 / 瀏覽器 )

向用戶名稱(或其他輸入欄)採用客戶端手稿程式(本機 /
JavaScript),(1) 以檢測其輸入是否空白 (+1)。
向用戶名稱(或其他輸入欄)採用伺服器端手稿程式(數據庫),
(1) 以檢驗客戶的真確性 / 使用者名稱與密碼是否有效(+1)。
缺點1:用戶可沒有正確輸入歌曲的代碼。(1)
方案1:當按下表單上的歌曲時將代碼自動加入。/在每一
行歌上加入一個「加入購物籃」按鈕。/在歌曲側加入一
個複選框。(+1)
(利用下拉式選單 )

缺點2:用戶所揀選的歌曲沒有顯示,他不能刪除或修改。
/用戶未能檢視所選購的歌曲。(1)
方案2:加入一個表格來展示所揀選的歌曲,並容許作任何
修改。(+1)
(加入一個重設/復原按鈕 )

其他可行答案:歌曲不是順序排列 (1) 加入一項排序功能


/搜尋功能 (+1)
(缺點:用戶每次只可輸入一個代碼。/ 該文字欄太短。/
「繼續購買」按鈕沒有用處。/ 用戶每次只可購買一首歌曲。
/ 不能自動運算總金額。

只有歌曲名稱,不清楚由那個歌手唱

方案:加入一個數量欄。/ 加入一個歌手欄。/
加入試聽連結 )
在一秒內取出 44,100 個樣本。 (44.1  1024 )

每個樣本由16個位元數據組成。/ 每個樣本大小
為16個位元。

它可產生從四方收集的聲音,如自然發出的聲音,富
人性化。/
利用兩個聲道(左右兩邊)收錄聲音。
可播放出栩栩如生的歌曲。/錄播的歌曲接近真人現
場演唱。

(質量較佳/聲音佳/清晰地收錄聲音/有兩道聲道

)
相位 phase
振幅 Amplitude / 聲量 loudness / volume

(檔案類型/檔案格式/壓縮方法/時段/
長度  )
有一些活動的名稱冗長,它們可清楚地展示出來。/
寬度/顯示面積較細,適合於手提電話/流動裝置使用。
(2)

當有很多不同活動時,此項設計可固定所展示活動清單
的長度,以供選擇。/
所選擇的活動可清楚地展示。(2)

顯示一對話框來確認有關選擇。(1)
加入一個「取消勾選」/「重設」按鈕,(1)
取消所選擇的項目,讓用戶可簡單地重新選擇。/
減少重新載入此網頁的時間。(+1)
2013 HKDSE ICT-D

workshop

2013-11-22

2013-11-23

Q1
Q1
Q1
Q1

Q2
Q2
Q2
Q2

Q3
Q3

Q3
Q3

Q4
Q4
Q4

Q4

You might also like