theory revision grade 12 10...1 theory revision grade 12 – 10 grade 12 paper 1 section 1 1. choose...

60
1 THEORY REVISION GRADE 12 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter next to the question number. (10) NO. COLUMN A COLUMN B ANSWER 1.1 The process of adding geographical identification metadata to various media which consists of latitude and longitude coordinates. A Patches C 1.2 The use of computer resources in an eco-friendly and efficient way to minimise negative impact on the environment. B Cookie G 1.3 Software that enables a user to capture parts of what is seen on the screen. C Geotagging F 1.4 A concept where workers bring their own mobile devices, such as smartphones, laptops and PDA’S, to the workplace for connectivity. D Apps K 1.5 Software designed to run on smartphones, tablet computers and other mobile devices. E Open source D 1.6 A malicious practice of redirecting users to fake or unexpected websites when they enter a URL in their web browser. F Snipping tool I 1.7 Small updates that fixes errors in an application. G Green Computing A 1.8 A text file containing information on the user’s preferences and choices regard- ing a specific website. H F1 B 1.9 Software freely available for use and where the source code can be altered /changed as needed. I Pharming E 1.10 Keyboard key commonly used to obtain help in application programs. J GIS H K BOYD L Phishing M Shareware N F3 O GPS P Ergonomics Q Paint R Plug-in S txt

Upload: others

Post on 02-Jun-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

1

THEORY REVISION

GRADE 12 – 10

GRADE 12

PAPER 1 SECTION 1

1. Choose a term/concept that matches the description in COLUMN A. Write only the letter next to the question

number. (10)

NO. COLUMN A COLUMN B ANSWER

1.1 The process of adding geographical identification metadata to various media

which consists of latitude and longitude coordinates. A Patches C

1.2 The use of computer resources in an eco-friendly and efficient way to minimise

negative impact on the environment. B Cookie G

1.3 Software that enables a user to capture parts of what is seen on the screen. C Geotagging F

1.4 A concept where workers bring their own mobile devices, such as

smartphones, laptops and PDA’S, to the workplace for connectivity. D Apps K

1.5 Software designed to run on smartphones, tablet computers and other mobile

devices. E Open source D

1.6 A malicious practice of redirecting users to fake or unexpected websites when

they enter a URL in their web browser. F Snipping tool I

1.7 Small updates that fixes errors in an application. G Green Computing

A

1.8 A text file containing information on the user’s preferences and choices regard-

ing a specific website. H F1 B

1.9 Software freely available for use and where the source code can be altered

/changed as needed. I Pharming E

1.10 Keyboard key commonly used to obtain help in application programs. J GIS H

K BOYD

L Phishing

M Shareware

N F3

O GPS

P Ergonomics

Q Paint

R Plug-in

S txt

Page 2: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

2 2. - MULTIPLE CHOICE QUESTIONS (10)

Choose the correct answer and write only the letter (A-D) next to the question number.

2.1 Which ONE of the following types of files is likely to contain hyperlinks? (C) A. .bmp B..exe C..html D. .avi

2.2 Which ONE of the following chart types is most appropriate for displaying the changes in temperature over a month

in Johannesburg? (B) A. A pie chart

B. A line chart C. A scatter chart D. A bubble chart

2.3 In a spreadsheet, the following values have been assigned to cells A1-A3: A1=3, A2=6 an A3=9. The following formula is typed into Cell A4: =SUM(A1:A3)/B1. What will appear in Cell A4? (C) A. #NUM

B. 0 C. #DIV/0! D. 18

2.4 Which ONE of the following is NOT an example of online storage. (B) A. Google Drive B. OLX

C. Sky Drive D. Dropbox

2.5 A process whereby one can speed up disk access by rearranging the files on the hard disk of a computer called……… (A) A. disc cleanup B. defragmentation C. spooling D. compression

2.6 Which ONE of the following wireless communication technologies has the shortest reach? (A) A. Wi-Fi B. LTE C. 3G D. Bluetooth

2.7 Which ONE of the following refers to software that is designed to fix bugs and provide new features for existing software? (A) A. Updates B. Drivers C.Virus definitions D. Wizards

2.8 Which ONE of the following refers to a type of website that allows users to work together to create, add, delete or modify the content? (B) A. Webinar B. Wiki C. RSS feed D. Podcast

2.9 Which ONE of the following ports is the best choice to use to download videos from a video camera to a PC? (D) A. PS2 B. USB C. Parallel D. Firewire

Page 3: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

3

2.10 Which ONE of the following is NOT directly associated with Spreadsheets? (A) A. Input Mask B. Cell C. Worksheet D.Absolute cell addressing.

3. TRUE/FALSE ITEMS (5)

Indicate whether the following statements are TRUE or FALSE. Choose the answer and write true or false next to the number. Correct the statement if it is FALSE Change the underlined words to make the state-ment TRUE. (You may not simply use the word NOT to change the statement).

3.1 A PDA is a smaller version of a tablet which also incorporates features found on smartphones, such as voice calls and SMS’s. False Phablet

3.2 Bandwidth provides always-on, high speed Internet connection and is ideal for fast downloads of software, photos, videos and music. False Broadband

3.3 RSS is a web feed that automatically provides users with updated content. True

3.4 Grid computing refers to the sharing of resources such as programs and data storage offered as a service over the Internet. False Cloud computing

3.5 A hotspot is a wireless network technology used for connecting computers to a wireless network or to the Internet. True

SECTION B

4. SYSTEM TECHNOLOGIES

4.1 The School Management Team wishes to buy computers for the computer lab at the hostel. 4.1.1 You suggest that the buy LED monitors. Motivate your answer. (2)

Takes up less desk space. Uses less electricity. Good image/high resolution. Available in larger sizes.

Additional ports. High contrast ratio.

4.1.2 Some suggest that they also buy a graphics card. What is the function of a graphics card? (1) Graphics cards allow computers to produce graphics and images more quickly.

4.2 The School Management Team has to choose between buying cabled or wireless keyboards and mice name two disadvantages of wireless devices. (2) Require batteries, more expensive, can easily be removed/stolen, signal strength can be affected by electri-cal sources (interference).

4.3 The management team wants to make use of biometric input to control access to the computer laboratory. 4.3.1 What is biometric input? (1)

A process the allows a unique biological feature of a person to be used as a password or in access con-trol.

4.3.2 Name TWO methods of biometric input they could consider. (2)

Voice recognition, fingerprint recognition, iris recognition, retina scanning, signature verification.

Page 4: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

4 4.3.3 Discuss TWO disadvantages of using biometric input for access control. (2)

Voice recognition will not work if you have flu or a cold that affects your voice. Diabetes may affect your eyes and result in inaccurate iris scanning. Cuts or burns to your fingers, hands or face may result in identification process not working. Biometric devices are expensive.

4.4 Storage is a key factor when buying a computer. 4.4.1 State TWO ways (besides cloud storage) in which you could save hard drive space on your computer. (2)

Save on external storage. Zip/compress large files. Change pictures to jpeg files. Delete unwanted files. Delete duplicate files. Uninstall unwanted programs.

4.4.2 What is cloud storage? (1) Storage space on another server which you access through the Internet.

4.4.3 State TWO disadvantage of online storage. (2) The amount of space that is provided for free is usually small. To get extra space you have to buy it at a monthly or yearly fee. People that you share files with might delete your files by accident. You need Internet access.

4.5 The Management Team is interested in exploring ways in which physically challenged learners can have access to computers in the laboratory.

4.5.1 Explain how a speech recognition program can be used to assist physically challenged (disabled) learners.(1)

Learners who cannot use their hands properly can use the speech recognition program to convert speech to text. Visually impaired learners can use speech recognition to give commands to the computer. Visually impaired learners can use speech recognition to convert speech to text.

4.5.2 Name any ONE hardware device that can be acquired to assist the visually impaired (blind) learners in the hostel. (1) Braille keyboards/braille “display”. Magnifying devices. Large keyboards. Braille printers.

4.6 In order for a computer to function it needs an operating system and application software.

4.6.1 Name TWO functions of an operating system. (2) Provides the user with an interface to work with computer/hardware. Responsible for allocating hardware resources. Coordinates all activities of the system. Provides basic security functions. Provides access to storage. Controls boot-up process. Manages the programs running in memory.

4.6.2 Web-based applications are stored on and run on servers. Name TWO advantages of an operating system. (2) Do not need to install software. Applications do not take up your hard disk space. Users do not need to update software on individual computers as it is done on the server. Independent of any operating system. Users can access their applications and data from any computer connected to the Internet. Most of these applications are free.

Page 5: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

5 4.6.3 Name TWO software related problems that could reduce the speed of the computer. (2)

Too many background programs. Computer may be infected by malware/virus. Too many programs open at the same time. A defective application. Software updates being automatically downloaded.

4.7 Computers sometimes use virtual memory. Briefly explain what virtual memory is and how it influences the performance of the computer. (2) Virtual memory is a feature of the OS by which hard disk space can be used as extra memory when RAM is insufficient to load or run programs.

It will slow down the performance of the computer.

5. INTERNET AND NETWORK TECHNOLOGIES 5.1 Name TWO advantages of connecting computers within a network. (2)

Files can be accessed from any computer in the network. Facilitating communication. Files can be transferred without the use of portable devices. Internet access can be controlled. Software can be shared by many users. Hardware, such as printers can be shared by many users. Increased security – user access to network can be controlled form a single point. A single internet connection can be shared by many users. All programs can be installed and updated from a single location. From a teaching point of view, you can get software which allows you to broadcast to all computers in the classroom.

5.2 A file server is one of the basic components of a network. Explain the function of a file server in a network. (1) A file server is a powerful computer that can be used to provide resources and services to all the comput-ers linked together in a network.

5.3 A computer shop offered your school the following package to connect to the Internet using ADSL.

4 Mbps/512 kbps uncapped ADSL

5 hours free Wi-Fi per month at more than 500 hotspots

5 GB Cloud storage account

5.3.1 Explain what the term uncapped refers to in the specification (1) Uncapped means that there is no limit on the amount of data that can be downloaded or uploaded.

5.3.2 Why is video-conferencing and expensive method of communication if you to not have an uncapped Internet connection? (1) Video conferencing takes up a lot of cap (data bundles) because it makes use of video technology.

5.4 Distinguish between a shaped and an unshaped Internet connection. (2) Shaped: gives priority to emails, web-browsing, Internet banking and “normal” downloads via a web-browser. Unshaped: treat all protocols the same.

5.5 When computers are connected to the Internet, it increases the chances of security problems e.g. pop-ups.

5.5.1 What is a pop-up? (1) Pop-up are windows usually of advertisements that appear automatically without your permission when you are on the Internet.

5.5.2 Why is it advisable to block pop-ups? (1) They may relate to spyware infection on the computer.

Page 6: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

6

5.6 All major banks offer online banking. 5.6.1 State TWO advantages of Internet banking compared to conventional banking. (2)

Do not have to stand in queues/saves time. Have access whenever you are on-line/24/7. Do not have to carry large amounts of money around. Keep track of your accounts. Cuts down on travelling/transport costs. Usually cheaper bank charges. Safer as you do not have to go to the bank.

5.6.2 Name ONE way in which banks can protect their clients when they use online banking. (1)

Use of once-off/per session passwords sent to specified cellphone numbers. Automatically logging off after a fixed time period. Passwords/Pin numbers SMS notification of transactions Secure protocols such as SSL.

On-screen keypads for entering pin numbers.

5.7 Caching is one of the features that help us to use the Web more efficiently. 5.7.1 Briefly explain what caching is. (1)

Caching is memory that stores frequently used data, instructions or webpages so that they display more quickly when they are opened again.

5.7.2 Give TWO main reasons for using web cache. (2) Reduces bandwidth usage Allow previous visited pages or data used to load quicker.

6. INFORMATION MANAGEMENT

6.1 Data collection is an important part of information management. 6.1.1 Name TWO advantages of using online surveys to gather information. (2)

Faster than collecting by manual means. Cheaper – you can save on research costs.

More accurate as responses go directly into the system. Quick to analyse

Easier for researchers to manipulate data. More honest responses. More flexible as the order of the questions can easily be changed.

6.1.2 Name the application software that is best suited to process data obtained from a survey. Motivate your answer. (2) Spreadsheet can be used to do calculations/create graphs. Database to extract information via queries.

6.3 What does the symbol indicate? (1) The item has copyright.

6.4 Name ONE popular style according to which your bibliography can be formatted. (1) APA Harvard

6.5 One of the learners visited a website to gather information for an assignment. Give TWO tips on how to check that information sourced from the Internet is in fact correct and reliable. (2) Check the information against more than one source and cross-reference them to see whether the information can be substantiated. Check the bibliography or other references where you can access other sources that support the information. What is possibly missing from the source? Check that the information is free of errors – sources that have spelling and grammar mistakes might be inaccurate in other ways as well. Check whether the source ties in with what you already know.

How often has the information been used?

Page 7: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

7

7. SOCIAL IMPLICATIONS

7.1 Phishing attempts are not limited to e-mail or the Internet. They are also sent as messages to cellphones. 7.1.1 Explain what a phishing attempt is. (1)

Phishing refers to attempts of people to con users into revealing personal and confidential details such as PIN numbers and passwords by posting as a legitimate organisation.

7.1.2 State TWO ways in which you would recognise a phishing attempt. (2) There may be spelling errors in the message The e-mail may be sent from a web address other than the expected one The message would ask you to follow a link and then enter sensitive information

Will ask to confirm confidential details such as passwords etc. Inspect the properties of any links.

7.2 In general the copying of software is illegal. Name ONE instance, however, in which you are allowed to copy software. (1) When making a back-up When it is free software

7.3 Define the following attacks: 7.3.1 Snifter attack (1)

Snifter attack is a process in which a small program or device reads data packets being sent to someone over a network.

7.3.2 DoS attack (1)

DoS is denial of service which means a process where a network or computer is receiving huge amounts of useless data.

7.4 Explain how the following types of computer crime is, committed:

7.4.1 Bandwidth theft (1) The process in which criminals use a person’s Internet connection to connect to the Internet without his or her permission.

7.4.2 Identity theft (1)

Identity theft is the process in which a criminal uses the identity of a person dishonestly.

7.5 Although technology can benefit society in many ways, it can also be harmful to society. Name TWO ways (other than criminal activities) in which technology can have a negative effect of society.(2) Can reduce the personal and social interaction between people. People may become less physically active which could lead to obesity and ill-health The overuse of technology may cause physical harm to people, e.g. RSI. Technology processes may result in unwanted by-products that pollute the environment. E-waste can harm the environment. People can use Internet for harmful research

8. SOLUTION DEVELOPMENT 8.1 Re-write the HTML code segment below to correct it: (1) h1>Computer Application Technology<h>

<h1>Computer Application Technology</h1>

8.2 Rewrite the error-free HTML code below to solve the problem that will occur when it is executed in a browser. (1) <body bgcolor=”black”> <body bgcolor=”blue’> (any colour except black can be accepted)

Page 8: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

8

8.3 Study the extract from the spreadsheet below and answer the questions that follow:

A B C D E F

1 Test Results

2 Surname Name Class Test 1 Test 2 Total

3 100 100 200

4 King James 12A 60 45 105

5 NgQukumba Sizwe 12B 12 62 74

6 Nkonzo Likho 12B 15 24 39

7 Esel Evelina 12A 23 14 37

8 Barnes Jeff 12A 45 84 129

8.3.1 Suggest ONE way in which the names of the learners in Grade 12A can be extracted without copying each name individually. (1) Sort or filter according to class.

