0% found this document useful (0 votes)
35 views26 pages

CAT P2 Question Paper

Uploaded by

ramalalemohapijr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views26 pages

CAT P2 Question Paper

Uploaded by

ramalalemohapijr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

NATIONAL

SENIOR CERTIFICATE

GRADE 11

NOVEMBER 2014

COMPUTER APPLICATIONS TECHNOLOGY P2

MARKS: 150

TIME: 3 hours

*ICATDM2*

This question paper consists of 13 pages.


2 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

INSTRUCTIONS AND INFORMATION

1. This question paper consists of:

SECTION A (25 marks)


SECTION B (75 marks)
SECTION C (50 marks)

2. Answer ALL the questions.

3. Number the answers according to the numbering system used in this


question paper.

4. Start EACH question on a NEW page.

5. Leave a line open after each sub question.

6. In general, ONE mark is allocated per fact. A 2-mark question would


therefore require TWO facts, et cetera.

7. Write neatly and legibly.

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 3

SECTION A

QUESTION 1: MATCHING ITEMS

Choose a term/concept from COLUMN B that matches a description in COLUMN A.


Write only the letter (A–Q) next to the question number (1.1–1.7) in the ANSWER
BOOK, for example 1.8 S.

COLUMN A COLUMN B
1.1 An acronym that describes the fact that A Green computing
incorrect data input will lead to incorrect
results being produced

1.2 A popular hand-held wireless device B Digital divide


designed for providing users with a platform
for phone calls, e-mail, text messaging and
Internet access

1.3 A device that can serve as both an input and C PDA


an output device

1.4 An input device that can be used to feed live D Subject


images to the Internet via a web server

1.5 An example of a search engine E ISP

1.6 An option when composing an e-mail that F Cc


allows you to send messages to many
recipients without the recipient's name being
visible to other recipients of the message

1.7 A concept often associated with a paperless G Smartphone


office
H IDSL

I Touch screen

J Yahoo

K GIGO principle

L Digital camera

M Webcam

N Bcc

O Ergonomics

P Conservation

Q WYSIWYG
(7 x 1) [7]

Copyright reserved Please turn over


4 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

QUESTION 2: MULTIPLE-CHOICE QUESTIONS

Various options are given as possible answers to the following questions.


Choose the correct answer and write only the letter (A–D) next to the question
number (2.1–2.10) in the ANSWER BOOK, for example 2.11 D.

2.1 Which ONE of the following file extensions is associated with sound files?

A .exe
B .mp3
C .jpeg
D .pdf (1)

2.2 Term used to describe programming errors within software:

A Computer virus
B Spyware
C Software patch
D Software bug (1)

2.3 Which ONE of the following is NOT a file attribute?

A Archive
B Compressed
C Hidden
D Read only (1)

2.4 Internet Explorer, Firefox and Google Chrome are all examples of …

A search engines.
B web browsers.
C web authoring applications.
D chat rooms. (1)

2.5 Which ONE of the following does NOT logically belong with the others?

A Voice over Internet Protocol


B Speech recognition
C Text-to-speech
D Screen reader (1)

2.6 A data type in a database that can handle large amounts of text.

A Hyperlink
B Memo
C Text
D OLE (1)

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 5

2.7 Which ONE of the following is normally NOT a feature of smartphones?

A Wireless connectivity
B Programmability
C Synchronise PIM data with your PC
D All of the above are usually featured on smartphones (1)

2.8 Which ONE of the following would be the most effective device for entering
large quantities of numbers?

A Virtual keyboard
B Numeric keyboard
C Mouse
D Calculator (1)

2.9 Which ONE of the following refers to the use of material and resources
without acknowledging the original authors?

A Data theft
B Identity theft
C Piracy
D Plagiarism (1)

2.10 Which ONE of the following statements about a firewall is TRUE?

A A firewall will prevent software piracy.


B Firewall software must be updated daily.
C A firewall monitors communication between your computer and the
Internet.
D A firewall is not needed if you have an Internet connection. (1)
[10]

QUESTION 3: MODIFIED TRUE/FALSE

Indicate whether the following statements are TRUE or FALSE. Where the
statement is false rewrite ONLY the underlined section to make it true. (You may
not simply use the word NOT to change the statement when you rewrite it.)

3.1 RSS is software that enables a user to open and display web pages.

3.2 A workstation is a computer system or a computing device used to calculate


the value of sales at a check point.

3.3 Zipping is a way to compress the data of files.

3.4 The data type of a file is indicated by 3 or 4 letters after the file name.

3.5 A caption is a short line of text used to describe an illustration or picture in a


document. [8]

TOTAL SECTION A: 25

Copyright reserved Please turn over


6 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

SECTION B

QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 Data can be captured on computers by means of different input devices.

