1. In terms of national policy and the regulations applicable to the conducting of the Senior Certificate Examinations, it is of paramount importance that candidates' work is quality assured for certification.
2. The Senior Certificate Computer Studies and Computyping practical examinations pose high risks as regards security of data. This is because the examination takes place on the same computers that are used during lessons and because files have to be copied from individual computers for the examiners. Ensuring security of data is therefore of crucial importance if we are to ensure the integrity of these examinations.
3. This circular contains very specific instructions which MUST be followed by all invigilators and other staff who have access to the examination venues for computer-based examinations. Principals and centre managers, who are the examination officers, must ensure that these instructions are adhered to at all times.
4. Please note that the invigilators must at no time leave the examination room until the important procedure described in Sections 7.6 and 8.8 below has been completed.
5. All invigilators and teachers who will assist during a Computer Studies or Computyping practical examination should receive training from the appropriate WCED official. As from 2007, such training will be compulsory and trainees will be issued with a certificate confirming that they have been trained.

6. PEER-TO-PEER NETWORKS

Peer-to-peer networks (such as Windows 98 and XP) do not provide the same level of security as server-based networks (such as Windows NT, Windows 2000 Server and Novell). The use of PEER-TO-PEER networks is therefore not permitted and schools must dismantle them for the duration of the examination and use the computers in stand-alone mode.


7. STAND-ALONE COMPUTERS
7.1

Preparation for the examination

7.1.1 Teachers will receive the CD containing the data files to load on the computers two (2) days before the examination.
7.1.2 Setting up of the computers must take place in the presence of the chief invigilator, after which the computer lab must be inaccessible to candidates.
7.1.3 Folders and files containing work that was done during the year must be backed up and removed from the computers used for the practical examination.
7.1.4 On every computer, teachers must create a folder labelled Exam_data, to which the data files will be copied. When you copy the data files from the CD, the read-only attribute MUST be removed from all the copied files.
7.1.5 Computers MUST be allocated to candidates on a random basis. This is best done in the following manner:
7.1.5.1 Give each computer a code. Print these codes on labels (stickers) and give each candidate a label as he or she enters the computer room.
7.1.5.2 The label must provide a space in which the candidate may write his or her examination number, and the label must be handed back to the invigilator immediately after log-in. Should the candidate, for reasons such as a power failure, need to log in again, the label can be requested from the invigilator, but must be handed back to the invigilator immediately after log-in. (See Annexure A for a sample label.)
7.2 Second sessions
7.2.1 A maximum of only two examination sessions are allowed. Should it be necessary to have two examination sessions, ensure that
7.2.1.1 candidates who are to sit for the examination in the second session are kept under strict supervision in a secure venue for the full duration of the first examination session. While there, they may not have access to cellphones or other forms of communication with persons outside the room, and they may not communicate with the candidates who are in the first session or who have just completed the first session examination. However, while waiting in this secure venue, second session candidates may have their books with them, may revise for the examination and may talk to one another.
7.2.1.2 the "Recycle Bin" on each computer is emptied between the sessions.
7.2.1.3 where candidates have used the hard drive for storing their files, these files are carefully copied onto another medium and then deleted from the hard drive. (Please check whether the files were copied correctly and completely BEFORE deleting them from the hard disk)
7.2.1.4 no user files have been surreptitiously left anywhere on the hard drive of any computer. This can be best done by "searching" each hard drive and looking for files that were changed in the previous 2-3 hours and, if they are user files, deleting them.
7.3 Create a new folder on each computer for the second session,labelled Exam_Data, and save the required data files in this folder. When you copy the data files from the CD, the read-only attribute MUST be removed from all the copied files.
7.4 Candidates MUST rename the Exam_data folder with their examination numbers, and save their files in the renamed folder on the local hard drive.
7.5 The use of stiffy disks is not permitted as they are outdated and often give problems.
7.6 The teacher must, in the presence of the chief invigilator, write the candidates' folders to a flash drive (supplied to the school) and to a CD, both of which must be handed to the chief invigilator. A copy of the CD must also be made and handed to the principal. The principal, teacher and chief invigilator must then complete the attached checklist together (Annexure B) and all three must sign it. The invigilator must then place the flash drive, one of the CDs and the completed Annexure B checklist in an examinations bag, seal it and hand it to the school principal. The principal must then store the sealed bag in the safe or strongroom until it is submitted to the Examination Directorate of the WCED. The second CD must be retained by the school and stored separately in the strongroom or safe.
7.7 Where schools do not have the infrastructure to copy the candidates' folders to a flash drive, and want to use stiffy disks, permission must be obtained from Mr I Francis (at tel. no. 021 467 2549 or e-mail address ifrancis@pgwc.gov.za) at least 14 days before conducting the examination.
7.8 The statistical data associated with each file created in MS-Office is of considerable value as it contains, inter alia, information detailing when files were created. Computer Studies and/or Computyping teachers must ensure that the system date and time of all the workstations are correct before the examination starts and that they DO NOT change the files in any way once the examination has been completed.