8.3.2 The teacher needs to have the same information which appears in the spreadsheet, in a database application. Which feature of an office package can he use to achieve this? (1)

Import from (Get external data).

8.3.3 Why is the SUMIF function not suitable for determining the number of learners in the 12B class? (1) Because SUMIF ADDS together and a function to COUNT is needed to determine the number of learners in 12B.

8.3.4 Which spreadsheet feature could be used to show values in Column D, that are greater than 15, in a particular colour? (1)

Conditional formatting

8.4 One of the learners cannot open a file that he received as an attachment to an e-mail. Name TWO ways in which he may be able to open the document. (2) Save in an earlier/lower version Open on a PC that has the correct software installed

Download and install a patch Try opening in another program, e.g. Open Office.

8.5 Name ONE way advantage of working with “Styles” when creating a document in Word. (1) Consistency - everything looks the same Easier/faster/convenient to format Automatic table of contents

8.6 Some of the learners are puzzled when they have to wait a few minutes before their documents are printed. The

concept of printer spooling is explained to them. (1) Cancel print jobs

Restart a print job Pause a print job Change the order in which print jobs are handled.

8.7 One of the learners discovered that the word processing program has a feature that automatically allows you to add

captions to pictures, graphs or tables. Give TWO reasons, other than saving time, why it is better to use this feature than to do it manually. (2) Captions are always consistently positioned. The format of the captions is always consistent. Captions will update when any relevant change is made in the document. Will show in any table of figures/graphs/tables. Captions are automatically numbered consecutively.

8.8 The teachers are inputting their marks (as percentages) into a database. It is noticed that some teachers are enter-ing marks that are higher than 100.

Page 9: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

9

COMPUTER A

Intel Pentium Dual Core G2020 CPU

Intel H16 Motherboard

Dual CoreG2020 2.9 GHz CPU

2 GB DDR3 RAM

I TB SATA3 HDD

Intel 512 MB Graphics

24x DVD +/- Writer

Integrated 8 Channel Sound

Wireless keyboard and mouse

COMPUTER B

HP 250 F7X46EA 15.6”

Intel Core i3 Notebook

I3-3110m 2.4GHz CPU

15.6 HD LCD Screen

4 GB RAM

500 GB HDD

Windows 8.1 Pro

Integrated 3.2 MP Webcam

3 years Carry-In warranty

8.8.1 Explain how a validation rule could be used to ensure that teachers enter only marks between 0 and 100. (Includ-ing 0 and 100) in the database. Give the actual validation rule you would use as part of your answer. (2) A validation rule can be added to specific field that restricts values of more than 100. Validation rule: >=0 and <=100

8.8.2 Which database feature could be used to ensure that teachers do not leave a mark “blank”? (1) Required property. 9. QUESTION 9 – INTEGRATED SCENARIO

Study the following implications for a desktop and a laptop computer and answer the questions that follow below:

9.1 The School Management Team has to decide whether to purchase desktop computers or laptops.

9.1.1 Name TWO advantages of desktop computers. (2) Cheaper than laptop equivalents. Less likely to be damaged by being dropped or knocked over. Less likely to be stolen Cheaper to upgrade and repair.

9.1.2 Name TWO disadvantages of laptop computers. (2) More expensive than desktop equivalents Can easily be damaged by being dropped or knocked over Expensive to insure as they are often stolen Only run for 2-4 hours without needing access to power Expensive to repair and upgrade.

9.1.3 Name TWO hardware components from the advertisements that play a significant role in the overall performance of the computer. (2) RAM CPU HDD

Page 10: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

10 9.2 The desktop computer includes an optical drive.

9.2.1 Identify an optical drive in the first advertisement. (1)

DVD writer 9.2.2 Name the latest optical drive available today. (1)

Blue ray drive 9.2.3 Why is it better to buy a DVD-RW than a DVD-R disk? (1) DVD-R disks are used once

DVD-RW disks can be erased and new data be added.

9.3 The Management Team needs to make a choice regarding software that is needed for the lab.

9.3.1 Why would you recommend that they buy an office suite rather than stand-alone applications? (2) Can integrate between the different applications Interface is standardised across the different applications Functions are standardised across the programs Cost – cheaper to purchase and office suite Easier to manage updates.

9.3.2 The Management Team does not understand how licencing of software works.

Advise them by briefly explaining to them what type of licence they should buy in order to use the software in the lab. Motivate your answer. (2) Site licence – software can be installed in a number of computers, as long as the computers are owned by the same company.

9.4 Proprietary software is very expensive so, the Management Team decided to investigate the use of free open source

software. 9.4.1 Mention TWO advantages (other than costs) of using free open source software. (2)

Has no copyright restrictions Has no restriction as to the number of computers it can be used on Source code is available for free and may be edited May be distributed in a changed form, subject to the original licence agreement terms.

9.4.2 Mention ONE disadvantage of open source software (1) Open-source is not supported in all geographical areas Some people may not understand the technical help offered on the Internet No-one to be hold responsible Various versions of the same software Resistance to change/comfortable with what they know Not as widely used No guarantee of quality One can generally only get open source software from the Internet

9.5 The Management Team also bought a new printer for the learners to print their assignments. When the first learner wanted to print, as message appeared that said the printer driver could not be found.

9.5.1 Explain what a device driver is. (1) It is software that enables devices to work and communicate with your computer.

9.5.2 Suggest TWO places where they could find the driver. (2)

On the disk that came with the printer Supplied as part of driver database in the operating system

Download driver from the Internet. 9.6 During the process of installing the software an activation code was required. 9.6.1 What is an activation code? (1)

It is a series of numbers characters/letters that gives access to the key/code that unlocks the security or the protection of a program.

Page 11: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

11 9.6.2 Name TWO reasons why developers of software use activation codes. (2)

To ensure that the program is loaded only on the number of computers specified on the licence Reduce piracy/certify that the program is an original copy/increase security To link the copy of software to you To register you as user to enable help and online support

9.6.3 When installing the software the learners were confronted with an option of a typical, custom or full type of installa-

tion. Distinguish between a typical and custom installation. (2)

Custom installation allows more experienced users to choose the components of the program that must be installed. Typical installation contains the options and components of the software that most people want.

9.7 After a go-green campaign launched by the land service club of the school, the learners decided to go-green in the computer lab as well.

9.7.1 State TWO ways in which the learners can reduce printing in order to save paper. (2) Use print preview before printing Print on both sides of the paper Change document formatting, for example, smaller font size/reduce margin size Print two or more pages to one sheet Communicate/Save electronically

9.7.2 State TWO ways in which they can save on electricity. (2) By switching computers off when not in use

Use energy saving devices e.g. LED screens

9.8 A parent of one of the learners donate an SSD for each computer in the Lab.

9.8.1 Name TWO reasons why added SSD’s to the computers will benefit the learners. (2) They are much faster than normal hard drives. The cannot be damaged easily/No moving parts/Durable Energy efficient They run quieter than traditional hard drives.

9.8.2 Name TWO disadvantages of an SSD. (2)

They are expensive Smaller capacity than traditional hard drives.

9.9 After losing some of their work as a result of loadshedding, the learners soon realise how important it is to back-up

their folders.

9.9.1 Name TWO important practices that should be part of a back-up policy. (2) Use software that updates automatically. Backup data only, not programs Use external storage medium (external hard drive) Keep backup in other location in case of theft, fire. Do maintenance of data to have no unnecessary duplicates. Archive large files not used often. Check that backup works by opening backed up files once in a while.

9.9. Which storage device is the most suitable for back-ups? (1) External hard drive

DVD Flash drives Blue ray disks CD

9.10 One of the learners downloaded a bursary application form in PDF format. 9.10.1 Name TWO reasons why electronic documents are often distributed in PDF format. (2) You do not need the program in which the document was created to open it.

The program required to read these documents is free/widely available

Page 12: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

12 9.10.1 What software package do you need to view a PDF file?

Adobe Reader (1)

9.11 The learners soon realise that viruses and malware are a big concern, especially in a network environment. It seems that even the anti-virus program that they installed 3 years ago is not effective anymore.

9.11.1 Explain to them why it is necessary to update your anti-virus program regularly by explaining how this software works. (2) An anti-virus program is a database with unique virus definitions. The anti-virus software detects the vi-rus by comparing it to its database of definitions.

9.11.2 One of the teachers feels that computers will not get affected by viruses if they are not connected to the Internet.

Do you agree? Motivate your answer. (2) No, viruses can install themselves on systems via any portable storage media.

9.11.3 Name TWO tips on how to prevent computers from being infected by viruses (other than the installing and updat-

ing of anti-virus software). (2) Disable “auto run” features for flash drives Scan all portable storage media before using them. Do not open attachments from unknown sources. Do not interact with/click on pop-ups that appear on the screen.

9.11.4 After a scan, the antivirus program displays a message saying that a virus was detected and quarantined.

Explain what if means when a virus is quarantined. (1) The virus is moved into an area where it cannot cause harm.

9.12 One of the advantages of having a computer lab at the hostel is that learners can communicate easily with learn-ers in other school via social networking websites.

9.12.1 Name TWO popular social networking websites. (2) Facebook Twitter LinkedIn My Space Second life

9.12.2 One of the potential disadvantages of social networking websites, is “cloning”. What do you understand by the cloning of a user’s profile? (1) Create a duplicate user’s name and profile picture from their existing account.

9.12.3 Name TWO other disadvantages of social websites. (2)

You have to have access to the Internet to be able to communicate Increased risk of identity theft Many people have false information on their profiles Increased risk of loss in productivity of employees/learners Quantity of communication at the expense of quality communication.

_____________________________________________________________________________________

Page 13: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

13 PAPER 2

SECTION A 1. Write down only the number of the description from Column A, and next to it the correct matching capital letter from

Column B. (10)

COLUMN A C COLUMN B A Answer

1. A feature in online forums,

newsgroups and e-mail clients which automatically groups messages according to a topic or a sender.

A HDMI P

2. A type of website that lets people contribute to the content of web pages B WMA E

3. A computer that has been compromised

or infected and that can be controlled remotely via the Internet. C UPS H

4. A device designed to protect a computer against power

interruptions and spikes. D MICR C

5. A test used in on-line forms to determine whether or not the user is human. E Wiki K

6. An address used to identify resources such as web pages on the internet. F DoS R

7. A file type that includes both audio and video content. G OMR M

8. A technology used to scan and mark computerised tests. H Bot G

9. A type of monitor interface that uses digital signals and transmits

high definition video and audio via a signal cable. I Barcode A

10. A type of square code that can be scanned by devices

such as a smartphone equipped with a camera. J Spike N

K CAPTCHA

L Rule

M MP4

N QR

O VGA

P Thread

Q HTML

R URL

S Biometric

Page 14: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

14 2. State whether each of the following statements is TRUE or FALSE If the statement is FALSE, then write down the word FALSE and, next to it, the word(s) which should replace the

underlined word(s) to make the statement TRUE. (Note that no marks will be awarded if FALSE is given without a suggested replacement). Example: A printer is an example of software – FALSE – hardware (5)

2.1 Importing refers to saving data in a format that can be read by a different version of the same software or even a completely different program. False – exporting

2.2 Pharming refers to when users are tricked into clicking on an item on a web page which acts as a concealed link. False – Click-jacking

2.3 The wildcard character”?” in Access represents a single character.

True

2.4 Archiving is the process whereby browsers temporarily store web pages on a hard drive so they can be loaded more quickly in the future. False – caching

2.5 The FIND spreadsheet can be used to determine the position of a substring within a string.

True

3. Identify the correct answer for each question. Write down only the number of each question, and next to it the single capital letter that represents the best answer. (10)

3.1 Which of the following terms is NOT directly associated with software?(D) A. GUI B. EULA C. FOSS D. SOHO

3.2 Which one of the following is a technology that uses tiny radio devices to store and send data?(A) A. RFID B. LTE C. MICR D. FTP

3.3 Which one of the following types of networks is generally associated with the use of Bluetooth and USB cables?(D) A. LAN B. HAN C. WAN D. PAN

3.4 Which one of the following statements about cloud computing is FALSE?(B) A. You can ‘rent’ a virtual server from a company like Amazon. B. You need to download the software to access the resources. C. You can work with other users on the same document at the same time. D. You need to have a good Internet connection to use cloud computing effectively.

3.5 Which one of the following is NOT a consideration when buying a printer?(A) A. Contrast ration B. System compatibility C. Monthly duty cycle D. Wireless capacity.

3.6 Which one of the following fields in a database table is suitable to act as a primary key?(D)

Field 1 Field 2 Field 3

1 Smith 0728836576

2 Smith 0728836576

3 Evans 0849873451

5 Benn 0821928494

Page 15: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

15

A. Field 1 B. Field 2 C. Field 3

D. None of the above 3.7 Which one of the following differences between SSDs (Solid State Drives) and traditional (mechanical) hard drives

is false?(D) A. SSDs are faster than traditional hard drives B. SSDs have no moving parts C. SSDs run quieter than traditional hard drives D. SSDs use more power than traditional hard drives

3.8 Which one of the following keystroke combinations will activate a menu option given as: File?(A) A. <Alt><F> B. <Ctrl><F>

C. <Esc><F> D. <Shift><F> 3.9 Which one of the following spreadsheet calculations could result in the error message #DIV/0! being displayed.(B)

A. =SUM(A1:A7) B. =A2/B3

C. =A3*AA5 D. =COUNTIF(B3:D4,0)

3.10 Which one of the following components might have a specification ‘Response time 5 ms’? (D) A. Keyboard B. Hard drive C. Mouse D. Monitor

4. SYSTEM TECHNOLOGIES

4.1 Consider the following specifications for a typical smartphone and answer the questions that follow below:

4” Display 960 x 640

802.11 ac

Android platform

NFC 4.1.1 What does the specification 960 x 640measure? (1)

Resolution

4.1.2 What is the 802.11 technology listed in the specifications better known as? (1) WiFi

4.1.3 The smartphone runs on the Android platform (1) Give another word for the term ‘platform’ in this context.

Operating system

4.1.4 Briefly describe the significance for function of the NFC specification. (2) Allows devices (e.g. smartphones) to connect wirelessly

4.1.5 Give the general name for programs that can be downloaded and installed on a smartphone. (1) Apps

4.1.6 Briefly explain why a smartphone is a good example of convergence. (1) A smartphone combines various devices and gadgets into single device, that allows the user to perform many different tasks without carrying around many different devices. (GPS, camera, e-mail)

Page 16: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

16

For PC and Xbox 360

Vibration Feedback

Ergonomic

Wireless

4.2 Consider the following advert and specifications for a computer and answer the questions that follow:

A

Plus FREE Gamepad 4.2.1 What component and what specification of the component does the specification 2.7 GHZ refer to? (2)

Component = Central Processing Unit (CPU) Specification = speed

4.2.2 Express the storage capacity of this computer in Gigabytes. (2)

1000 GB

4.2.3 Give TWO general differences between memory and storage, apart from their different capacities. (2) Memory (RAM) is volatile/needs power; storage is non-volatile/does not need power (or memory is tem-porary storage while the computer is on, while storage is long-term even when computer is off). Memory is faster than storage Memory is always/only electronic; storage can be magnetic/optical/electronic Memory is more expensive (per unit) than storage Memory is always internal (DIMM on motherboard; storage = internal OR external

4.2.4 What component does the ‘HDMI’ specification refer to? (You may also give an example of what this component could be used for). (1) Port used to connect computer to a monitor/TV screen

4.2.5 Give an example of system software in the advert, besides the operating system. (1) Kaspersky Anti-Virus 2015

4.2.6 Give the most likely connection port used to connect the external DVD-Writer to the computer. (1) USB

4.2.7 What is ‘Bing” (as advertised with Windows 8.1)? (1) Search engine

4.2.8 Give ONE specification in the advert that indicates that this is probably a portable computer. (1) 15.6” Display (not a standard screen size for desktop computers)

WiFi3G (not usually included in desktop computers) Webcam (not traditionally found in desktop monitors, but note that some desktop monitors DO have in-tegrated webcam) Battery

4.2.9 The free gamepad on the right is described as ‘ergonomic’. Give the name of the health condition that the user could be exposed to if the gamepad were NOT ergonomically designed. (1)

RSI – Repetitive Strain injury or CTS – Carpal Tunnel Syndrome.

