0% found this document useful (0 votes)
24 views17 pages

Final Version

The document describes minimum laptop specifications for a school hackathon. It includes details on the CPU, graphics, storage, memory, and communication capabilities. Participants will use their own laptops and can choose any programming language. The questions cover topics around hardware components, operating systems, interrupts, networking and more.

Uploaded by

Jaal Elowa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views17 pages

Final Version

The document describes minimum laptop specifications for a school hackathon. It includes details on the CPU, graphics, storage, memory, and communication capabilities. Participants will use their own laptops and can choose any programming language. The questions cover topics around hardware components, operating systems, interrupts, networking and more.

Uploaded by

Jaal Elowa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Question Mark Max

INFORMATION TECHNOLOGY 1 10
Grade 11
25 NOVEMBER 2022 2 10
EXAMINATION
PAPER 2 THEORY 3 18
100 MARKS
2 Hours 4 14

5 10
EXAMINER : T Kubheka
MODERATORS: E Charikinya 6 38

Total 100

FILL IN YOUR NAME


READ FURTHER INSTRUCTIONS BELOW.

NAME:
PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY
1. This question paper consists of 17pages. Please check that your question paper is complete.
2. Read the questions carefully and make sure that you answer all parts of each question.
3. Answer ALL questions – there are no options in this paper.
4. Show all working where applicable.
5. Non-programmable calculators may be used.
6. It is in your own interest to write legibly and to present your work neatly.
7. There are extra pages provided at the end of the paper should the space provided after
each question be too little. When using the last pages please number the questions
correctly.
Question 1 Terminology 10 Marks
1.1 CMOS (2)

1.2 TCP/IP (2)

1.3 Latency (2)

1.4 VLAN (2)

1.5 Bandwidth (2)

Page 2 of 17
Question 2 Terminology 10 Marks
For each term in Column A select the matching description in Column C. Place the
corresponding letter in Column B.
Column A Column B Column C
2.0 Computer V A. A method used to change values of a private field.
Term
2.1 Plug-in B. A type of semi-conductor memory that does not
need to be refreshed as the transistors inside
would continue to hold the data as long as the
power supply is not cut off.
2.2 Hot swapping C. A unique identifier assigned to a network interface
card.
2.3 MAC Address D. An object-oriented programming concept of
wrapping the data (variables) and code acting on
the data (methods) together as a single unit.
2.4 POP3 E. A process whereby a device is automatically
recognised by the operating system when the
device is plugged in.
2.5 Encapsulation F. A system that uses tags, or labels attached to the
objects to be identified. Two-way radio transmitter-
receivers called interrogators or readers send a
signal to the tag and read its response.
2.6 Mutator G. A device used to connect two different networks
together.
2.7 SRAM H. A unique string of numbers separated by full stops
that identifies each computer using the Internet
Protocol to communicate over a network.
2.8 jpg I. A keyword in SQL used to limit the number of
columns in a query.
2.9 Router J. An internet protocol for email retrieval.
2.10 Distinct K. Software that adds functionality to a browser.
L. An image format used on the Web that provides
lossless compression.
M. An image file, commonly used for photographs.
O A technique used in web development which
involves employing code on a web server which
produce a response customized for each user's
(client's) request to the website.

Page 3 of 17
Scenario
Consider the scenario below when answering the rest of the examination paper:
Mr Le Roux has hinted that he wants to establish a school hackathon that will be an
annual event and students enter as teams. The teams attempt to solve as many
problems as possible during the heats. The teams are playing for pride.
Question 3 Hardware 18 Marks
All participants should have their own laptops – Mr Le Roux has suggested the
following minimum specifications for devices.
CPU
CPU Type Intel Dual Core Processor

CPU Speed N3050 1.6GHz

CPU Support 2M Cache up to 2.48GHz

Graphics
GPU/VPU Intel HD Graphics 400

Video Memory Shared system memory

Graphic Type Integrated Card

Storage
HDD 500GB Hard Drive

HDD RPM 5400rpm

HDD Interface SATA

Memory
Memory 8GB DDR3

Memory Speed DDR3L 1600

Memory Spec 4GB x 2

Memory Slot (Total) 2

Communication
WLAN 802.11 ac Wireless LAN

LAN 10/100Mbps

Bluetooth Bluetooth 4.0

Page 4 of 17
3.1 The CPU has a Dual-Core processor. Explain the term dual core. (1)

3.2 Name two main sections of the CPU (2)

3.3 There are different types of memory available on the computer system: (6)
Cache, primary memory (RAM), secondary memory (Hard drive)
Explain the function of each type of memory
Cache:

Primary Memory:

Secondary Memory:

3.4 As a programmer you may find the specs for this laptop too limiting. Choose (2)
one specification that you would change. Give the updated spec and the
reason for your choice.
New Spec:

Page 5 of 17
Reason:

3.5 The specifications describe an integrated video card.

3.5.1 What does the term integrated refer to in this context?


(2)

3.5.2 Give 1 advantage and 1 disadvantage to an integrated video card (2)

Advantage:

Disadvantage:

3.6 Explain what HDMI is used for. (1)

3.7 Explain the method overclocking. (2)

Page 6 of 17
Question 4 Software 14 Marks
4.1 The operating system is responsible for PROCESS management. (2)
Describe TWO process management functions that must occur
Function 1:

Function 2:

4.2 Operating systems use different processing techniques to handle many


tasks at the same time.

