0% found this document useful (0 votes)
46 views19 pages

June 2019 P2and MEMO

IT revision

Uploaded by

sibiyaalwande86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views19 pages

June 2019 P2and MEMO

IT revision

Uploaded by

sibiyaalwande86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Downloaded from Stanmorephysics.

com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com

JUNE EXAMINATIONS - 2019


INFORMATION TECHNOLOGY P2
GRADE 11
MARKING MEMORANDUM

QUESTION 1
1.1.1 C 

1.1.2 B 

1.1.3 D 

1.1.4 B 

1.1.5 B 

1.1.6 C 

1.1.7 C 

1.1.8 C 

1.1.9 B 

1.1.10 D  (10)

1.2.1 Trace table 

1.2.2 Interpreter 

1.2.3 BIOS 

1.2.4 Protocol 

1.2.5 Lossy Compression  (5)


[15]

QUESTION 2
2.1.1 A replacement of a hardware or software with a newer or more improved
version  (1)

2.1.2 The computer has a modular design, which is made up of separate


replaceable parts. As a result when it needs to be upgraded, the component is
merely replaced  with the newer component (2)
Downloaded from Stanmorephysics.com

2.1.3 Can replace/add any TWO of : 


 HDD
 SSD
 RAM
 CPU
 Motherboard
 Optical Drive (2)
Accept any other reasonable answers !

2.2 A point-to-point connection is dedicated. This means that the wires or paths
used to transfer the data are not shared between multiple components. The
wires or paths in a bus are shared between components  (2)

2.3.1 Caching is a method to compensate for loss of efficiency/bottleneck  when


a faster medium tries to communicate with a slower medium (1)
2.3.2 Any TWO of : 
• CPU caching
• Hard-drive caching
• Web caching (2)

2.4.1 In most instances the drivers for the printer will have to initially be
manually installed, the automated process of loading a driver in most
plug and play devices does not occur  (2)
2.4.2 It would send an IRQ  / hardware interrupt message (1)

2.5.1 An operating system controls all the activities that takes place in a computer
(1)
2.5.2 The OS splits the CPU time between the active programs and gives each
program a fraction of access time to the CPU(s) (2)

2.6.1 Virtual memory is a section of storage that the OS reserves, to act as RAM
when RAM falls short (2)
2.6.2 Your computer will become noticeably slower or unresponsive, since access
from HDD is slower (1)
2.6.3 Any ONE of : 
 Close any unnecessary programs
 Increase the RAM
 Use the 64-bit version of the OS (1)
[20]
Downloaded from Stanmorephysics.com

QUESTION 3
3.1.1 It is the physical layout of the way in which the computers and other devices
are connected in a network.  (1)
3.1.2 Any TWO of : 
• If one device fails, it won’t affect the network.
• Computers can be easily added to the network
 Improved security (2)
3.1.3 Switch – a hardware device that is used to connect the computers to a
central point. It regenerates and amplifies the signal and directs the traffic
on all the devices on the network.
Router – is a hardware device that provides communication between
networks over the internet through relaying data to the correct destination.
It routes data from a LAN to another network connection. (2)

3.2.1 Any TWO of : 


• Data transfer speeds are very high with fibre as compared to UTP
• Fibre has little loss of signal strength.
• Greater bandwidth
• Fibre is immune to eavesdropping (2)
• Cover a larger distance

3.3.1 It allows wireless devices to connect to a network. (2)


3.3.2 Any TWO of : 
• File sharing transfer speeds are normally slower than a wired LAN
• Wireless connections can be obstructed by structures such as walls,
ceilings and furniture
• Wireless networks are generally less secure
• The general speed decreases the further you are from the router (2)

3.4.1 Any TWO of : 


• Data is expensive
• Bandwidth of connection is very low
• Poor video quality if you have a slow connection (2)

3.5.1 • Ease of access to the device 


• The need to always be connected  (2)
Downloaded from Stanmorephysics.com

3.6.1 Any TWO of : 


• Do not set the display to the highest setting
• Do not leave the display on for a long period of time
• Set the device to automatically turn the display off (2)
(any other suitable answers)
3.6.2 Having your Wi-Fi on if you are not using it drains your battery as your
phone is continuously searching for a Wi-Fi signal (1)

3.7 Any TWO of : 


• Mobile apps offer better personalization – tailored to the users interests,
location, etc
• The ability to send instant notifications to the users
• The ability to work offline
• Apps can work faster than websites – they store data locally on mobile
devices. (2)
[20]
QUESTION 4
4.1.1 StockID  (1)
4.1.2 It is the only field from the given list in the table that will be unique for
every entry/record (1)

4.1.3.1 text 
4.1.3.2 date/time 
4.1.3.3 currency  (3)

4.1.4 Accept any field size value between 4 and 10  (1)

4.2.1 Any THREE of : 


 Accuracy
 Correctness
 Currency
 Completeness
 Relevance (3)