15.6” Full HD Touch Display Intel Core i5 2.7 GHz 4 GB DDR3 RAM 1 TB Hard Drive

3 x USB HDMI

WiFi 3 G Built-in Webcam External DVD-Writer Kaspersky Anti-virus 2015 Windows 8.1 with Bing Microsoft Office 365 Personal 6 Cell Battery

Page 17: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

17 4.2.10 Briefly explain, with reference to the advertisement, why this gamepad can be described as both and input and

output device. (2) Used for input e.g. buttons/controls that need to be pressed/manipulated and also provides output (Vibration Feedback)

4.2.11 Name the device or technology that would be used to connect the gamepad to the computer. (1) Bluetooth

4.3 System software is essential for any computer system.

4.3.1 Give TWO functions of an operating system. (2) Provides user interface Manages programs (disk management/memory management/input-output management) Provides security (username and password control/Firewall functions)

4.3.2 What is the general aim of a disk cleanup utility? (1) To make storage space available (removing temporary files)

4.4 Give ONE way in which a user can improve the general performance of a computer, without adding or changing any hardware items? (1) Stop/close unnecessary programs Defragment the hard drive.

5. INTERNET AND NETWORK TECHNOLOGIES

5.1 Consider the following features of an ADSL Internet connection package and answer the questions that follow:

20 GB monthly data usage Up to 4 Mbps ADSL line

Unshaped

5.1.1 Give the term generally used to describe the maximum monthly data usage (in this case 20 GB) (1)

Cap 5.1.2 What specification of the ADSL line does 4 Mbps refer to? (1)

Speed/bandwidth

5.1.3 Briefly explain what an unshaped Internet connection is. (1) All Internet services (e.g. e-mail, browsing, downloading) are given the same priority i.e. speed.

5.1.4 Give the main reason for choosing a 3G Internet connection over an ADSL Internet connection. (1)

The connection needs to be portable/not tied to a fixed line such as ADSL. 5.2 VoIP is a protocol used by software packages such as Skype and Facebook.

5.2.1 What does VoIP allow one to do? (1)

Making telephone (voice) calls over a network such as the Internet.

5.2.2 Give TWO advantages of using VoIP software, other than any answer you gave to question 5.2.1. (2) Cheaper than normal phone calls/VoIP software is usually free Can transfer files Can include video in the call Don’t need to worry about Service Provider/SIM card issues between different countries and continents.

5.3 List TWO things you should avoid doing when using the Internet, in order to protect yourself against computer crime. (2) Do not give out personal information (i.e. ID number) unnecessarily Do not click on links in pop-ups Do not click on links in suspicious e-mail messages (phishing attempts) etc. Do not open e-mail attachments unless you are sure of their safety/origin Do not leave your computer unattended, without logging off/locking PC Do not respond to hoaxes (e.g. get-rich-quick schemes) etc.

Page 18: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

18 5.4 Give TWO advantages of using online storage, apart from the fact that it is a simple and cost-effective way to

share and transfer files. (2) Accessible wherever there is Internet access Allows for files to be synchronized across multiple devices Accessible from/via a variety of devices Backup and security handled by the service provider Saves space on local storage Data remains accessible if computer or device is damage/stolen, etc.

5.5 SETI@home and Folding@home are projects that rely on grid computing. Explain briefly what grid computing is. (2) A way in which the resources (processing power and time) of different computers are shared (and used at the same time) to solve a single problem.

5.6 Information overload happens when people cannot cope with the amount of information they have to deal with. 5.6.1 Briefly explain how the use of RSS feeds can help prevent information overload. (1)

Users can choose from which websites they wish to receive updated content automatically.

5.6.2 Give ONE other way (besides using RSS technology) to prevent information overload. (1) Learn to read quickly and to identify key points. Learn to analyse and compare sources Don’t add to problem by forwarding unnecessary information to others. Take a disciplined/structured/focused approach to dealing with information. (Also accept the following examples: Create a routine/ fixed time to deal with information Remove distractions (IM, browsing) Filter e-mail/create categories etc

Use search tools properly (advanced searches, good keywords etc).

6. INFORMATION MANAGEMENT

6.1 Questionnaires created in a word processor often use form fields for both closed questions and open-ended types of questions.

6.1.1 Briefly explain the difference between closed and open-ended types of questions. (2) Closed question: Can be answered directly by facts/one answer/undisputed answer. Open-ended question: Need further investigation/include higher-level questions that help to make judgements or recommendations/suggest advantages & disadvantages, etc.

6.1.2 Briefly explain why a drop-down form field is often used in closed questions. (1) One can provide a set of answers from which the selection must be made.

6.2 Give TWO possible benefits of conducting surveys online instead of manually or ‘by hand’ on paper, besides the fact that it saves time and is easier. (2) (Do not accept saves time and is easier) Potentially more accurate data The survey itself can easily be changed/adapted Potentially wider survey sample available (more people) Can cause multimedia to enhance/explain Easier to process results (already in digital format) Cheaper than manual methods (using paper, people) Smaller ‘carbon footprint’/better for environment, etc

6.3 Spreadsheets and databases are both powerful tools for manipulating and processing data. Give TWO reasons why it is sometimes better to use a spreadsheet, rather than a database, to analyse and pre-sent data. (2) Excel has more functions for working with numbers If one wishes/needs to work with numbers, a spreadsheet is handy because of the tabular format and the features which this provides, such as relative and absolute cell referencing and copying func-tions/formulas. Quicker and easier to copy/move/delete data, as it is not bound by database table structure (records and fields), integrity rules etc. No need to create different objects (tables, queries, forms, reports), or to switch between views (e.g. De-sign and Datasheet), in order to process and present information –

Page 19: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

19

the “working” view is also in “More useful error messages, if mistakes in calculations Easier and quicker to test “what-if” scenarios and trends More formatting and graphical options to present data (e.g. merged cells, borders, individual cell colours, text orientation) Can create charts/graphs

6.4 Give ONE general advantage of using a website, over a PowerPoint presentation, to present the findings of an in-vestigation. (1) Can reach a wider audience No need to specify a viewing time No need to specify a viewing place

No travelling involved, so environment

6.5 Consider the following extract of a file that was saved from an electronic form

in Word and answer the following questions that follow:

“James”,”Block”,1,0,”General”,”10:00”

“Than-di”,”Sinoxolo”,1,0,”Vegetarian”,”23:00” “Bianca”,”Du Toit”,1,0,”Halaal”,”21:00”

6.5.1 Give the type of format in which the file was saved. (1)

CSV – Comma Separated Value

6.5.2 The data in the file will be imported into an Access table. Explain the significance or function of the commas in each of the lines, in terms of the Access table structure. (1)

Commas determine the fields of each record.

7. SOCIAL IMPLICATIONS

7.1 Technology is neither all good nor all bad. Give one benefit and one disadvantage of the use of technology in the field of education. Distinguish clearly between the benefit and the disadvantage in your answer. (2) Benefit Up-to-date information/ resources, for both teachers and learners. Collaboration (removal of geographic boundaries, sharing resources and best practices, cross cultural ex-changes Cost-effectiveness (limit the use of paper) Potentially higher quality instruction (use of video lessons/tutorials) Remedial and high-end teaching (ICT is good for interventions, drill work, self-paced study) Administration (reporting, record keeping, planning, budgeting, etc) Disadvantage Expectation/requirement of higher educational qualifications for entry into the job market Implications of the ‘digital-divide’: those on the wrong side of the divide are now at an even bigger disad-vantage. Cost factors – initial costs, maintenance, security Teachers need to upgrade skills/’resistance’ to change factor Home languages may not always be catered for in (imported) application package

7.2 Theft of hardware is often the least harmful type of theft involving computers. Briefly describe TWO other types of theft that can be committed by using computer technology. (2) Bandwidth/cap – watch videos/movies online, big downloads Identity theft – use of computers to impersonate others, phishing etc Money – by means of card-skimming, phishing, hoaxes etc Processing time and power – use of office computers for private purposes Data/intellectual property – financial information, trade secrets, plagiarism etc Piracy – use of computers for illegal downloads, duplication of CDs and DVDs etc

7.3 Green computing is a term used to describe computer usage that is sensitive to the environment.

7.3.1 Briefly explain how the use of digital communications has the potential to contribute to green computing. (1) Less printing – cut down on paper, ink

Less travelling (i.e. more telecommuting) – cut down on vehicle emissions etc

Lower (physical) storage and other infrastructure requirements that can have a negative impact on environment etc

Page 20: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

20 7.3.2 Give ONE way in which we can limit the amount of electricity we use when working with computers. (1) Switch off (monitors, devices, chargers etc) when not in use

Use power-saving features ‘sleep’, and ‘hibernation’ modes etc (Accept specific examples for e.g. smartphones) Dim screen brightness Keep screen time-out short Disable Bluetooth, WiFi, GPS, 3G/4G (when not in use) Don’t leave apps running in the background – close unnecessary ones Do not use ‘vibrate’ Turn off non-essential notifications Turn off ‘push’ e-mail – i.e. change setting to ‘fetch” e-mail instead Don’t leave phone in sunlight/warm environments (battery runs out sooner)

7.3.3 Briefly explain why you should not throw an old (but still working) printer in the rubbish, AND give one suggestion what to do with this printer that would be environmentally more acceptable. (2) Printers contain harmful chemicals/materials that can cause environmental damage Recycle the printer properly/donate to someone who could use it

7.4 Give ONE output device that people who suffer from poor eyesight or blindness could use to help them use a com-puter more easily. (1)

Magnification devices Braille printer Speaker/headphones (for e.g. text-to-speech) Braille ‘display’

7.5 Some sites allow you to log in with Facebook instead of registering directly on the site. Briefly explain the benefit of this for Facebook. (1) It allows Facebook to get more information about its users for marketing purposes.

8. SOLUTION DEVELOPMENT

8.1 The Accessibility Checker was used on a certain Word document. The following screenshot of the inspection result shows there are 21 instances of ‘Missing Alt Text’:

Accessibility Checker x

Inspection results

ERRORS

Missing AltText (21)

8.1.1 From which type of objects in the document is the alternate text missing? (1)

Non-text objects (images, diagrams, SmartArt) 8.1.2 For which type of user handicap will this document be made more accessible if the ‘Missing Alt Text’ errors are

fixed? Blindness/partial vision

8.2 Give ONE advantage of saving and distributing a word processing document in PDF format, rather than in a word

processing format. (1) Recipient can read document without having program in which it was created Reader program easily and freely available Electronic documents converted to PDF format can be smaller in size – faster to send and less storage space needed No need to worry about compatibility issues – i.e. which version of Word will be used to read the document

8.3 A friend received the following error message when she tried to insert an automatic Table of Contents in a Word document. No table of contents entries found.

Briefly explain why not entries for a table of contents were found in the document. (1) The Word document did not contain any text formatted in one of the built-in heading styles (i.eHeading 1) or The Word document did contain text formatted in one of the built-in heading styles, but no provision was

Page 21: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

21

made in the Table of Contents Options dialog box, for a TOC Level (1,2,3, etc) to be linked to one of these styles, or to another user-defined style.

8.4 Examine the following screenshot of a spreadsheet showing the top five percentages in a test and answer the ques-tions that follow:

8.4.1 Write down the result or answer of the following calculation performed on the above data: =MEDIAN (A3:E3) (1)

70%

8.4.2 Give the name of the type of error you would get if you entered the following in cell F3: =AVERAGE (A3:F3). (1) Circular reference

8.5 Examine the following screenshot of a spreadsheet and answer the questions that follow:

8.5.1 Give only the name of the text function that was used to determine the number of digits in the ID number. (1)

LEN

8.5.2 The first 6 digits of a person’s ID number give the date of birth of the person, in the format YYMMDD. Give only the name of the text function that was used to extract the month (11) from the ID number. (1) MID

8.6 The function below was used in a spreadsheet to round the number in Cell A6 up to 2 places after the decimal point: =ROUNDUP(“2”,A6) Give TWO reasons why this function will NOT work correctly. (2)

Function should be: =ROUNDUP(A6,2) Order of arguments: first cell reference (A6), then the number (2) Number 2 (places after decimal point) must NOT be in quotation marks

8.7 The following dialog box (‘Enter Parameter Value’) appeared unexpectedly when a query containing a calculated field was performed in Access:

Enter Parameter Value ?x

New Price

OK Cancel

Give the most likely mistake that was made in the calculated field. (1)

‘New Price’ that was used as a field in the calculation did not correspond with an actual field name - proba-bly a spelling mistake, or the space was left out by mistake (e.g. NewPrice)

Page 22: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

22 8.8 The following Access query is supposed to display the ages in years of all the Grade 12 learners who will be younger

than 17 years on 31 December 2015:

Field: Surname Grade DateOfBirth Age:(31/12/2015-[DateOfBirth])/365.25

Table: Learners Learners Learners

Sort:

Show:

Criteria:

or: 12 >17

Give FOUR reasons why the above query design will NOT produce the required information. (4) Date 31/12/2015 not enclosed by hash symbols (#31/12/2015#

Show box for Age field not ‘ticked’ Criteria in Grade and DateOfBirth fields in different rows. >17 instead of <17

9. INTEGRATED SCENARIO 9.1 The five desktop computers in the Media Centre are networked to a server in the Computer Room.

