QCAA Digital Solutions Interactions between users, data and digital systems
5 sample questions with marking guides and sample answers · Avg. score: 42.9%
Which element of visual communication, if not used appropriately, could risk the accessibility of a digital system?
line
form
scale
shape
Which component of a digital solution is required for efficient data processing?
secure login and authentication processes
visually appealing interface design
maintainable programming
scalable database design
Two novice programmers who live in different locations want to develop a method for securing their email communication. They have decided to:
- meet in the same location
- use a generic code library that contains functions relating to a set of cryptology algorithms called ‘Blowfish’
- use only UTF-8 data encoding, e.g. the character ‘%’ is considered to have a length of 8 bits in total
- create their own programs using different languages
- generate encrypted text using their programs
- copy and paste encrypted text into their emails.
| Function name | Blowfish key expansion | Blowfish crypt |
|---|---|---|
| Function code | BlowfishInitiate(key) | Blowfish(Value, KeySet, Process-Type) |
| Purpose | Completes the initial key expansion processes. Returns a data structure called Blowfish KeySets. | Completes the block algorithm process for encryption or decryption. Accepts a 64-bit–length set of values in the form of text, along with the pre-processed Blowfish KeySets. |
| Inputs | Key: text-based, 64-bit in length | Value: text-based, 64-bit in length KeySet: returned data structure from the BlowfishInitiate function Process-Type: 1 for encrypt, 2 for decrypt |
| Returns | KeySet | Text-based value |
| Example | BlowfishInitiate("J$8%*$#d") | Blowfish("abcdefg",MyKeySet,1) |
Note: If any input does not meet a function’s length requirements, the function will fail and potentially cause a runtime error.
Symbolise an algorithm that the programmers could use to encrypt their Unicode set of text. The algorithm should use the function library calls in the table as required.
The programmers make the solution publicly available on their website as a web application. Explain and justify how they could implement two useability principles to optimise user experience.
Evaluate whether the programmers have developed the most secure method to encrypt an email message by identifying two strengths and two weaknesses in the steps. Support all statements with examples. Provide two recommendations and justify how each recommendation would improve security.
Screen-based user interfaces must dynamically adjust for different screen sizes because devices such as mobile phones and televisions have different aspect ratios and dimensions.
Which useability principle does this demonstrate?
utility
safety
validity
reliability
Arranging and organising the UI elements of a user interface demonstrates use of
useability and accessibility.
elements of visual communication.
principles of visual communication.
a suitable programming environment.