4.2.2 Any ONE of :


 Format Check – Used to check that data matches a particular format , such as
date format
 Data Type check – used to ensure that inputted data is of the expected/
relevant data type
Downloaded from Stanmorephysics.com

 Range check – used to ensure that the inputted value is within range of a set
of expected values
 Presence check - used to check that values are entered into relevant
components
 Check Digit – a digit, in a particular sequence of digits, that is generated
through a mathematical formula, so as to validate it’s authenticity

( type  and explanation ) (2)

4.3.1 A query (1)


4.3.2 Any TWO of : 
 Structures to create and edit structure of a database/table
 Ability to add/edit and delete data in the database
 Ability to process / filter data to extract data
 A form
 A report (2)
4.3.3 Any ONE of : 
 Ms Access
 Base
 MySQL
 Microsoft SQL Server
 Blackfish
 FileMaker Pro
 Oracle
 PostgreSQL (1)

4.4.1 Server 
4.4.2 Desktop / Server
4.4.3 Distributed  (3)

4.5 Any TWO of : 


 Manages the database
 Assign access rights to users
 Routine maintenance of the database
 Updates the database/ ensures that database is regularly updated
 Implementing a backup policy (2)
[20]
Downloaded from Stanmorephysics.com

QUESTION 5
5.1An algorithm is a step by step point form solution to a given problem. 
Algorithms are Universal i.e. it does not contain programming specific jargon and
therefore can be used by any programmer using any programming language. (2)

5.2.1 The while loop is used because the length of the text file is not initially
known.  (2)
5.2.2 a) the reset procedure opens a file given by FileHandle for read/moves the file-
pointer to the beginning of the text-file  (1)

b) The Append procedure opens a file given by FileHandle to allow


subsequent writes to add lines to the end of the file / moves file-pointer to
end of text-file and prepares to write data to the file  (1)

c) Opens a file and allows contents of existing file to be replaced or allows for
the creation of new text file / clears the contents of an existing text-file (2)

d) Links the logical file to the Physical File /Creates a link between the external
file on storage and file processing variable  in the program /assigns a
value to FileHandle for a FileName in preparation for reading or writing to
the text-file (2)

5.3.1 A function returns a value 


A procedure does not return a value 
A function has the data type of the returning value in its header whereas a
procedure does not  (4)

5.3.2
sFullname ← Get Fullname 
sPwd ← ‘’ (blank string) 
i ← length of sFullname 
Loop from 1 to i 
If sFullname[i] is NOT a vowel 
sPwd ← sPwd + SFullname[i] 
end Loop (6)
Downloaded from Stanmorephysics.com

5.4
x arrScores[x] arrScores modulus 4 = 0? arrTemp[x]
1 8 T 8
2 5 F
3 3 F
4 12 T 12
5 2 F
   
(4)
[24]
QUESTION 6
6.1.1 Spyware redirects you to websites you do not intend going to OR
records your keystrokes and sends it back to it’s creator  (1)

6.1.2 Any TWO of : 


 Create regular backups (offsite)
 Install anti-malware software
 Update software regularly
 Install / activate a firewall (2)

6.1.3 Any TWO of : 


- Be aware of potential dangers and threats such as phishing
- Don’t give out personal information unnecessarily
- Be cautious about clicking on links from e-mails/spam
- Be circumspect about the people you encounter online
- Use secure sites for transfer of sensitive/financial data transactions
- Do not respond to phishing e-mails
- Use security/privacy features of web-browsers for additional protection
- Use security features of social networking sites (2)

6.2.1 Multimedia files consumes a lot of storage space, and reducing it’s size will
enable files to be shared or broadcast (1)

6.2.3 Lossy compression – The file size is reduced by sacrificing some insignificant
data, which would not tremendously compromise the quality of the file
LossLess compression - compresses the file without losing any data (2)

6.3.1 An attempt to manipulate or trick someone into willingly giving out sensitive
personal information/data or installing malware. (1)
Downloaded from Stanmorephysics.com

6.3.2 Spoofing  – Using electronic technologies to fool people into believing that the
communication is coming from another legitimate person or institution 
OR
Phishing Attempts from people, generally employing e-mails to direct people
to fake websites, where they are tricked into releasing personal information (2)

6.4.1 A way of scrambling text/data into a new format using a specified set of
rules (1)

6.4.2 Un-authorised individuals won’t be able to read and interpret the


encoded data (2)

6.4.3 SSL / Secure Socket Layer  (1)

6.4.4 - The address bar will contain a https 


OR
- The address bar will contain a (green) padlock (1)

6.5.1 Any TWO of : 


- Blogging
- Micro-blogging
- SMS
- Instant messaging
- VoIP (2)

6.5.2 - Notification – user is notified by a sound or message that a new e-mail has
arrived
- Push Technology – The user is notified and the e-mail is automatically 
downloaded to the device (2)

6.5.3 POP3  (1)


[21]

TOTAL = 120
Downloaded from Stanmorephysics.com

You might also like