Examine the following diagram of the basic layout of the computers in the Media Centre and answer the question that follow:

Media Centre

B

C

To Computer Room 9.1.1Give the name of the device (A), to which the computers in the Media Centre are connected (1) Switch

9.1.2 Give the name of the type of network cable (B) commonly used to the connect each computer to the device (A)

(1) UTP

9.1.3 Fibre optic cable (C) is used to connect the computers in the Media Centre to the server in the Computer Room (a) Give TWO general functions of a server in a network. (1) Provide resources/services to other computers in the network File server – stores users’ files centrally/other source files/ backups E-mail server – handles em-mail needs of organisation Internet/Proxy server – Internet access and control/malware control Print server – handles printing requirements Application server – application software/website hosting

(b) Give the main advantage of using fibre optic cable for this purpose (2) Higher speed/bandwidth Longer cable runs and Greater distances

A

Page 23: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

23 9.2 You have been asked to draw up an AUP, and to investigate software to control (i.e. ‘block’ or ‘unblock’) the use of

flash drives on the computers.

9.2.1 State what the letters AUP stand for. (1) Acceptable Use Policy

9.2.2 Give ONE likely reason for the decision to control the use of flash drives. (1) Prevent theft of data/information – including illegal downloads Prevent use of unauthorised software, e.g. computer games – with associated waste of time/loss of focus and productivity Prevent spreading of malware such as viruses

9.3 The Media Centre currently has one multifunction injet printer to satisfy the large printing demand. (1)

9.3.1 Give ONE reason why the current printer will probably not be suitable for long-term use in the Media Centre (1) Higher running costs (inkjet) Slower printing – difficult to satisfy ‘large printing demand’ General print quality not as good as ‘another’ (=laser) printer Not designed for heavy printing demands/can fail more easily

9.3.2 Name another type of printer that may be more suitable for the Media Centre. (1) Laser

9.3.3 Give ONE reason for keeping the current printer in use at the Media Centre, apart from any reasons relating to

green computing. (1) Multifunction printer – so that it can also be used for scanning, copying, faxing etc (must mention at least one function other than printing) Could be used as back-up printer, in case other printer fails/runs out of toner Potentially better (than e.g. laser printer) for high quality colour photos

9.4 Consider the following dialog box, which shows three documents waiting to be printed on the HP Officejet printer, and answer the questions that follow:

HP Officejet 4500 – Use Printer Offline

Printer Document View

Document Name Status Pages Size

Microsoft Word – Birthday

Budget.xlsx Microsoft Word – English project

1

4 15

18.6 KB

73.8 KB 14.5 MN

9.4.1 What name is given to a list of ‘print jobs’ awaiting printing? (1)

Queue

9.4.2 Give ONE reason for using this dialog box, besides obtaining the information already displayed – i.e. the names of documents, their status, number of pages and size. (1)

To delete the print job (cancel without printout – hardcopy no longer needed) To pause the print job (because of a paper jam, or to install new ink cartridge) To restart the print job (after it was paused for a reason

9.5 The purchase of a tablet and a notebook for the Media Centre is being considered.

9.5.1 Give the name of a wireless technology that could be used to connect the tablet and the notebook wirelessly to the network. (1) WiFi/Bluetooth

9.5.2 Give TWO ways in which photos stored on the tablet could be transferred to the notebook, besides wirelessly. (2) Memory card USB cable (must mention USB) UTP cable (must mention UTP, or at least ‘network cable’)

9.5.3 The team manager recently bought a phablet.

Page 24: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

24 Give the main advantage of a phablet over a tablet. (1) Phablet has a smaller screen than a tablet – more portable/easier to fit into a pocket (PRINTED UP TO HERE)

PAPER 3 SECTION A QUESTION 1 (10)

Choose a term/concept from COLUMN B that best matches the description in COLUMN A. Write only the letter

A-S next to the question number.

COLUMN A COLUMN B ANSWER

1.1 A way in which one section in a document can be compared to another

section. A domain I

1.2 An area of memory that stores frequently used data or instructions. B internet F

1.3 Tags that have only an opening and no closing tab. C grid computing M

1.4 A group of computers in one network that are accessed and controlled by

the same set of rules and procedures. D opening tag A

1.5 Amount of data that can travel from one point to another over a

connection in a set period of time. E HTML N

1.6 A hint or information that pops up when resting the cursor on an icon or

object. F cache K

1.7 An audio/video recording of a live event, made available to download and

list to at a later time. G podcast G

1.8 A group of networks connected to each other globally. H Cap B

1.9 A type of wireless connection I Cross reference S

1.10 A letter and number used to represent a specific point within a spread-

sheet. J Intranet R

K tooltip

L broadband

M empty tag

N bandwidth

O ergonomics

P download

Q extranet

R cell reference

S Wi-Fi

QUESTION 2 – MULTIPLE-CHOICE QUESTIONS (10) Various options are given as possible answers to the following questions. Choose the answer and write only the

letter (A-D) next to the question number.

Page 25: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

25 2.1 Which one of the following does NOT logically belong to the others? C A. Scanner B. Mouse C. Monitor D. Keybord

2.2 Which of the following are examples of dedicated lines? C A. ISP, Sentech B. HSDP, GPRS C. ADSL, DIGINET D. ISDN, iBurst

2.3 Which ONE of the following is NOT an example of electronic communication? A A. PDA B. Mxit C. SMS D. IM 2.4 Which one of the following graphs best displays the changes in temperature over a period of a month. B A. Pie chart B. Line chart C. Scatter chart D. Bubble chart

2.5 What type of data is normally contained within a file with a .mov. extension? D A. Sound B. Picture C. Graphic D. Video

2.6 Linux is an example of ...... software. D A. Application B. Anti-virus C. Proprietory D. Open source

2.7 Which ONE of the following sites is NOT directly associated with e-commerce. C A. Amazon B. eBay C. Gumtree D. Kalahari 2.8 Which ONE of the following functions allows you to combine the content from different cells into one when

using a spreadsheet. B A. Addition B. CONCATENATE C. VLOOKUP D. Merge

2.9 A file that is pre-formatted with regard to layout, fonts and/or margins. A A. Template B. Example C. Document D. CV

2.10 Which ONE of the following is NOT directly related to an Internet connection? D A. Switch B. Router C. Hub D. None of the above

QUESTION 3 – MODIFIED TRUE/FALSE (5)

Page 26: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

26 All of the following statements are FALSE. Rewrite the statement in order for it to be TRUE by ONLY changing the underlined word/phrase.

3.1 A web browser patch is an additional piece of software that potentially gives a web browser more functions. Plug-

in 3.2 Swapping is the term used to describe the rapid swapping of data between the RAM and hard drive. Thrashing 3.3 Fragmentation is the process where a utility rearranges the clusters on the disk so that files are saved in

sequential clusters. Defragmentation 3.4 Spyware is an application that displays online advertisement on the web pages, e-mail or other Internet services.

Adware 3.5 Formatting is a process where files and folders are made smaller in size without losing any information.

Compressing SECTION B SCENARIO

The local municipality has approached your school with funds to install a computer centre on agreement that the computer centre will also be used by the local community.

Answer all the questions in SECTION B based on this scenario.

QUESTION 4: SYSTEMS TECHNOLOGY

4.1 The organisers would like to buy high end hardware and software.

4.1.1 You suggest buying ergonomically designed hardware. List TWO features of an ergonomically designed keyboard. (2) Could have a wrist rest

Could have a split key or curved keyboards Soft keys Adjustable feet on the bottom, usually at the back.

4.1.2 Explain to the organisers TWO advantages of buying a scanner to use in the computer centre. (2) Scanners convert images or documents from hard copies to electronic copies on your computer.

These copies can be edited or sent electronically. Electronic backups/archives.

4.1.3 The school would like to purchase a digital camera. Name TWO specifications (excluding cost) to keep in mind when deciding on a digital camera. (2)

Resolution Zoom features Storage capacity/storage type

Removable/non-removable lens Battery type

4.1.4 List TWO ways in which photographs can be transferred from a digital camera to a computer. USB cables/connection (2) Remove and insert memory cards Wireless such as Bluetooth/Wi-Fi/Eye-Fi

4.1.5 What is the difference between a barcode and and RDIF tag? (2) RFID tags are small radio devices used to store data whilst bar code devices use machine readable

codes attached to goods. 4.1.6 Explain to organisers why they should use RFID tags instead of barcodes for inventory purposes. (1) No need to physically look for the barcode and scan it with a portable scanner

4.2 A lot of documents will be printed in the centre.

Page 27: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

27 4.2.1 Which printer will be suitable for the computer centre where a lot of monochrome documents will be printed?

(1) Laser printer

4.2.2 Name TWO possible causes of a printer not working, a day after it was functioning perfectly. (2)

Check the wall socket for power Check if the printer is turned on Check if printer has paper Check if printer has ink Check if printer is a default printer

4.2.3 What is the benefit of having a 3D graphics card in a computer? (1) Enable higher resolution/better quality graphics

4.3 Computers can have a wide range of storage devices.

4.3.1 Name an example of a type of memory card. (1)

SD Micro SD Mini SD MMC XD

4.3.2 Some new flash drives are equipped with biometric security. What does the term biometric mean in this context (1)

Device can only be used/accessed by using a biological feature unique to the person like a fingerprint. 4.3.3 Name ONE advantage of having an external hard drive in a computer centre. (1) Allows for portable backups

Can save/spare disk space in the computers

4.3.4 What port would you normally use to connect the external hard drive to a computer? (1) USB port

4.4 The organisers need to make a choice with regard to software that will be needed.

Page 28: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

28 4.4.1 The operating system is available in a Home and Professional version.

What type of user is the professional version aimed at? (1) A professional edition is a version of software that is designed to be used by businesses, not by home

users.

4.4.2 What is the difference between the minimum and recommended specifications with regard to software? (2) Minimum system requirements are the lowest hardware and software specifications

an application needs to work at all, and a recommended system requirements are hardware and software specification that will enable the application to work at its best.

4.4.3 What is a service pack? (1) A service pack is a collection of patches released over a period of time that are combine and

distributed as one single download or file.

4.4.4 Some software needs an activation code to work. Explain what an activation code is. (1) An activation code is a specific software based key for a computer program that certifies that the copy

of the program is original.

4.4.5 Why would you recommend the installation of trial software? (1) To test the software before buying.

QUESTION 5: INTERNET AND NETWORK TECHNOLOGY

5.1 Name TWO advantages of connecting computers to a network. (2) Share data infomation Share expensive computer devices

Manage security centrally Central storage Central update of software Gaming

5.2 List TWO advantages of using a WLAN. (2)

Less cables Mobility of devices Connection can be made where cables cannot be connected

5.3 The Internet offers a variety of services.

5.3.1 What is the major difference between real time messaging and e-mail communication? (2) Real time messaging is a communication method in which users communicate

directly with each other without any delay whereas e-mail messaging is a commu-nication method where communication is delayed.

5.3.2 List TWO advantages of cloud computing. (2) Software is always up to date

You do not6 have to download or install any applications to access your resources Save disk space in your computer Share documents easily with other people Documents are automatically backed up by the system Access data from anywhere in the world over the Internet

5.3.3 Video conferencing might turn out to be an expensive option if the centre has a capped Internet account. Explain why this statement is true. (2) Sending and receiving video uses more data than audio alone Capped account could then run out of data quickly

5.3.4 What is the difference between a web-based and an ISP-based and an ISP-based e-mail account? (2) Web-based mail allows you to manage your mail via a web browser whilst ISP-

based e-mail accounts are located on the ISP server and need e–mail client such as MS Outlook to check your e-mail.

5.4 Unfortunately the Internet may also negatively affect your computer.

5.4.1 What is the main difference between an e-mail hoax and e-mail spoofing? (2)

Page 29: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

29 An e-mail hoax is a false message that describes false information and an e-mail spoofing is a process in

which a criminal sends an e-mail where the sender address looks like a legitimate e-mail address, such as a bank.

5.4.2 What is spyware? (1) Spyware is malware which infects computers and secretly collects information about the user such as

browsing habits.

QUESTION 6: INFORMATION MANAGEMENT Due to large volumes of data available to learners, efficient information management is vital.

6.1 Define the term plagiarism. (1) Copying any information and using it as it is your own (without acknowledging the original author.

6.2 Mention TWO criteria to help assessing information contained in a website. (2) Affiliation

Author Content Objectivity Trustworthy

Date of publication 6.3 Spreadsheets are commonly used for manipulation of data.

List TWO aspects of a spreadsheet that can be used to manipulate data. (2)

Graphs Functions Formulae 6.4 When searching the Internet for information, you need to narrow down your search for more accurate

results.

6.4.1 Explain the term “hit” by referring to how a search engine works. (1) A hit is the number of responses/websites one gets when he uses a search engine to search for

information in the Internet. 6.4.2 When searching for information on the Internet regarding the new technology, explain why you receive more hits

when adding quotation marks such as “new technology”. (1) Quotation marks force the search engine to look at all the words within the quotation marks together instead of separately.

6.4.3 Besides quotation marks, mention TWO more ways search results can be narrowed down. (2) Limit the search to a certain type of information e.g. images

Use specific words/phrases Use logical operators such as ‘AND’ Search within date ranges

Use specific domain/advanced search features Dedicated search engines

6.5 What is a survey? (1) A survey is a process where data is collected fom individuals using questionnaires QUESTION 7: SOCIAL IMPLICATIONS 7.1 Mention TWO advantages of using ICT with regard to communication. (2) Contributes to green computing

People all over the world can collaborate Data can be transferred from one application to the other Employees can communicate Saves money and time

Page 30: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

30

7.2 Besides installing an anti-virus which is updated regularly, name TWO more ways in which you can prevent virus infection on your computer. (2)

Do not share removable storage Do not download from suspicious websites Do not open e-mail from suspecting source Do not use pirated software

7.3 Define the term copyright (1) Copyright – exclusive and legal right to intellectual property such as a book or music for a period of time 7.4 Banks advise customers not to use public computers for banking transactions.

7.4.1 Explain why banks give this guideline by referring to keyloggers. (2)

Keyloggers are used to record every keystroke a user makes on a computer. Public computers have a higher chance of being infected due to the amount of people that use them.

7.4.2 List TWOsafety measures used by banks to ensure the safety of their customers when banking online. (2) One time passwords

SMS when banking accounts are entered Use password/username/account number or combination etc

7.5 Explain how a firewall would protect your computer. (1) Stop unauthorised access to or from a computer network QUESTION 8: SOLUTION DEVELOPMENT 8.1 Explain what each of the following error messages in spreadsheet would indicate and outline the solution to

each:

8.1.1 ########## (2) Column too narrow, widen the column. 8.1.2 #VALUE (2) Incorrect value used in the cell – Correct cell value or cell reference. 8.2 HTMLis a basic language used to create websites

8.2.1 What is the function of the <br/> tag? (1) A break tag adds a single line space/it moves text to the next line 8.2.2 <p><a ref=www.education.gov.za”>Web </a></p>

The coding above will not result in opening the DoE website even if the computer is connected to the Internet. Correct the coding and explain why the coding would not work.. (2)

<p><a href=”http://www.education.gov.za>Web</a></p> Http denotes the location where the website is located. The browser was looking for the website in the

folder in the computer not in the World Wide Web 8.3 Outline how it is possible to have a whole document in portrait with only the last page changed to landscape.(2) Put the cursor on the last page and change layout to landscape applying it to this point forward. 8.4 In a document the author has used the Enter key repeatedly to move headings to the top of each page.