4.1.1 List TWO advantages of scanners. (2)

4.1.2 Define the term by biometric input. (1)

4.1.3 List TWO disadvantages of biometric input. (2)

4.1.4 Name TWO examples of input devices for visually impaired users. (2)

4.1.5 Touch screens have become very popular for input on mobile
devices. Name TWO possible reasons for this. (2)

4.2 An interactive whiteboard is a popular device to use in a classroom.

4.2.1 What is an interactive whiteboard? (1)

4.2.2 Mention TWO advantages of using an interactive whiteboard. (2)

4.2.3 Mention TWO output devices which usually have a DPI


specification. (2)

4.3 Storage is very important when using a computer.

4.3.1 What is the function of primary memory? (1)

4.3.2 Why would computer users need more secondary storage than
primary memory? (1)

4.3.3 Backups should be stored off-site. Why is this important? (1)

4.3.4 Some people prefer to store their data online. List TWO
advantages of online storage. (2)

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 7

4.4 Software is an integral part of any computer system.

4.4.1 What is the difference between a software bug and a software


patch? (2)

4.4.2 Software can be updated using an online or offline update. Name


ONE circumstance where an offline update will be used. (1)

4.4.3 What is meant by the term compatibility in reference to software


being installed on a computer? (1)

4.4.4 Mention TWO software features on modern operating systems


which improve usability for physically disabled users. (2)
[25]

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Define the term computer network. (1)

5.2 List TWO types of resources that can be shared over a network. (2)

5.3 Computers can be networked within a building.

5.3.1 Explain the term client as used in the context of a LAN. (1)

5.3.2 What is a server? (1)

5.3.3 What is the difference in roles between a proxy and a file server? (2)

5.3.4 Name TWO categories of media used to transfer data in a


network. (2)

5.3.5 Name TWO advantages of using a WLAN. (2)

5.3.6 What is the function of a router in a network? (1)

5.4 Many businesses and universities make use of an intranet.

5.4.1 What is an intranet? (1)

5.4.2 Mention TWO advantages of an intranet. (2)


[15]

Copyright reserved Please turn over


8 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

QUESTION 6: INFORMATION MANAGEMENT

Managing information is an important feature in the business world.

6.1 A well-thought-out task definition is important when starting a research


project.

6.1.1 What is a task definition? (1)

6.1.2 Why is it important to express the task definition in your own


words? (1)

6.2 The most important part of doing research is asking the right questions.

6.2.1 What is an open-ended question? (1)

6.2.2 Why is it not a good idea to use open ended questions in a survey? (1)

6.3 Exporting data is important feature in data processing.

6.3.1 Explain what is meant by the term export with regard to data by
using a suitable example. (2)

6.3.2 What is a CSV file? (1)

6.3.3 Explain how a CSV file accomplishes its goal by referring to the
term delimiter. (2)

6.4 Explain what an appendix is as used in a research project. (1)


[10]

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 9

QUESTION 7: SOCIAL IMPLICATIONS

7.1 ICT has had both positive and negative impacts on the business world.
List TWO possible negative effects. (2)

7.2 Mention TWO ways in which one can minimise the possibility of being
affected by computer-related health risks. (2)

7.3 An AUP is used to inform users as to what may or may not be done on a
network and/or computer. List TWO possible items that can be included in
the AUP for your school network. (2)

7.4 List TWO ways in which the security of data on a network can be protected
by an administrator. (2)

7.5 Briefly explain what malware is. (1)

7.6 Mention ONE example of malware associated with e-mail. (1)


[10]

QUESTION 8: SOLUTION DEVELOPMENT

8.1 What would each of the following functions be used for in a spreadsheet?

8.1.1 CONCATENATE (1)

8.1.2 The AND function (1)

8.2 A word processor is one of the most widely used programs in business.

8.2.1 What file format would you use to prevent users from making any
changes to a document? (1)

8.2.2 Which feature would you use to ensure uniform heading


formatting throughout a document? (1)

8.2.3 Which feature can be used to go directly to a specified point in a


document? (1)

8.3 List TWO reasons why you would use a database instead of a spreadsheet
for large amounts of data. (2)

Copyright reserved Please turn over


10 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

8.4 Details of learners in a school can be stored in a database such as the


following:

Surname Gender Cell number Date of birth Home town


Jabu M 0823265242 1981/01/11 East London
King F 0822512422 1991/01/12 Queenstown
Augustine F 0832652123 1989/01/11 Queenstown
Jeremy F 0820233333 1992/01/10 Mt Frere

8.4.1 Which of the five fields shown would be suitable to apply a default
value to? (1)

8.4.2 What technique can be used to ensure that only an M or an F can


be entered in the Gender field? (1)

8.4.3 What data type and field size was used in the Cell number field? (2)

8.4.4 What data type could be used in the Home town field to allow
users to choose ONLY from a set list of options? (1)

8.5 Reports allow for a business to print out data in a format which is easier to
read and understand.

8.5.1 What function would you use to show the total number of records
appearing in a report? (1)

8.5.2 Where would you add the function in QUESTION 8.5.1 to make
sure it calculates the correct amount? (1)

8.5.3 What would you use the feature grouping for in a report? (1)
[15]

TOTAL SECTION B: 75

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 11

SECTION C

QUESTION 9: INTEGRATED SCENARIO

SCENARIO
The school ICT committee has recommended that school buy tablets for the Grade
12 learners. The tablets will be used for educational purpose such as accessing
e-books. You must assist the school to make a decision.

