CAT P2 Question Paper
CAT P2 Question Paper
SENIOR CERTIFICATE
GRADE 11
NOVEMBER 2014
MARKS: 150
TIME: 3 hours
*ICATDM2*
SECTION A
COLUMN A COLUMN B
1.1 An acronym that describes the fact that A Green computing
incorrect data input will lead to incorrect
results being produced
I Touch screen
J Yahoo
K GIGO principle
L Digital camera
M Webcam
N Bcc
O Ergonomics
P Conservation
Q WYSIWYG
(7 x 1) [7]
2.1 Which ONE of the following file extensions is associated with sound files?
A .exe
B .mp3
C .jpeg
D .pdf (1)
A Computer virus
B Spyware
C Software patch
D Software bug (1)
A Archive
B Compressed
C Hidden
D Read only (1)
2.4 Internet Explorer, Firefox and Google Chrome are all examples of …
A search engines.
B web browsers.
C web authoring applications.
D chat rooms. (1)
2.5 Which ONE of the following does NOT logically belong with the others?
2.6 A data type in a database that can handle large amounts of text.
A Hyperlink
B Memo
C Text
D OLE (1)
A Wireless connectivity
B Programmability
C Synchronise PIM data with your PC
D All of the above are usually featured on smartphones (1)
2.8 Which ONE of the following would be the most effective device for entering
large quantities of numbers?
A Virtual keyboard
B Numeric keyboard
C Mouse
D Calculator (1)
2.9 Which ONE of the following refers to the use of material and resources
without acknowledging the original authors?
A Data theft
B Identity theft
C Piracy
D Plagiarism (1)
Indicate whether the following statements are TRUE or FALSE. Where the
statement is false rewrite ONLY the underlined section to make it true. (You may
not simply use the word NOT to change the statement when you rewrite it.)
3.1 RSS is software that enables a user to open and display web pages.
3.4 The data type of a file is indicated by 3 or 4 letters after the file name.
TOTAL SECTION A: 25
SECTION B
4.1.4 Name TWO examples of input devices for visually impaired users. (2)
4.1.5 Touch screens have become very popular for input on mobile
devices. Name TWO possible reasons for this. (2)
4.3.2 Why would computer users need more secondary storage than
primary memory? (1)
4.3.4 Some people prefer to store their data online. List TWO
advantages of online storage. (2)
5.2 List TWO types of resources that can be shared over a network. (2)
5.3.1 Explain the term client as used in the context of a LAN. (1)
5.3.3 What is the difference in roles between a proxy and a file server? (2)
6.2 The most important part of doing research is asking the right questions.
6.2.2 Why is it not a good idea to use open ended questions in a survey? (1)
6.3.1 Explain what is meant by the term export with regard to data by
using a suitable example. (2)
6.3.3 Explain how a CSV file accomplishes its goal by referring to the
term delimiter. (2)
7.1 ICT has had both positive and negative impacts on the business world.
List TWO possible negative effects. (2)
7.2 Mention TWO ways in which one can minimise the possibility of being
affected by computer-related health risks. (2)
7.3 An AUP is used to inform users as to what may or may not be done on a
network and/or computer. List TWO possible items that can be included in
the AUP for your school network. (2)
7.4 List TWO ways in which the security of data on a network can be protected
by an administrator. (2)
8.1 What would each of the following functions be used for in a spreadsheet?
8.2 A word processor is one of the most widely used programs in business.
8.2.1 What file format would you use to prevent users from making any
changes to a document? (1)
8.3 List TWO reasons why you would use a database instead of a spreadsheet
for large amounts of data. (2)
8.4.1 Which of the five fields shown would be suitable to apply a default
value to? (1)
8.4.3 What data type and field size was used in the Cell number field? (2)
8.4.4 What data type could be used in the Home town field to allow
users to choose ONLY from a set list of options? (1)
8.5 Reports allow for a business to print out data in a format which is easier to
read and understand.
8.5.1 What function would you use to show the total number of records
appearing in a report? (1)
8.5.2 Where would you add the function in QUESTION 8.5.1 to make
sure it calculates the correct amount? (1)
8.5.3 What would you use the feature grouping for in a report? (1)
[15]
TOTAL SECTION B: 75
SECTION C
SCENARIO
The school ICT committee has recommended that school buy tablets for the Grade
12 learners. The tablets will be used for educational purpose such as accessing
e-books. You must assist the school to make a decision.
R2 999.00
9.1 Many members of the governing body have never used a tablet before.
9.1.2 A tablet has an on-screen keyboard. Explain what this is and how it
works. (2)
9.1.6 What does the term “on-board” indicate with regard to the storage? (1)
9.1.7 Explain what the embedded 3G would be used for and which
technology it would use to accomplish its purpose. (2)
9.1.9 Name ONE output device to which the tablet can be connected
using the HDMI port. (1)
9.1.10 A dual core processor indicates that the tablet has two CPUs.
Indicate whether you agree with the statement above and motivate
your standpoint. (2)
9.2 The governing body would like to compare the tablets to the laptops currently
being used in the school.
9.2.1 List TWO advantages of tablet computers over laptop computers. (2)
9.2.4 Besides a touch screen, name TWO ways in which one can input
data to the tablet. (2)
9.3.1 Explain what the line “Full Microsoft Compatible Office Suite”
means. (1)
9.3.2 The tablet uses Android 4.1 software which is open source. What is
open source software? (1)
9.4.1 A touch screen is an output device. Explain how this can also be an
input device. (1)
9.4.3 List TWO ways in which data can be transferred from a tablet to a
computer. (2)
9.4.4 How would you connect the tablet to a data projector? (1)
9.5 As the tablets will be permanently connected to the Internet, the governing
body is worried about the students accessing social networking sites.
9.5.1 List TWO ways in which the tablet in the advertisement can connect
to the Internet. (2)
9.5.2 List TWO advantages of students using social networking sites. (2)
9.5.4 Name TWO ways in which you can protect yourself while online. (2)
9.5.5 List TWO ways in which students can ensure that the websites they
are using is safe. (2)
9.5.6 The tablets can connect to a hotspot. Explain what a hotspot is and
how this tablet can be connected to the hotspot. (2)
TOTAL SECTION C: 50
GRAND TOTAL: 150