8.4.1 Why is this not a good choice to move the headings in this way? (1)

As a document is created/edited the headings will have to be moved continually (manually) to keep them at the top of a page.

8.4.2 Propose a way to do this correctly. (1)

Make use of page breaks 8.5 The name Müller needs to be added to the report. What feature of a word processor can be used to add the

characters ë and ü? (1) ASCII characters/insert symbols

Page 31: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

31 8.6 What is the difference between using formatting and the ROUND function when rounding a number in a

spreadsheet? (2) Format to no decimal – displays the rounde off number, but retains the value after the decimal point for

calculations. ROUND function – rounds off the number and removes the valule after the decimal point

8.7 What feature of a word processor could be used to find an easier word that means the same as “amalgamated”? Thesaurus/synonyms

QUESTION 9 – INTEGRATED SCENARIO

SCENARIO Your Grade 12 CAT class has been approached to help the municipality make correct decisions when buying new computers. The computers will be networked and connected to the Internet. The committee in charge needs to make informed decisions as they need to keep expenditure as low as possible.

The adverts below have been brought to you for advice on which to buy.

COMPUTER A

Intel Celeron 2.4 GHz CPU

8 GB DDR RAM

500GB HDD

16x DVD RW

17” LCD Monitor

Ubuntu 12.10

USB Optical Mouse

HP 1018 Laser Printer

2 year guarantee

Optional – Data Projector

COMPUTER B

Intel Core i7-2600 3.4

GHz

8GB RAM

I TB HDD

15.6” LED monitor

16x Multi card reader

16x Blu-ray RW

Wi-Fi 802.11 b/g/n

Integrated Webcam HDMI port Windows 8

9.1 The workers would prefer to have a wireless keyboard and mouse for eachcom-

puter.

9.1.1 Mention TWO limitations of a wireless keyboard or mouse. (2) Batteries need so be charged/replaced Can be stolen/removed more easily Sometimes there is interference from other wireless signals Is more expensive

Page 32: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

32 9.1.2 Which TWO hardware components of a computer would have the most influence (2) CPU (Processor) RAM Motherboard 9.1.3 Identify the optical drive in Computer B and mention whether it would be able to read CDs (2) Blu-Ray will read a CD because new technology is backward compatible. 9.1.4 Explain what the abbreviation HDMI in Computer B indicates and mention ONE possible use of it. (2) HDMI is an interface for high definition video and sound for transferring uncompressed video data or

audio data from an HDMI compliant device. 9.1.5 List any TWO input devices that can be used by people with disabilities. (2) Touch screens

Specially designed keyboards 9.1.6 Outline a possible use for a webcam and a data projector for the committee. (2) Webcam to record images that can be transmitted over the Internet 9.1.7 What is the speed of the CPU contained within Computer A? (1)

2.4 GHz 9.2 The organisers want to save money by using free open source software (FOSS) 9.2.1 Identify the open source software mentioned in one of the adverts. (1) Ubuntu 12.10 9.2.2 List TWO disadvantages of using FOSS. (2)

No guarantee of quality or that it works correctly Often only available from the Internet

Not as widely used Documentation and support for open source software may not be easy to access

9.2.3 Suggest TWO advantages of buying an office suite instead of stand-alone applications.

9.2.4 Which type of software can be used for input by visually impaired users? (1) Speed to text/speech recognition 9.2.5 What type of program would open a file saved in a PDF format? (1) PDF reader 9.3 You recommend they use SSDs for any portable computers.

9.3.1 What is the main difference between a traditional HHD and an SSD? (1)

SSD uses flash memory instead of any moving parts. 9.3.2 List any TWO advantages of using an SSD. (2) Much faster

No moving parts Damages less easily Uses less power

9.3.3 It is also possible to safe data in the cloud. Name TWO disadvantages of saving data in the cloud. (2) Must be connected to the Internet

Use Internet data cap/bundle

9.3.4 How many GB will there be in one TB? (1) 1024 9.4 You advise the committee to buy a multi-function laser printer.

Page 33: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

33 9.4.1 Name TWO possible additional functions that can be performed by a multi-functional printer except for the ability

to print. (2) Fax

Scan Photocopier Send documents as e-mail attachments

9.4.2 Name TWO aspects that might impact system compatibility (2) Software

Storage space Storage devices Operating system Cables versus wirelss

9.4.3 The printer’s manual indicates a ppm specification. Explain what the ppm specification of a printer means.(1) ppm – this means how many papers can be printed a minute

9.4.4 Mention TWO ways in which the centre can save on paper. (2) Use print preview function before printing

E-mail instead of printing Print both sides of the paper Multiple pages on one paper

9.4.5 Explain what the term printer spooling means. (1) Printer spooling means that print jobs are placed in a queue to be done as they finish 9.4.6 List TWO actions that can be performed within a printer spooler. (2) Cancel a print job Pause a print job

Alter priority of printing jobs

9.5 Computers will also be connected to the Internet

9.5.1 Mention TWO criteria to consider when choosing the type of Internet connection to be used. (2) Mobility Cap/Data use

Coverage/Availability Speed of connection Cost

9.5.2 List TWO possible advantages of using an ADSL Internet connection instead of 3G. (2) Permanent connection

You make calls and receive calls and use the line for Internet Access at the same time Most ADSL routers have Wi-Fi access 9.5.3 List TWO disadvantages of cloud based applications. (2) Preferably need a fast, reliable Internet connection You no longer have full control of security/control of your data 9.5.4 Except for normal browsing, name TWO examples of Internet services that the committee can use. (2) E-mail services

Real time services VOIP Video conferencing Cloud computing 9.5.5 Name any TWO government Internet-based services that the community members can access (2)

Renewal of TV licenses Election information Unemployment Insurance Fund

Educational publications Tax returns

Page 34: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

34 9.5.6 Explain what a zombie is in the context of a possible computer-related risk. (2) Computer zombie – is a computer that has been taken over by a criminal and is controlled from a

different location 9.5.7 List TWO advantages of using web-based applications such as Google Docs. (2) Can use the software in any computer as long as you are connected to the Internet

Software is always up to date No need to download or install application

PAPER 4 QUESTION 1 – MATCHING ITEMS

COLUMN A COLUMN B Answer

1.1 Software used to convert scanned documents to a format where the text can be edited

A service pack O

1.2 A computer that provides resources and/or services to other computers on a network

B RSS F

1.3 A high performance electronic storage device, often used to replace traditional hard drives

C AUP K

1.4 A spreadsheet function that specifies the accuracy of a calculation in terms of the number of decimals used

D ROUND D

1.5 An object in a database that can be used to perform searches based on specified criteria

E plug-in L

1.6 Manupilation of data into meaningful infomation F Server Q/L

1.7 A field of study aiimed at reducig the effects of RSI for the user G Byte P

1.8 A unit used for measuring thestorage capacity of a device H PDF G

1.9 The technology used to receive automatic updates fromwebsites

without having to visit each website separately I mode B

1.10 A small piece of software that adds specific functionnality to software,

such as a web browser. J client E

K SSD

L Query

M GHz

N report

O OCR

P Ergonomics

Q Processing

R Output

S IF

Page 35: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

35

QUESTION 2: MULTIPLE CHOICE Various options are given as possible answers to the following questions. Choose the answer and write only the letter next to the question number. 2.1 Which ONE of the following is a spreadsheet function that is used to find the total for cell values in a range

only if a specific condition is met. (1) A IF B COUNTIF C SUMIF D SUM 2.2 Which ONE of the following printers works by constructing objects forom materialssuch as plastics(1) A Dot matrix printer B 3D printer C Inkjet printer D Colour laser printer 2.3 Which ONE of the following is an example of an e-commerce website? (1) A www.google.co.za B www.kalahari.com C www.news24.co.za D www.gmail.com 2.4 Which ONE of the following refers to cellular technology used for data transfer? (1) A WiMAX B Bluetooth C WiFi D LTE

2.5 Which ONE of the following devices is the best example of convergence? (1) A Smartphone B USB modem C MP3 player D Webcam 2.6 Which ONE of the following refers to a situation where a web user is tricked into selecting a hidden link?

(1) A Double clicking B Keylogging C Click-jacking D Hyperlinking 2.7 Which ONE of the following refers to a concept where employees can connect their own devices to the com-

pany network and do their official work on these devices? (1) A RSI B DoS C BIOS D BYOD 2.8 Which file format is used to save text without containing any formatting such as colours and font sizes?

(1) A PDF B RTF C TXT D HTML 2.9 Which ONE of the following refers to a technology where the processing power of multiple networked

computers is combined to perform a specific task? (1) A Grid computing B Green computing C File sharing D Mobile computing

Page 36: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

36 2.10 Which ONE of the following is the changing of an e-mail header so that it appears as if the e-mail was

sent from an address other than the one from which it was actually sent? (1) A Bcc B Cracking C Spoofing D Hacking QUESTION 3: TRUE/FALSE ITEMS Indicate whether the following statements are TRUE or FALSE. Choose the answer and write “T” or “F”. Change the underlined word(s) to make the statements TRUE. 3.1 A document with a PDF file extension can be used to prevent users from changing its contents.True or False,drmz

(1)

3.2 A blog is a website that allows users to work together on changing its content using a web browser.False, wiki/wikipedia (1)

3.3 An audio file, such as news programme or an interview that can be downloaded from the Internet, is called a patch.

False, podcast/MP3 (1)

3.4 A QR-code is used to visually represent text such as a URL.True (1) 3.5 A query can be used in a spreadsheet to extract specific information from a large set of data. False,database (1) SECTION B QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 Most modern web browsers have a feature called tabbed web browsing. State TWO advantages of tabbed web browsing. (2) More than one website/pages can be opened/closed in a single window

Ease of navigation between open websites/page, greater browsing efficiency Allows for normal as well as private browsing in the same window Taskbar is less cluttered Allows multiple home pages that all open automatically Organise tabs in a group to save as a favourite Less resource-intensive than running a separate instances/copies for each page of the same browser.

4.2 Give TWO reasons why biometric input can be more secure than using traditional measures such as passwords.

(2) A person’s physical characteristics are unique

The person concerned has to be present for the input Physical characteristics cannot be easily falsified Passwords are often left around/guessed/hacked (DO NOT REFER TO COST)

4.3 Buying a computer can sometimes be very difficult because there are so many hardware options to

consider

4.3.1 Name TWO of the main components on a computer that have a significant effect on the overall processing performance of the system. (2)

RAM/memory CPU CPU related e.g. heat sink, cache

GPU/graphics card Hard drive/SSD

(DO NOT REFER TO ONLY STORAGE) 4.3.2 Explain what a trackpad/touchpad is and state ONE disadvantage of using a trackpad/touch pad instead of a

normal mouse. (2) Touchpad/trackpad is a touch sensitive area where the user can move the pointer on the screen by

touching the touchpad/trackpad surface instead of using a mouse.

Page 37: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

37 AND Usually built into devices such as a laptop/cannot be removed

Less intuitive to use/Takes more time to position cursor accurately Operations where multiple clicks are involved may be more difficult Drag and drop operations could be more difficult Can accidentally be touched thereby moving the cursor to an unintended place on the screen Cannot be used for gaming/Less responsive

Sweaty dirty and moist fingers/Wearing gloves/Anything that causes a barrier can disrupt pointer 4.3.3 LED monitors have replaced CRT monitors State TWO advantages of LED monitors. (2)

High contrast ratios Low power consumption/Generates less heat Occupies less physical space/Slimmer High resolution/Good image quality/Less eye-strain/Less glare Less radiation/health hazards Available in larger sizes

Additional ports (Reference to green computing must be motivated)

4.3.4 State ONE possible disadvantage of having a built-in monitor on a computer such as a notebook computer.

(1) Impossible/Difficult to upgrade

Costly to repair Whole machine needs to go in if repair is needed.

4.4 A business has to decide which printer they should purchase to print pamphlets in large volumes

4.4.1 Recommend a type of printer for their needs AND give a reason to support your recommendation. (2) Laser printer/(Networked) office copier

AND High speed Cost effective on hight volume prints (black and white)

4.4.2 Name TWO new technologies or additional features that appear in modern printers. (2) Connectivity via network/wireless e.g. Wi-Fi and Bluetooth

Integrated software features e,g, remote printing 3D printing Memory card reader/Direct printing from flash drive Erasable toner/Unprinting Touch screen/pad interface (ACCEPT ONLY ONE REFERENCE TO MULTIFUNCTION CAN FAX/COPY/SCAN/COLLATING/BINDING)

4.5 The opening of programs on a computer sometimes becomes slower over a period of time.

4.5.1 A support technician suggests that the hard drive might be fragmented. He recommends defragmenting the hard drive.

Briefly describe what occurs during the defragmentation process. (2) Scattered parts of files Re-organised into adjacent/contiguous area/together

4.5.2 Identify TWO other software-related problems that could reduce the speed of a computer, besides fragmentation.

Write down a potential solution for EACH of the problems you identify (it could be done in the form of a table). (4)

PROBLEM: Malware/virus infection: SOLUTION: remove with anti-virus program/removal tool

AND/OR PROBLEM: Too many programs open at the same time for the amount of RAM available/memory full/programs running in the background SOLUTION: Close unused programs/Find an close any unnecessary programs running in the background

AND/OR PROBLEM: Software updates being automatically downloaded SOLUTION: Switch off automatic updates

Page 38: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

38

AND/OR PROBLEM: Defective application bug SOLUTION: Update/Replace defective applications AND/OR

PROBLEM: Too many unnecessary files/temporary files on the hard drive SOLUTION: Use Disk Cleanup/Remove unnecessary files or programs

(DO NOT REFER TO DEFRAGMENTATION OR UPGADE ISSUES)

4.6 Explain what a zombie is in ICT context. (2) Computer on a network that has been compromised/taken over/hacked to perform malicious tasks

4.7 What is the function of a firewall (2)

Software/hardware that prevents unauthorised access to or from a computer over a network/Internet.

Printed up to here

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Why would the Internet be classified as a WAN? (1)

The Internet is a global connection of networks/It is not linked in a small area/It spans over a wide, global area.