A local shop has come up with the following advertisement.

Netsurfer SCHOLAR Tablet


Complete pre-loaded
 7” TFT Colour LCD syllabus for the SA NCS
 Android 4.1
 Embedded 3G  148 Hours / 6GB of preloaded
 16 GB On-board storage National Curriculum content.

 1 GB Memory  No Internet download required

 Wi-Fi , Bluetooth and GPS  Grade 10 & 11 Mathematics

 Full Microsoft Compatible  Grade 10 & 11 Physical


Office Suite Sciences

 Dual core 1.5 GHz  Grade 11 & 12 Physics and

 Front camera 2.0MP Chemistry Experiments

 HDMI port  Exam videos – questions and

 12 Month on-site warranty solutions

 Free: Cover, Earphones and


Memory card

R2 999.00

9.1 Many members of the governing body have never used a tablet before.

9.1.1 What is a tablet? (1)

9.1.2 A tablet has an on-screen keyboard. Explain what this is and how it
works. (2)

Copyright reserved Please turn over


12 COMPUTER APPLICATIONS TECHNOLOGY P2 (NOVEMBER 2014)

9.1.3 Name the operating system in the advertisement as well as ONE


advantage of this type of operating system. (2)

9.1.4 What is the speed of the CPU? (1)

9.1.5 What is the maximum amount of data that can be permanently


stored on this tablet? (1)

9.1.6 What does the term “on-board” indicate with regard to the storage? (1)

9.1.7 Explain what the embedded 3G would be used for and which
technology it would use to accomplish its purpose. (2)

9.1.8 Name ONE advantage of an HDMI connection when compared to a


normal VGA connection. (1)

9.1.9 Name ONE output device to which the tablet can be connected
using the HDMI port. (1)

9.1.10 A dual core processor indicates that the tablet has two CPUs.

Indicate whether you agree with the statement above and motivate
your standpoint. (2)

9.2 The governing body would like to compare the tablets to the laptops currently
being used in the school.

9.2.1 List TWO advantages of tablet computers over laptop computers. (2)

9.2.2 Explain why tablets are seen as examples of convergence. (2)

9.2.3 Tablets use touch screens. Mention TWO advantages of touch


screens. (2)

9.2.4 Besides a touch screen, name TWO ways in which one can input
data to the tablet. (2)

9.2.5 Mention TWO educational advantages of tablets when used by


learners in an educational situation. (2)

9.3 The tablet is bundled with specialised software.

9.3.1 Explain what the line “Full Microsoft Compatible Office Suite”
means. (1)

9.3.2 The tablet uses Android 4.1 software which is open source. What is
open source software? (1)

Copyright reserved Please turn over


(NOVEMBER 2014) COMPUTER APPLICATIONS TECHNOLOGY P2 13

9.3.3 What is meant by the specification “12 Month on-site warranty”?


(1)

9.3.4 What does the ‘MP’ value indicate? (2)

9.4 The tablet has a 7” touch screen.

9.4.1 A touch screen is an output device. Explain how this can also be an
input device. (1)

9.4.2 What size is the display on the device? (1)

9.4.3 List TWO ways in which data can be transferred from a tablet to a
computer. (2)

9.4.4 How would you connect the tablet to a data projector? (1)

9.5 As the tablets will be permanently connected to the Internet, the governing
body is worried about the students accessing social networking sites.

9.5.1 List TWO ways in which the tablet in the advertisement can connect
to the Internet. (2)

9.5.2 List TWO advantages of students using social networking sites. (2)

9.5.3 What is the difference between online harassment and cyber-


bullying? (2)

9.5.4 Name TWO ways in which you can protect yourself while online. (2)

9.5.5 List TWO ways in which students can ensure that the websites they
are using is safe. (2)

9.5.6 The tablets can connect to a hotspot. Explain what a hotspot is and
how this tablet can be connected to the hotspot. (2)

9.5.7 List TWO possible limitations of sending an e-mail from a mobile


device instead of a normal computer. (2)