8. SERVER-BASED NETWORKED COMPUTERS:

If the school uses network facilities for conducting the practical examination, the following steps MUST be taken to prevent possible copying of files by candidates:

8.1 Teachers will receive the CD containing the data files to load on the computers two (2) days before the examination.
8.1.1 Setting up of the computers must take place in the presence of the chief invigilator, after which the computer lab must be inaccessible to candidates.
8.2 Separate folders, labelled Exam_data 001 to Exam_data n, MUST be created in total for each candidate on the appropriate network drive.
8.2.1 It MUST NOT be possible for the candidates to access any other data folder on the network.
8.2.2 The data files required by each candidate must be copied to each folder. When you copy the data files from the CD, the read-only attribute MUST be removed from all the copied files.
8.2.3 User profiles must be created to limit candidates' access to the applications they will need and the specific folder mentioned in 8.2 above. There must be NO ACCESS to work that has been saved on the network during the course of the year. If this cannot be guaranteed, then folders and files containing work that was done throughout the year must be backed up and removed from the network.
8.2.4 A separate user-ID and password MUST be created and linked to the specific folder mentioned in 8.2 above. The user-ID and password must differ from those used by the candidates in the normal course of their practical work.
8.2.5 These access codes should, preferably, be randomly generated, e.g. user ID: AxCyfDT, password: ShwOfT. DO NOT assign sequential and/or predictable user IDs and passwords, such as an abbreviation of the school name and sequential numbers.
8.3 Computers MUST be allocated to candidates on a random basis. This is best done by
8.3.1 Giving each computer a code, printing these codes on labels (stickers) and then giving each candidate a label as he or she enters the computer room.
8.3.2 The label must provide a space in which the candidate may write his or her examination number, and the label must be handed back to the invigilator immediately after log-in. Should the candidate, for reasons such as a power failure, need to log in again, the label can be requested from the invigilator, but must be handed back to the invigilator immediately after log-in. (See Annexure A for a sample label)
8.3.3 On completion of the examination the access codes must be de-activated.
8.4 E-mail and messaging systems between workstations MUST be deactivated for the duration of the examination so that candidates cannot send messages or files from one workstation to another.
8.5 On some networks it is possible for a log to be kept of who has accessed which folders. If your network has this facility it must be activated during the examination and then retained after the completion of the examination in case queries concerning irregularities arise. This log file must be copied to the flash drive and CD, along with the candidates' folders.
8.6 The statistical data associated with each file created in MS-Office is of considerable value as it contains, inter alia, information detailing when files were created. Computer Studies and/or Computyping teachers must ensure that the system date and time of all the workstations and the server are correct before the examination starts and that, unless otherwise instructed, the files are not changed in any way once the examination has been completed and until the results of the examination have been released.
8.7 Candidates MUST rename the Exam_data folder with their examination numbers, and save their files in the renamed folder on the network drive.
8.8 The teacher must, in the presence of the chief invigilator, write the candidates' folders to a flash drive (supplied to the school) and to a CD, both of which must be handed to the chief invigilator. A backup copy of the CD must also be made and handed to the principal. The principal, teacher and chief invigilator must then complete the attached checklist together (Annexure B) and all three must sign it. The invigilator must then place the flash drive, one of the CDs and the completed Annexure B checklist in an examinations bag, seal it and hand it to the school principal. The principal must then store the sealed bag in the safe or strongroom until it is submitted to the Examination Directorate of the WCED. The backup copy of the CD must be retained by the school and stored separately in the strongroom or safe.
8.9 Second sessions
8.9.1 A maximum of only two examination sessions are allowed. Should it be necessary to have two examination sessions, ensure that candidates who are to sit for the examination in the second session are kept under strict supervision in a secure venue for the full duration of the first examination session. While there, they may not have access to cellphones or other forms of communication with persons outside the room, and they may not communicate with the candidates who are in the first session or who have just completed the first session examination. However, while waiting in this secure venue, second session candidate may have their books with them, may revise for the examination and may talk to one another.
8.9.2 The "Recycle Bin" on each computer is emptied between the sessions.
8.9.3 No user files have been surreptitiously left somewhere on the hard drive of any computer. This can be best done by "searching" each hard drive and looking for files that were changed in the previous 2 - 3 hours and, if they are user files, deleting them.
8.9.4 The access codes of the folders used in the first session are de-activated.