5.2 State TWO advantages of using a network. (2) Sharing software, e.g. local services, files, centralisation/sharing of data/centralised backup. 5.3 Compare the functionality of a switch and a router in a network. (2) Switch is a device used to connect computers/regulate data flow between computers on a network. A Router is used to connect to external networks e.g. Internet 5.4 State an advantage of using fibre-optic cables instead of copper wires as a communication medium. (1)

Fibre-optic cables allow for: Higher data transmission speed compared to copper wires Lower attenuation/less interference Less susceptible to lightning strikes. Less likely to be stolen 5.5 A number of hardware issues, such as the type of equipment, affect the performance and stability of a Wi-Fi signal State THREE factors, besides hardware issues, that can have an influence on a Wi-Fi signal. (3) Physical obstacles/walls Closeness/Proximity/Distance to the access point/router Electrical/Magnetic interference/Signal overlapping Network load/Too many computers on the network/Contention ratio Weather conditions

Poor quality/Low speed connection devices used Availability of electricity

5.6 Give an example of what NFC (near field communication) can be used for. (1)

Sharing/Transferring files Identity verification/Authentication purposes Location-based profile automation Can be used in payment systems Switch devices on or off, etc

5.7 Explain the functionality of a hyperlink. (1) Directs the browser/application to a webpage/document/resource

Provides a connection/link/shortcut to another web page/document/file Provides a link to another place/bookmark in the same document

5.8 Name ONE type of connection to the Internet, besides a landline. (1) Satellite

Cellular/3G/LTE/GPRS/HSDPA/EDGE/4G Wireless/Wi-Fi/wiMax/iBurst/Radio technology

Page 39: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

39 5.9 More and more people choose to use online, web-based e-mail service. (1) 5.9.1 Give ONE example of a popular web-based e-mail service. (1) Mail.yahoo/yahoomail

G-mail Hotmail Ymail Webmail iCloud Mweb Atlantic iAfrica

5.9.2 State ONE possible advantage of using a web-based e-mail system compared to using a local e-mail system

compared to using a local e-mail system such as Microsoft Outlook. (1) E-mail can be accessed at any location with Internet access

E-mails are not lost in case of computer crash No need to upgrade software/no need to purchase or install software May have better e-mail management options e.g. with regard to spam and phishing reporting Tighter integration with other web-services, e.g. Google Drive for attachments

5.9.3 Which e-mail field will be used to hide the address of a recipient who gets a copy of the same e-mail. (1) Bcc

QUESTION 6: INFORMATION MANAGEMENT 6.1 Name TWO possible types of sources used to collect personal opinions without the use of the Internet when doing

research. (2) Questionnaires Surveys Interviews Voting

6.2 State TWO advantages of using questions that have a fixed set of possible answers (closed questions) when using

an electronic form. (2) Quicker/Easier to complete by respondents/Less susceptible to misinterpretation

Less chance of data capture errors Easier to perform data validation Easier to store/process/analyse information/Limits possible responses/Less susceptible to misinterpretation.

6.3 State TWO ways in which to check the reliability or accuracy of information from an Internet source. (2) Check credentials/affiliation of the author/organisation running the website.

Establish how recent/current the information is/Check when it was last updated Cross-reference with other sources Check objectivity/bias with other sources Look at the general presentation, e.g. spelling errors Frequency which the source has been cited.

6.4 The graph/chart below represents a comparison of the average temperatures per month from January(Jan)

to December (Dec).

Jan

Feb

Mar

Apr

May

Jun

Jul

Aug

Sep

Page 40: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

40 6.4.1 Name a more suitable type of graph/chart to represent this information. (1)

Bar graph Column graph/Histogram Line graph Scatter graph Area graph

6.4.2 Recommend THREE improvements to the above graph/chart other than changing the type of graph. (3) Add a suitable chart title/heading Make use of data labels/values/percentages Add meaningful/descriptive axis titles/lables Use of colour/shading (NOT KEY/LEGEND)

QUESTION 7: SOCIAL IMPLICATIONS

7.1 Green computing is becoming an increasingly important issue in ICT. 7.1.1 State ONE way in which one can responsibly dispose of an old laptop battery? (1) Send the battery for recycling/e-waste collection

Take it back to the manufacturer/reseller Trade in for a new one

7.1.2 State TWO ways in which computer technology can be used to protect the environment. (2) Paperless office helps reverse forest deforestation

Tracking endangered species Power management More efficient use of scarce resources Monitoring issues such as climate change/pollution/carbon emmission

7.1.3 Give ONE example of the use of computer technology that has a negative effect on the environment, other than the disposal of batteries. (1) E-waste pollution such as dumping old computer equipment

Energy wastage such as not shutting down workstations when not in use/not using energy saving equipment

Wasting paper 7.2 Give the the term for the practice when somebody, for example, opens a Facebook account using another person’s

details. (1) Identity theft/Fraud/Impersonation

7.3 Phishing is a world-wide problem:

7.3.1 State TWO ways of identifying a possible phishing attack. (2) The e-mail address is suspicious, e.g. such as absagmail.com or [email protected]/not from your bank. The e-mail writer wants you to follow a link, but does not address you by your surname Inconsistancies e.g. spelling, grammar, incorrect language used, formatting, images instead of text Requested to give out/verify confidential information Hover the cursor over the hyperlink to see if it points to the expected website

7.3.2 Suggest TWO possible ways in which to prevent or combat phishing on receipt of such an e-mail. (2) Close/Delete the e-mail Do not follow any links in an e-mail as a general rule/Do not give out personal information Report the e-mail phishing Blacklist/Block the particular e-mail address Call/contact company to verify

7.4 Give ONE example of how downloading copyrighted material without permission could affect the owners or creators of the material. (2) Loss of income/revenue Job losses/Collapse in the relevant industry Poor quality products might damage the owner’s reputation

Page 41: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

41 QUESTION 8: SOLUTION DEVELOPMENT 8.1 You have studied web page development in your CAT course. 8.1.1 What is the name of the language that uses tags and attributes to create web pages? (1) HTML (XTML,XHTL,HTM) 8.1.2 What is the difference in function between the <ul> and <ol> tags used in the code for a web page? (2) <u> displays bulleted list

<ol> displays a numbered list 8.1.3 Give TWO possible reasons why an image you added on an HTML web page does ont display when viewed in a

web browser. (2) Image is not in the specified folder

Image extension is different from HTML cod Spelling/typing error Web browser cannot display the image type/format Incorrect tags used Image reference not presented/correct

8.2 Business regularly use databases 8.2.1 The names of various schools are listed in a field in a database table

Which criteria would you enter in a query to extract the names of all the schools that have the word ‘business’ anywhere in their name? (2)

“*business*” Use an asterix on both sides of the word business

8.2.2 State TWO advantages or/reasons for using codes instead of the ‘full text’ in a database, for example 0847 instead of the text ‘Business Studies’ (2) Easier for the data capture/Shorter to type Fewer mistakes when entering data Easier to use in queries

Use less storage space E

8.3 Spreadsheets are commonly used to analyse data 8.3.1 Name a feature of a spreadsheet program that can be used to automatically highlight cells if they contain specific

values. (Conditional formatting

8.3.2 The function below was used in a spreadsheet to count the number of cells in the range A1:A10 that contain values of 50 or higher: =COUNTIF(A1:A10,<50) Give TWO reasons why this function will NOT work correctly (2) Incorrect relational operator, e.g. (>50) Including the value 50, e.g. (>=50) OR (>49) Criteria must appear in quotes/Inverted commas (“>=50”

8.3.3 Which feature within a spreadsheet program can be used to display words underneath one other within the same cell? (1) Text wrapping (alt+enter)

8.4 State TWO advantages of using the ‘Track Changes’ feature of a word processing program. (2) Allows/Facilitates editing of one document by multiple users Allows for original data/changes to be reviewed/viewed before committed/Changes can be accepted or rejected It is possible to see which changes were made by which users

Page 42: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

42

QUESTION 9: INTEGRATED SCENARIO

SCENARIO Your school recently started a photography club. As the technical assistant you will be helping club members with any computer-related problems. Members are encouraged to bring along any device capable of taking photographs, such as digital cameras, smartphones and tablets

9.1 Your school principal would like to invest in a digital camera 9.1.1 Name any TWO camera specifications that will have an impact on the quality of a photograph (2) Quality of the lens

Quality/size/type of sensor, e.g. CMOS performs better in low light than CCD, colour depth On-board software/Software filters ISO rating Digital vs. optical zoom Image stabilisation Image processor Megapixel value/Resolution Shutter speed Flash

9.1.2 The software on the digital camera has a bug How would you fix a software bug without replacing the device or taking it back to the shop? (1)

Update the software/firmware/operating system/drivers download a patch Reset to factory default/Reinstall the original software

9.1.3 Study the specifications below and answer the questions that follow:

20 MP

4” LED touch screen

26x optical zoom

Micro HDMI and USB port

4 GB SD card included

(a) The specifications indicate an HDMI port

Name ONE output device that would be typically connected to the HDMI port of the camera. (1) HDTV/Smart TV Computer monitor Projector

(b) What is the size of the camera’s display (screen)? (1) 4” (4 inches)

9.2 The most common way to transfer photographs from a digital camera to a computer 9.2.1 When connecting the camera to a USB port on the computer, you notice that a driver is being

automatically installed. (1) What is the function of a device driver?

A device driver allows for communication between the device/camera and the computer operating system The device driver allows the operating system/computer to control the device/camera It allows the computer to ‘see’/use/recognise the device/camera

9.2.2 The device driver was installed without inserting a storage medium such as a CD. (1)

From which location could the device driver have been installed? As part of the operating system already stored on the computer Stored on-board/on camera (Automatically) downloaded from the Internet

Page 43: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

43 9.2.3 Name TWO other ways, besides using a USB cable, in which photographs can be transferred from a digital

camera to a computer. (2) Memory card reader

Bluetooth 3G/Wi-Fi (such as Eye-Fi)/E-mail Automatically uploads/synchronises to cloud storage such as Dropbox

Firewire

9.3 The secretary has been trying to send a picture as an e-mail attachment to the local newspaper. The e-mail was rejected as the attachment exceeded the maximum size limit of 15 MB. (2) Name 2 possible ways in which to reduce the size of the picture. Lower the resolution/DPI value of the photograph Change to monochrome/grayscale Crops parts of photo not needed Compression/Change file format Reduce the photograph dimensions

9.4 One of the members received a laptop with a built-in webcam. Name TWO functions of a webcam if it is used with the Internet. (2) Video chat/conference/call e.g. Skype Vodcast/vlog (A vodcast is a video podcast, a video broadcast over the internet) Profile pictures Security feature to show the user remotely over the Internet what the webcam is seeing

9.5 A major concern for the members of the photography club is losing the photographs they have downloaded onto their computers.

You recommend that they have an effective backup policy to prevent the loss of data if their computers are damaged or stolen. (2)

9.5.1 Name TWO practical guidelines or strategies they can include in their backup policy. Make regular backups Keep backups off-site Rotate storage media used for backup (use more than one DVD) Use more than one storage medium (use DVD, external hard drive in combination, cloud storage) Checking that backups are viable/can be used to restore data Incremental backup/only backup new or changed files Use a clear file structure/labels/meaningful names Automate the backup structure Exclude certain file types

9.5.2 The school principal stated that he uses cloud storage to store the photographs he takes with his smartphone. (2)

(a) State TWO possible disadvantages of using cloud storage for this purpose Access to the cloud depends on the availability/quality Limited free storage available Uses up data bundle which can be expensive on smartphones Can’t be sure that his photographs will be kept private/safe Continued viability of cloud storage provider

(b) The school principal made sure that the synchronisation (‘synching’) option on his smartphone has been enabled. (1) What advantage does ‘synchronisation’ (‘synching’) offer in this context.

New photographs taken with his smartphone will automatically be uploaded to the cloud New photographs are synchronised to all devices connected to the server

9.6 One of the members has a camera with the option of saving GPS information to a photograph.

9.6.1 How does GPS work? (2) GPS uses satellites/cellular towers to find the geographical location of the GPS device

9.6.2 Discuss ONE reason for adding GPS information to a photograph. (1) Find the location of where a photo was taken e.g. the geographical location e.g. geotagging

Import the GPS coordinates to a computer to record the locations where the photos were taken e.g. Google Maps

Page 44: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

44 9.7 State TWO advantages of using touch screens on mobile devices such as a digital camera or smartphone.(2) More space for a larger screen due to fewer physical buttons

On-screen menus and buttons can be customised/different layouts Gestures e.g. swiping More intuitive use/Easier to work with

9.8 The club needs broadband Internet access

9.8.1 Explain what the term broadband means. (1) High-speed/High bandwidth (permanent) Internet connection

9.8.2 Name THREE technical criteria or issues, besides the cost, that should be considered when choosing the type ot

broadband Internet connection. (3) Coverage/signal strength

Need for mobility or not Additional services offered, e.g. web hosting, technical support Speed Cap/Uncapped/Amount of data Shaped and unshaped Fair usage policy

(Do not list cost or other non-technical issues. Size not acceptable)

9.8.3 Access to the Internet means that the club members can use VoIP technology such as Skype. (1) What is the main advantage of using VoIP to make calls instead of normal telephone calls

Cheaper calls Call costs the same, irrespective of distance Can make calls to multiple platforms such as smartphone to a laptop/computer/tablet/Skype device.

9.9 The club members will need Internet access on all the computers. This means a network will have to be installed

9.9.1 State TWO advantages of installing a wireless LAN (WLAN) instead of a cabled LAN.

Wireless connections can be used in some cases where cables cannot reach or be used Portable devices can be moved around and stay connected/Mobility Less clutter of cables Easier to add/connect additional equipment/nodes, etc

9.9.2 What would the function of a NIC (network interface card) be on a network. To connect the computers to the network/The physical connection between the computing device and the communications medium/allows communication between the networking device and the network

9.10 The club would like to upload their photographs to social networking websites on the Internet for their parents to see. (4)

9.10.1 State TWO advantages of posting the photographs on a social network website. (2) No need to distribute manually to all interested parties Parties can be notified automatically of new uploads. The photographs might be available to the general public/Can be accessed from anywhere Photos can be grouped into electronic albums Use as an alternative backup method Showcasing/Attracting comments

9.10.2 State TWO ethical guidelines for the club members to consider when posting pictures on the Internet. (2) Respect privace of individuals before posting/Sensitive aspects of photographs could lead to embarrasment

Photos should not be offensive Permission must be sought before posting e.g. for under-age subjects

9.11 The photography club wishes to buy a new computer which will be used for photo editing. Consider the specifications of a possible new computer as shown below

Core i5 2.4 GHz

4 GB RAM

1 TB HDD

2 GB dedicated graphics card

Bluetooth keyboard and mouse

Windows 8 Pro

Page 45: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

45 9.11.1 Which essential output device does NOT appear in the specifications above? (1) Monitor/Screen/Display 9.11.2 State TWO advantages of installing or adding a memory card reader to the computer. (2)

No need for using/carrying along cables to connect a camera No need to install drivers to access each camera. Can read a variety of media types Memory cards can be used to store data other than photographs like a flash drive

9.11.3 The specifications include a Bluetooth keyboard and mouse. State TWO potential disadvantages of using Bluetooth devices. (2) Batteries are needed that can go flat Signal interference Devices are more expensive Devices are easier to track/steal

9.11.4 4 GB RAM is specified What is the main function of RAM in a computer. (1) Temporary storage of data and instructions

9.11.5 Why would increasing the amount of RAM increase the performance of a computer? (1) More programs/data can be loaded Less need for reading/writing to or from the slower hard drive Less need for virtual memory

9.12 The club members need software to edit their photographs. They want to use free and open-source software (FOSS) What is the main advantage of using FOSS in this situation, besides the fact that it is free? (1)

It can be altered/changes can be made Source code is available to be edited Improvements/can be changed to suit your needs/updates are shared with others Can be installed on multiple computers without legal action

9.13 State TWO ways in which the photography club can practise green computing in terms of EACH of the following issues:

9.13.1 Paper usage (2) Print preview/prevent documents being printed which are obviously not correct/needed

Use both sides of the paper/Buy a printer which can print on both sides of the paper Send documents electronically Use recycled paper Print two/multiple pages to a sheet

9.13.2 Electricity consumption (2) Switch off equipment you are not using

Use power schemes/settings of the computer Make use of energy efficient equipment

9.14 The club will use a database to keep track of member details. Name THREE database field properties that can be used to ensure that valid and accurate data is entered into the

database (3) Input maskes Required fields Default values Validation rule Using specific data formats Field sizes Lookup Wizard Primary key

Page 46: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

46

PAPER 5 SECTION A QUESTION 1

Write down only the number of the description from Column A, and next to it the correct matching capital letter from Column B.