4.2.1 Identify each of the processing techniques illustrated below. (2)

(a)

Answer

(b)

Answer________________________________

Page 7 of 17
4.2.2 Explain how an operating system working with a dual core processor (2)
incorporates the processing techniques above for maximum performance.

4.3 An interrupt is a signal sent to the CPU from hardware or software indicating (4)
the need for the CPUs attention. Define a hardware and software interrupt
and give an example of each.

Software Interrupt Definition:

Software Interrupt Example:

Hardware Interrupt Definition:

Software Interrupt Example:

4.4 The participants at the hackathon can use any programming language they (4)
choose to complete the problems.

Match the language listed in column A with the description in column C.


Place the corresponding letter in Column B

Page 8 of 17
Column A Column B Column C
Computer V Description
Language
Assembler code A. Example of programming language that uses a
virtual machine to execute programming code.
Java B. High-level language that will create an
executable file (.exe) in one step compilation.
Machine code C. Low level language using English acronyms to
represent corresponding binary code.
Delphi D. Program in binary code.

Page 9 of 17
Question 5 Networks 10 Marks

Your School has got a network with PCs, mobile phones and tablets connected to it.
They have employed 2 permanent network administrators, however need flexibility
for extra staff who assist when the hackathon is taking place.

The diagram below shows the layout of the network and some of the device that will
be used.

5.1 Give TWO different examples why connecting the computers in a network (2)
would be of benefit to the Hackathon.
Example 1:

Example 2:

5.2 The network at your school includes a file-server. The server is more
“powerful” than the other computers on the network. Give TWO hardware
specifications of components/devices or factors that determine how
‘powerful’ a computer is. (2)
Specification 1:

Specification2:

Page 10 of 17
5.3 UTP Cables are used for the LAN at school.

5.3.1 Signal attenuation is one of the weaknesses of UTP cables (2)


State TWO other weaknesses of UTP cables.
Weakness 1:

Weakness 2:

5.3.2 If UTP cables are to be used over a very long distance, suggest how (1)
the signal attenuation problem can be solved without replacing them
with fibre-optic cables.

5.3.3 What device is needed to connect UTP cabled devices to the server in (1)
a star topology?

5.4 The diagram shows the position of the router and firewall on the network. (2)
Explain why the placement of these two devices could be problematic.

Page 11 of 17
Question 6 Software Development 38 Marks
6.1 A new application is being developed to manage the teams. (10)
You have been asked to create a Team class

Team objects will each have three fields namely:


• The team ID (string)
• The team topic (string)
• The team score (integer)

The basic requirements of this class will be:


• A constructor method to initialise the team ID and topic fields.
• Accessor methods for the ID field.
• Mutator method for the score field.
• A toString() method to neatly display the fields

You are required to draw a class diagram for the Team class according to the
specification shown above. Use the space provided in the grid below for your
answer. You should make appropriate selections for your field types. Include
appropriate details for each method header.

Team

Page 12 of 17
6.2 In the new application you make use of an array of team objects using the
following declaration:

Team teamsArr [] = new Team [50];


int size = 0;
6.2.1 What is the purpose of the size field? (1)

6.2.2 Write an algorithm for a method called findTeam, which will accept (10)
a String parameter for the teamID and perform a sequential search
through teamsArr, terminating when the team is found. The
method should return the position of the team in the array if the item
is found or -1 if the item is not found.

Page 13 of 17
6.3 An array called arrNums is populated with the following 5 values (2)

0 1 2 3 4
8 5 3 12 2
Another array called arrT is an empty array that can store 5 values.
The algorithm below extracts every fourth element from arrNums and stores
them in arrT. Once competed arrT must store the chosen values
consecutively.
1. int size 0
2 loop x from 0 to length (arrNums)
3 if arrNums[x] mod 4 =0
4 arrTsize] = arrNums[x]
5 end loop
8.3.1 Complete the trace table below to show the contents of arrT. (11)

Line size x X< arrNums[x] ArrT[0] arrT[1] arrT[2] arrT[3] arrT[4]


no length? mod 4= 0
1 0

Page 14 of 17
6.3.2 The final result is incorrect. Can you identify the error in the algorithm and (4)
suggest how to rectify it?

Page 15 of 17
Extra space

Page 16 of 17
Extra space

Page 17 of 17

You might also like