9. MONITORING OF EXAMINATION VENUES:
9.1 Monitors appointed by WCED will visit examination venues on the day before the examination to ensure that all networks and stand-alone workstations have been set up properly.
9.2 WCED officials will visit examination venues on the day of the practical examination to ensure that instructions contained in this circular are being followed.

10. SUPERVISORY REQUIREMENTS

Invigilators play a vital role in ensuring that candidates, whilst writing the examination, do not copy from one another or are not assisted by their colleagues or their teacher. It is therefore crucial that the minimum supervisory requirements are strictly adhered to. In addition to the above security measures, principals are reminded of the following:

10.1 Responsibilities of the invigilator
10.1.1 Prior to the commencement of the examination, all candidates must be informed by way of a general announcement that, if they are found copying files or saving files to places other than those indicated by the invigilator, they could have their results for the subject declared null and void and be barred from re-writing the subject for a period of TWO years. The exact wording to be used by the chief invigilator when making this announcement will be provided in the envelope along with the CD containing the data files.
10.1.2 Should there be any technical queries to be dealt with; the invigilator must act as the agent through whom the teacher communicates with the candidates.
10.1.3 The invigilator MUST be present when the data files are loaded to and copied from the stand-alone computers and/or networked server, as well as when the folders are written to a CD.
10.1.4 Labels (stickers) with the access codes must be collected from candidates immediately after log-in.
10.1.5 The invigilator must be present in the examination room at the end of the examination session to carry out the instructions given in Sections 7.6 and 8.8 above.
10.2 Responsibilities of the teacher.
10.2.1 The Computyping teacher must remain in the examination room for the duration of the examination, must administer the speed accuracy test (Question 1) and must assist in the event of any technical problems.
10.2.2 The Computer Studies teacher must remain in the examination room for the duration of the examination in order to resolve any technical difficulties that might arise.
10.2.3 The teacher must be present in the examination room at the end of the examination session to carry out the instructions given in Sections 7.6 and 8.8 above.
10.3 Responsibilities of the principal
10.3.1 The principal must ensure that the CD containing the data files is handed over to the teacher or network administrator responsible for the preparation of the centre two (2) days before the conducting of the examination
10.3.2 The principal must ensure that the said teacher or network administrator prepares the network and/or workstations on the day of receiving the CD. WCED monitors will check on the day before the examination whether the networks and/or workstations have been properly set up.
10.3.3 Immediately after the computer centre has been prepared, the principal must collect the CD containing the data files and keep it in the school's strongroom.
10.3.4 The principal must ensure that no teacher or learner has access to the computer centre after the data files have been copied and the network and/or workstations have been set up.
10.3.5 The principal must be present in the examination room at the end of the examination session to carry out the instructions given in Sections 7.6 and 8.8 above.

11. Non-adherence to the instructions contained in this circular could lead to disciplinary measures and possible charges being laid.
12. Kindly ensure that a copy of this circular is provided to all teachers and invigilators of Computer Studies and Computyping.
13. Please feel free to contact Mr I Francis (details in 7.7 above) for clarification and/or assistance.


SIGNED: S.M. NAICKER
HEAD: EDUCATION
DATE: 2006:10:02

Annexure A  (size: 42 KB)
Annexure B  (size: 18 KB)