NO. COLUMN A COLUMN B ANSWER

1.1 An application that can filter, sort and group data A Convergence I

1.2 An online service or technology that makes it possible for people who share similar interests to communicate with each other re-gardless of distance or time

B Fingerprint reader E

1.3 A website that allows people to add and edit content together with others

C Mail merge G

1.4 The trend where a variety technologies is integrated into one sin-gle device

D Pharming A

1.5 A word processing function that allows a user to automatically produce multiple personalised documents from a single template and data source

E Social networks C

.6 The practice of rerouting users to bogus or unexpected websites when they enter a URL in their web browser

F Grid computing D

1.7 Markers used to indicate elements and formatting on a web page G Wiki H

K Bandwidth

L Blog

M Adware

N Functions

O Word processor

(7)

QUESTION 2

QUESTION 2 – MULTIPLE-CHOICE QUESTIONS (10) Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A-D) next to the question number. 2.1 Programs designed for use on smartphones and table computer are commonly known as: A scripts B drivers

C file managers D apps

2.2 When files are stored in “the cloud”, they are stored on a .... A remote server

B portable device C Blue-ray disk D USB flash

Page 47: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

47 2.3 The word ‘asymmetric’ in the abbreviation ADSL refers to the ...... A digital divide with regards to Internet access B line shaping due to excessive use C difference in download and upload speeds D cap (limit) being enforced 2.4 Files with the extension wav, aac and ogg can be converted to a file type with the file extension A text.

B mp3. C docx. D dll. 2.5 Which one of the following utilities is an example of accessibility software? A Task Manager B WordPad C Magnifier D System Restore

2.6 Tricking a user into revealing confidential information, such as a password, is known as ...... A social engineering B crowdsourcing C data manipulation D pharming

2.7 Once all the responses to a survey have been collected and collated, the data is ready to be .... A presented B analysed C backed up D e-mailed

2.8 If you want to copy and paste only the result of a formula in a spreadsheet and not the formula itself the

paste option you should select is ........ A paste a link

B paste formatting C paste values D transpose

2.9 To enable them to keep track of information on several thousand employees, a large organisation is likely to make use of a .....

A wiki B spreadsheet C database D content aggregate

2.10 Using multiple computer systems as though they were one computer is known as ........

A grid computing B cloud computing C virtual computing D scientific computing

QUESTION 3

Indicate whether the following statements are TRUE or FALSE. Choose the answer and write ‘true’ or ‘false’ next

to the question number. Change the underlined word(s) to make the statements if it is FALSE. Change the underlined word(a) to make the statements TRUE. You may not simply use the word ‘NOT’ to change the statement). (8)

EXAMPLE:

QUESTION ANSWER

Computer program instructions are executed by the CPU True

Page 48: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

48

Deframentation is characterised by unequal access to ICT by unequal access to ICT by different groups of people.

False The Digital divide is characterised by unequal access to ICT by different groups of people.

3.1 A PSU is a device used to provide power to all the separate components within a computer. TRUE

3.2 Public hotspots allow users to connect to the Internet using 3G. FALSE

Public hotspots allow users to connect to the Internet using Wi-Fi

3.3 A query in a database application is created in order to give a user an easy way to enter a record into a table. FALSE

A form in a database application is created in order to give a user an easy way to enter records in a tabl

3.4 System requirements describe which hardware and software is needed for software to be installed and run. TRUE

3.5 The ‘Print Screen’ key on the keyboard takes a screenshot and sends it directly to the printer. FALSE

The “Print Screen” key on the keyboard takes a screenshot and sends it directly to the clipboard

QUESTION 4: SYSTEM TECHNOLOGIES

4.1 The specifations below appears in an advertisement for a notebook computer.

Study the specifications and answer the questions below that follow:

Operating System – Windows 8

Processor – Intel 1000M Cerelon 1.8 GHz Display – 15.6” (1366x768), 16:9

Video Graphics – Integrated Intel HD Graphics 4000 Memory – 4 GB DDR3, 1 600 MHz memory

Hard Disk – 160 GB, 5400 rpm Optical Drive – Integrated DVD reader

Sound – Integrated stereo speakers (2 x 1.5 W) Integrated Communications – 802.11n Wi-Fi, 10/100M LAN

Camera – 8 MP webcam 1 x HDMI

1 x 12-in-1 card reader

4.1 What is the major difference between USB 2.0 and USB 3.0 with regards to data transfer? (1) USB 3.0 has a faster data transmission rate than USB 2.0. 4.2 Some of the specifications above refer to being “integrated”.

4.2.1 Briefly explain what is meant by the term integrated. (1) The term integrated refers to when certain hardware or features are incorporated/built into another

device. 4.2.2 State TWO possible disadvantages of having an integrated device such as a video adapter. (2) Very difficult (in some cases impossible) to replace

If the video adapter stops working, you will need to replace the whole motherboard or buy a new, separate graphics adapter. In the case of a notebook this is impossible The video adapter shares RAM with other hardware

4.3 Would the computer described above be suitable for a power user such as a video-editing profession? Motivate your answer by giving TWO reasons to support your answer. (3) NO Limited storage space on the hard drive

CPU is a Cerelon which would not suffice for a power user Integrated graphics cannot handle high-end video editing or manipulation

(Do not accept a simple ‘NO’ as an answer).

Page 49: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

49

4.4 Which port on the notebook computer allows the computer to be connected to a modern television set? (1) HDMI 4.5 Give TWO reasons why a notebook computer would be more suitable than a desktop computer for learners in a

school. (2) Portability/Can be easily taken to any classroom Occupies les space

Standard notebooks have more Internet connectivity options. Can work on battery power 4.6 SSD is a recent addition to technology. 4.6.1 What is a SSD used for? (1) An SSD is used to store data.

4.6. State TWO benefits of an SSD when used in mobile devices. (2) Faster than a conventional hard drive

More robust More energy efficient Weighs less

4.7 In order to use the Internet effectively for services such as video streaming and transferring large amounts

of data, access to a broadband Internet connection is needed. 4.7.1 Which specification in the advertisement would allow for broadband connectivity? Motivate your answer.(2)

802.11n Wi-Fi as the computer can be connected wirelessly to a network which in turn may provide a broadband Internet connection

4.7.2 Give TWO reasons why some users might prefer a wireless broadband connection instead of a wired connection.(2)

Devices can be moved easier and still retain their Internet connectivity Less clutter/no cables A broadband Internet connection can be made in locations where wired broadband infrastructure is not available, such as rural areas.

4.8 Software is essential to the normal fuctioning of a computer. 4.8.1 Name the operating system that is packaged with the computer in the advertisement. (1)

Windows 8 4.8.2 State TWO functions of an operating system. (2) Provides a user interface

Coordinates activities between hardware and software Manages hardware and software resources

Provides basic security Provides file management facilities Provides a platform from where programs can be run

4.8.3 Which category of software would users need over and above the operating system in order to use the computer for daily tasks? (1)

Application software/Office suite 4.9 Any software will generally have minimum software and hardware requirements. Give TWO reasons why it would be better to invest in hardware that exceeds (is better than) these minimum

requirements. (2) To ensure that the software performs optimally

In effect a user will be able to use the hardware for a longer period, as it will be compatible with newer software for a longer period

4.10 Explain what disk fragmentation is by also explaining how this could slow down your computer. (2)

Disk fragmentation refers to parts of a file being scattered into non-consequential/contiguous/adjacent sections of a disk. It slows down a computer as all the parts must first be gathered, slowing down disk access in the process.

Page 50: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

50

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

To the average computer user a device could be considered useless if it were not connected to a network. 5.1 Give the generic name (abbreviation/acronym) for the type of network that spans a large geographical area. (1)

WAN (Wide Area Network) GAN (Global Area Network)

MAN (Metropolitan Area Network) VPN (Virtual Private Network)

5.2 Briefly discuss the function of each of the following devices within a network:

5.2.1 NIC (1)

An NIC is the physical connection between a computing device such as a computer and the communications medium, such as a cable.

5.2.2 Switch (1) A switch is a network device where all of the connections from computers and devices are connected. 5.3 Bluetooth is activated on two devices, but no data can be transferred between them. Suggest a solution to this problem. (1) Pair your devices

Bring your devices within range You may have to give permission for a file transfer to occur Make sure you are trying to connect to the device you think you are connecting to, e.g. another device in

range may have the same name. 5.4 Wi-Fi metworks are targets for hackers. Suggest ONE effective way of protecting a Wi-Fi network. (1) Use an encryption e.g. WPA2

Add a strong access password 5.5 Name a function or feature of a web browser that would allow a user to return to a specific website even if the

browsing history has been deleted. (1) Use a bookmark/favourite NOT

Writing down/memorising Using a web search Starting to type a part of the URL in the address bar without having created a bookmark first

5.6 Explain how software developers generate a profit from adware, even though it is distributed for free. (1) Advertisers pay the developer to show their advertisements within the app/program using banners or pop-

ups 5.7 State TWO advantages of podcasts over real-time streaming broadcasts. (2) Listen at a time suitable to you

Better quality sound Save on data (using less expensive Wi-Fi connection for downloads)

Avoid streaming issues, e.g. buffering Podcasts can easily be distributed

5.8 Browsers use a technology called web caching. 5.8.1 What is web caching? (2) Web caching is a process where web pages previously accessed are stored on the hard drive.

5.8.2 State TWO possible advantages of using web caching. (2) It improves browsing speed as pages can be loaded from the hard drive instead of being downloaded

from the Internet Less data is consumed during the browsing process, as cached websites are not downloaded from the Internet

Page 51: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

51 5.9 Describe TWO ways in which available bandwidth plays a role when watching videos online from services like

YouTube. (2) More bandwidth – better quality video

More bandwidth – smooth playback Lower bandwidth can make watching videos online impossible More bandwidth – one can get ‘capped’ quicker as higher bandwidth allows users to stream in higher quality, which uses more data.

QUESTION 6: INFORMATION MANAGEMENT

We are exposed to so much information these days that we have to develop skills to ensure that we can analyse, process and report accurate information that is relevant to our needs. 6.1 What is the difference between data and information? (2) Data refers to raw facts that are not useful on their own

Information is data that has meaning/been processed 6.2 Questionnaires are an effective way of sourcing data from a group of people.

6.2.1 State TWO benefits of using closed questions in a questionnaire. (2) Quicker for users to answer

Greater likelihood of respondent answering questions One can avoid problems of interpreting the handwriting of the respondents They provide a finite/fixed range of answers

Easier to validate/capture/analyse responses 6.2.2 Which application software would be best suited to handling information from a questionnaire? Motivate your

answer. (2) Spreadsheet Results from a questionnaire can be easily analysed using a spreadsheet

6.3 Give TWO examples where you would use a database instead of a spreadsheet to process data. (2) When there is a need to relate or link data

Easier to perform queries to find specific informatio To produce reports When graphical representation of results is not required To provide an easier format for users to enter data using a form Multiple users can edit the database at the same time Data bases have the capacity to store more data than a spreadsheet When the bulk of the information entered is not numerical

6.4 Briefly explain the concept of plagiarism. (2) The use of another author’s expression of thoughts and ideas and passing them off as one’s own without

permission.

QUESTION 7: SOCIAL IMPLICATIONS

You believe that the responsible and educated use of technology promotes personal freedom and a healthy environment for economic growth. 7.1 Give ONE example of a common Internet scam. (1) E-mail lottery scam (e.g. you are a lucky winner…….) Phishing scams asking for Internet banking logon particulars Advance fee fraud (the victim is asked to transfer money upfront A 419 scam (paying money upfront to be able to receive a large amount of money) 7.2 State ONE typical way in which your computer may be misused by cybercriminals if they use your computer as part of their

botnet (zombie army). (1) Spamming

Distributed Denial-of-Service attacks Brute-force dictionary attacks on servers

Unauthorised banner display Click jacking (the malicious practice of manipulating a website user's activity by concealing hyperlinks beneath legitimate clickable content,)

Page 52: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

52 7.3 State ONE way in which RSI can be prevented. (1)

Use ergonomic input devices Type using a natural wrist position Sit up straight Take regular breaks

7.4 Describe TWO potential negative effects that the use of social networks can have on people. (2) You may start thinking that casual acquintances on social networking sites are your real friends

Dangers of cyber-stalking/cyber-bullying Danger of online predators/paedophiles Someone you do not know may monitor your online presence and seek to benefit from it to your disadvantage Social networks are very addictive

7.5 Passwords are important for protecting users when accessing websites. 7.5.1 State TWO strategies or techniques you can use to create or manage strong passwords. (2) Keep your password length as long as possible Make sure passwords do not contain recognisable words

Never use the same password for more than one domain/service Your password should contain a mix of uppercase and lowercase letters, numbers and special characters Encrypt your passwords Make use of password management systems/software e.g. KeePass, LastPass etc.

7.6 Name ONE legally acceptable use of file-sharing application, such as BitTorrent. (1) May be used for legal downloads, e.g. open-source software

May be used to distribute documents or other files on which no copyright is applicable

7.7 Give your opinion regarding the following statement by giving TWO reasons or examples to support your answer.

7.7.1 ‘The Internet offers its users some privacy’. (2) Answers relating to a lack of privacy

Cookies Facial recognition Logging of IP addresses Targeted advertising Data surveillance

AND/OR Answers relating to protecting one’s privacy The use of proxy servers Cleaning browsing history Encryption The use of a VPN Browser options such as ‘Incognito’ mode and Do Not Track (DNT)

QUESTION 8: SOLUTION DEVELOPMENT

8.1 You have discovered that HTML can be a stepping stone on your way to becoming a real programmer

8.1.1 Rewrite the HTML code segment below and correct it. (1)

<h1CAT<h1

<h1>CAT</h>

8.1.2 Identify the problem that will occur when the error-free code segment below is executed in a browser Suggest ONE way of fixing the problem (2)

<html> <body bgcolor=”black”> <h1>Hello World</h1> </body>

</html> The text and background colour will both be black, making the text ‘Hello World’ invisible.

Page 53: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

53

A possible solution: Change page background colour

<body> <body bgcolor=’yellow’> Change font colour <font color=’white’>Hello World</font>

<font color=’white’><h1>Hello World</h1></font>

8.2 Many modern businesses make use of databases

8.2.1 Indicate in which section the function =Count(*) must be placed in a database report in order to count the number of records for each group of records in the report. (1)

Group footer Group header

8.2.2 Identify the type of database object in which you are likely to find the formula below. (1) Total:[Price]*[Quantity]

Query

8.2.3 The database formula VAT:[Price*0.14] currently produces an error Correct the formula for it to work properly (1)

VAT:[Price]*0.14 or VAT:[Price]/100*14

8.2.4 State TWO differences between a table and a query. (2)

Table contains/stores records Table is used to specify the fields, field types and their properties Query is used to select records from the table Query can create temporary, calculated fields Query can be used to view selected fields

8.3 Mr Cele is sharing a document with his brother who is using an older version of the word processing application than the one that Mr Cele uses.

8.3.1 What must Mr Cele consider when saving documents, so that there are no formatting problems when it is

accessed on his brother’s computer? Motivate your answer (2) Save the document in an older format This will ensure that backward compatibility/formatting is retained when used with older versions of the application

8.3.2 What is a citation in a document and when should it be used? (2) A feature to reflect information regarding the reference to a book or academic work

Or Used when one wants to refer to another person’s work, an explanation To show consultation of other sources to avoid plagiarism

8.4 Spreadsheets offer a variety of ways to organise and analyse data. 8.4.1 What is the difference in use between the spreadsheet functions COUNTIF and COUNTA? (2)

COUNTIF – counts the number of cells within a range that match a given condition COUNTA – counts the number of cells in a range that are not empty

8.4.2 Write down the result of the function =ROUND(23.65,1) (1) 23.7

QUESTION 9: INTEGRATED SCENARIO

SCENARIO Your school has to elect a new School Representative Council. The principal would like to hold an election using computers and a program that will allow pictures of the candidates to be shown on the computers. This will not only save time (as the computers will automatically total the votes) but will also save on costs, such as paper. Mr Dawson, the principal of your school, has asked your CAT class to help organise and run the election process.

Page 54: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

54 9.1 Mr Dawson has ordered 20 new computers to help with the election process Answer the questions below he

has regarding the computers he has ordered. 9.1.1 The computers all have integrated video adapters. Give ONE possible advantage of this. (1) The integrated adapter takes up less space than a separate video adapter on the motherboard

No need to buy a video adapter 9.1.2 The integrated video adapters use shared memory as opposed to dedicated memory. Explain to Mr Dawson the difference between shared memory and dedicated memory (2)

The video adapter does not have its own dedicated memor It shares/uses the RAM on the computer 9.1.3 Election candidates will have their photos shown on the screens. Students can vote by clicking on the

photos displayed on the screen. Identify TWO possible advantages for voters during the election process if they were to use touch screens.(2) More intuitive to use by voters No need to use cumbersome keyboards or a mouse Less complicated for those who are not computer literate

9.2 Mr Dawson needs to take pictures of all the candidates to place on the computers

9.2.1 Give TWO reasons why Mr Dawson should use a digital camera to take pictures instead of a webcam (2) Easier to move around with digital a camera

The average digital camera takes much better quality photographs More features such as ISO settings, scenee selection

9.2.2 Mr Dawson needs to transfer the photographs he has taken from the digital camera to his computer. State TWO ways in which he can accomplish this. (2) Using the cable supplied with the camera to connect he camera to the computer

Place the camera’s memory card into a card reader on the computer Some digital cameras have a wireless functionality such as Bluetooth or Wi-Fi which will allow photograps to be transferred to the computer Using a memory card that has Wi-Fi capabilities (such as the Eye-Fi memory card)

9.2.3 The photographs from the digital camera take up a large amount of storage space which means the memory card needs to be emptied regularly.

Outline TWO possible ways in which more photographs can be taken before Mr Dawson would need to empty the memory card. (2)

Install a memory card with more storage space Lower the resolution of the photograhs the camera takes

9.2.4 Give ONE example of information that Mr Dawson would be able to retrieve from the megadata in an image file.

(1) ISO speed. Aperture Whether the flash was used The GPS location the photograph was taken at Camera brand and model Shutter speed

9.3 If the voting data is backed-up, then the results and other reports can always be created.

Mr Dawson needs to make sure that the voting data from the election is backed up properly.

9.3.1 What is a back-up (1) A copy of data/information that is stored in a different physical place from the original data

9.3.2 Give TWO possible reasons why most people do not regularly make backups. (2)

People forget to make back-ups regularly Some people don’t know how to make back-up

Back-ups can be expensive to make due to the need for extra hardware

Page 55: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

55 9.3.3 State TWO advantages of using cloud storage instead of storage media such as CDs, DVD’s and flash drives for

backups. (2) Can access data from anywhere in the world where Internet connection is available Saves local storage Data is less likely to be lost

9.4 Staff will be able to vote from their wireless devices such as smartphones and tablets.

9.4.1 State TWO advantages of using an on-screen keyboard on a smartphone or a tablet instead of a traditional physical keyboard. (2)

More space available for a larger screen Keyboard layout can be changed as needed The size and shape of the keys and keyboard can be adjusted via software

9.4.2 One staff member has recently bought a phablet. What is a phablet? (1) A device that contains a mixture of the functionality/features of both smartphone and tablet

9.5 The local IT technician has provided Mr Dawson with a biometric security device that may be used during the voting process.

9.5.1 State ONE advantage of using biometric security to ensure that each learner can only vote once. (1)

Biometric input accurately identifies the user Much easier for users than typing in passwords More difficult to ‘get-around’/bypass it

9.5.2 In order to install the biometric security device, a driver is needed. What is a driver? (1) A driver is software designed to allow the operating system and a hardware device to communicate/allow the operating system to control the device.

9.5.3 Mr Dawson cannot find the original installation CD that contains the drivers needed to install the biometric device. Identify TWO possible sources other than the installation CD where he can try and find the necessary driver.(2) The original supplier The Internet (supplier website or a third party website On a ROM chip integrated into the device The driver might be included in the operating system From someone who has the same device From a computer store

9.6 Mr Dawson would like to make printouts of important documents before and after the election process. Recommend a type of printer for each of the scenarios below: Do NOT give brand names or specific models; just the TYPE of printer that would be best suited.

9.6.1 Printing high quality colour pictures that will be put up in the school for learners to see who they can vote for. (1) Inkjet/Photo printer

9.6.2 Printing a document that will contain the rules for the election process. The school will print 900 monochrome (black and white) pages. (1) Laser printer

9.7 Mr Dawson will be using his personal laptop to finalise the election results. Unfortunately, he sometimes

has trouble with his laptop and printer. Explain to him how he can solve the following problems: 9.7.1 The laptop has slowed down considerably over the last year.

Give TWO possible reasons for this. (2) Fragmentation Antivirus software may be using too many resources Too many programs loaded/not enough RAM available Malware might have infected the computer

Page 56: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

56 9.7.2 One of the applications Mr Dawson is using has stopped responding to all input.

Outline the process he should follow to close the non-responding application. (2) Press Ctrl, Alt and Del buttons/Activate task manager

Terminate the non-responding application

9.7.3 Mr Dawson has tried to print a document, but no printing occurred. Give TWO possible reasons for this (2) Printer may be disconnected from the computer Printer may be switched off The printer might not be installed correctly There might not be paper in the printer Printer might not have any ink/toner left

9.8 Mr Dawson would like to publish the pictures and names of the election candidates in a blog. 9.8.1 Discuss TWO reasons that would make a blog the preferred solution for publishing the names and pictures .(2) Blogs are easy to create

Blogs are usually free Readers can subcribe to the blog for updates (via RSS) Readers can read commentsl on posts

9.8.2 Parents want to keep up to date with regards to the election via the blog. However some of the parents also have other blogs they frequently read. Outline a possible solution to their problem which would allow them to read new posts from all of the blogs without needing to visit each website separately. (1)

9.9 Some of the learners are on a sports tour in a different province. They will be casting their votes via the

Internet. Explain to Mr Dawson how a firewall would ensure the security of a network. (1) The firewall will prohibit any unauthorised access to the network from the Internet

9.10 Mr Dawson has approached an ISP for an uncapped, shaped Internet connection

9.10.1 Distinguish between the term uncapped and shaped with reference to an Internet connection. (2) Uncapped refers to the fact that there is no limit to the amount of data that can be uploaded or

downloaded. Shaped refers to limiting the speed of certain services e.g. video stream

9.10.2 The ISP has warned Mr Dawson that high usage on the uncapped line will result in the line being throttled. Explain to Mr Dawson what the term throttled means in this context. (1)

If more than a certain amount of data is downloaded or uploaded the download/upload speed of the line will be reduced.

9.11 Mr Dawson needs to update two of the softwar packages on the computers in order for the election to proceed as planned

9.11.1 Explain to Mr Dawson the difference between a service pack and a patch. (2) A patch is a small piece of software that is used to correct a specific problem with a program

A service pack is a collection of patches/updates released as one download/installation media 9.11.2 State TWO possible ways in which Mr Dawson can acquire the service packs/patches needed to update the

software. (2) Activating the automatic update option

Click on the update option within the application Manually download and install the relevant patch/service pack Acquire a storage medium such as a CD with the required patch/service pack on it

9.11.3 One of the applications has been discontinued and needs to be replaced. Mr Dawson has been advised to find and install a shareware version of the application. Name TWO benefits of using shareware. (2)

Installing shareware software allows one to first see if all the appropriate functions/feature are available That will prevent that you waste money on software the does not meet your needs

Page 57: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

57 9.12 Due to the fact that the network will be connected to the Internet, Mr Dawson is worried about security

risks affecting the computers on the network. Describe to him what each of the following security risks are:

9.12.1 E-mail spoofing (forgery of an email header) (1) E-mail spoofing refers to the process of altering an e-mail (header) so that the message appears to have come from someone other than the actual source/sender

9.12.2 Identity theft (1) Stolen personal details are used by criminals to pretend that they are someone else

(NOT stealing of identity) 9.12.3 Keylogging (1) Software (spyware) designed to track and record each keystroke a user makes

9.13 Mr Dawson needs to send an e-mail to each of the election candidates. He notices the option of adding an

address in the Cc or Bcc field. Explain to him what the difference is between the the Cc field and the Bcc field. (2)

Addresses in the Cc field are visible to all the other recipients Addresses in the Bcc field are not visible to other recipients

Printed up to here

PAPER 6

QUESTION 1 – MATCHING ITEMS

Write down only the number of the description from Column A, and next to it the correct matching capital letter from Column B. (10)

NO. COLUMN A COLUMN B ANSWER

1.1 Technology that enables a machine to read characters such as bank numbers on a cheque

A Blog D

1.2 The software that places print jobs in a queue after receiving in-structions from the operating system

B Encryption K

1.3 A technique used to prevent unauthorised access to sensitive information

C Patch B

1.4 Small piece of software designed to fix software errors or update a program/application

D MICR C

1.5 Maximum amount of data that a user can transfer over a specified time period via an internet connection

E Cap E

1.6 An informal website consisting of articles in the form of a journal F Defragment A

1.7 The rate at which data is transferred from one point to another G Style H

1.8 The process of arranging the clusters of a file sequentially H Bandwidth E

1.9 Combination of various types of formatting, such as character and paragraph formatting included in one command

I SUMIF G

1.10 Function used to add together certain numbers in a range. J RFID I

K Spooler

L Broadband

M EULA

N Macro

O IF

Page 58: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

58 QUESTION 2 – MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A-D) next to the question number. (10) 2.1 Which ONE of the following is not a way of contributing to ‘green computing’?

A Replacing hardware every two years B Refilling ink and toner cartridges C Using hardware that is “Energy Star” compliant D Limiting the amount of printing done in an office

2.2 Which ONE of the following would NOT represent a service typically provided with an e-banking facility? A Inter-account transfers

B Balance enquiries C Withdrawing cash D Paying of bills

2.3 An area in a public place such as a restaurant, where you can gain access to the internet, is known as a(n)

A WISP B ISP C LAN D hotspot

2.4 Which one of the following would you use to transfer files from your cell phone to your computer? A HTTPS B WAN C Bluetooth D ADSL

2.5 The dumping of hardware technology in landfill sites is also known as........... A e-learning B e-computers C e-scrap D e-commerce

2.6 A term referring to the gap between people who have access to technology and those who do not: A Digital device B Illiterate C Digital divide D e-gap

2.7 Software or a function of a browser that can be used to stop learners accessing unsuitable websites is called: A Freeware B A filter C Encryption software D Shareware

2.8 Which ONE of the following e-mail options allows you to send a copy of the message so that the recipient’s name is

visible to other recipients of the message? A Bcc B Forward C To D Cc

2.9 Which ONE of the following CANNOT be used as a data source for mail merge in a word processing program? A A presentations file B A spreadsheet file C A word processing document D A database file

2.10 Which ONE of the following spreadsheet function will be used to count only the numeric entries in a list? A COUNTA B COUNT

C SUMIF D COUNTIF

Page 59: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

59

LAPTOP

Intel i7 3610QM 2.30 GHz 750GB SATA HDD

8 GB RAM 8x DVD Super multi writer

17.3” LED 1.3MP Webcam

Bluetooth 2.1 Windows 8 Pro

1x RJ-45 Ethernet 3-in-1 Memory card reader

Integrated Wi-Fi

SECTION B Read the scenario below carefully as the questions that follow are based on it.

SCENARIO The librarian at your school, Mr Books, has decided to start using computers in the school’s media centre/library for administration. Unfortunately his computer knowledge is not as high as will be needed. He has approached you as the Grade 12 Computer Application Technology learners to help him make the correct decisions. You will be acting as the team leader and will be dealing with Mr Books directly

QUESTION 3 3.1 Mr Books will need a computer that he will be using for the administration of the library. He has decided that he will

need to buy a laptop and received the following specifications on a quote from the local IT technician”:

3.1.1 Mr Books wants to create documents such as letters, spreadsheets and slideshows about his library. (1)

What type of software package would he be required to install on the laptop to create the above-mentioned items? 3.1.2 Mr Books’ laptop can be used for video-conferencing,

Which hardware component from the above advert indicates this? (2) 3.1.3 Besides the above hardware component, name TWO more hardware devices he should have to make video

conferencing possible. (2) 3.1.4 The laptop does not contain a modem as standard. Will Mr Books be able to connect to the internet without a

modem? Give a reason for your answer. (2) 3.1.5 Mr Books would like to know whether he should buy an operating system. You explain that an operating

system is already present. Identify the operating system of the laptop. (2)

3.1.6 The advert lists Bluetooth as being a standard connection on the laptop.

List TWO advantages of Bluetooth over infrared data transmission.

Page 60: THEORY REVISION GRADE 12 10...1 THEORY REVISION GRADE 12 – 10 GRADE 12 PAPER 1 SECTION 1 1. Choose a term/concept that matches the description in COLUMN A. Write only the letter

60