9.5.8 Mention TWO health risks associated with tablets. (2)

TOTAL SECTION C: 50
GRAND TOTAL: 150

Copyright reserved Please turn over


(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 13
9.3.3 Wat word met die spesifikasie “12-maande op-terrein waarborg”
bedoel? (1)
9.3.4 Wat dui die ‘MP’ waarde aan? (2)
9.4 Die tablet het ʼn 7” raakskerm.
9.4.1 ʼn Raakskerm is ʼn afvoertoestel. Verduidelik hoe dit ook as ʼn
toevoerstel gebruik word. (1)
9.4.2 Wat is die grootte van die skerm op die toestel? (1)
9.4.3 Lys TWEE maniere waarop data vanaf die tablet na ʼn rekenaar
oorgedra kan word. (2)
9.4.4 Hoe sou jy die tablet met ʼn dataprojekteerder verbind? (1)
9.5 Aangesien die tablette permanent met die Internet verbind sal wees, is die
beheerraad bekommerd dat die studente toegang tot sosiale
netwerkwebtuistes het.
9.5.1 Noem TWEE wyse waarop die tablet in die advertensie met die
Internet verbind kan word. (2)
9.5.2 Noem TWEE voordele van die gebruik van sosiale netwerkweb-
tuistes vir studente. (2)
9.5.3 Wat is die verskil tussen aanlynteistering en aanlyn- afknouery? (2)
9.5.4 Noem TWEE maniere waarop jy jouself kan beskerm terwyl jy
aanlyn is. (2)
9.5.5 Noem TWEE maniere waarop studente verseker kan wees dat die
webtuistes wat hulle gebruik veilig is. (2)
9.5.6 Die tablet kan aan ʼn warmkol gekonnekteer word. Verduidelik wat ʼn
warmkol is en hoe die tablet in die advertensie gekonnekteer kan
word. (2)
9.5.7 Noem TWEE moontlike beperkinge verbonde aan die stuur van ʼn e-
pos vanaf ʼn draagbare toestel in plaas van ʼn gewone rekenaar. (2)
9.5.8 Noem TWEE gesondheidsrisiko’s wat aan tablette verbonde is. (2)
TOTAAL AFDELING C: 50
GROOTTOTAAL: 150
Kopiereg voorbehou Blaai om asseblief
12 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
9.1.3 Noem die bedryfstelsel in die advertensie sowel as EEN voordeel
van hierdie tipe bedryfstelsel. (2)
9.1.4 Wat is die spoed van die SVE? (1)
9.1.5 Wat is die maksimum hoeveelheid data wat permanent op hierdie
tablet gestoor kan word? (1)
9.1.6 Wat dui die term “aan-boord” aan met verwysing na die stoorplek? (1)
9.1.7 Verduidelik waarvoor die ingeboude 3G gebruik sou word en watter
tegnologie dit sou gebruik om hierdie doel te verwesenlik. (2)
9.1.8 Noem EEN voordeel van ʼn HDMI konneksie in vergelyking met ʼn
normale VGA-konneksie. (1)
9.1.9 Noem EEN afvoertoestel wat die tablet kan gebruik deur middel van
die HDMI-poort. (1)
9.1.10 ʼn “Dual core” verwerker dui aan dat die tablet twee SVE’s het.
Dui aan of jy saam met hierdie stelling stem en motiveer jou
standpunt. (2)
9.2 Die beheerraad wil die tablette met die skootrekenaars wat tans in die skool
gebruik word, vergelyk.
9.2.1 Noem TWEE voordele van tablette bo skootrekenaars. (2)
9.2.2 Verduidelik waarom tablette as voorbeelde van konvergensie gesien
word. (2)
9.2.3 Tablette gebruik raakskerms. Noem TWEE voordele van
raakskerms. (2)
9.2.4 Behalwe vir ʼn raakskerm, noem nog TWEE maniere waarop data in
ʼn tablet ingelees kan word. (2)
9.2.5 Noem TWEE voordele verbonde aan die gebruik van tablette deur
leerders in ʼn onderwyssituasie. (2)
9.3 Die tablet kom met gespesialiseerde sagteware.
9.3.1 Verduidelik wat die item “Volle Microsoft Aanpasbare
Kantoorpakket” beteken. (1)
9.3.2 Die tablet gebruik Android 4.1 sagteware wat oopbron is. Wat is
oopbron sagteware? (1)
Kopiereg voorbehou Blaai om asseblief
(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 11
AFDELING C
VRAAG 9: GEÏNTEGREERDE SCENARIO
SCENARIO
Die skool se IKT komitee het aanbeveel dat die skool tablette vir die graad 12
leerders koop. Die tablette sal gebruik word vir onderwysdoelwitte soos om toegang
tot e-boeke te verkry. Jy moet die skool om ʼn met die besluit help.
ʼn Plaaslike winkel het die volgende advertensie deurgegee.
Netsurfer SCHOLAR Tablet
Volle voorafgelaaide leerplan
 7” TFT Kleur LCD
vir die SA NCS
 Android 4.1
 Ingeboude 3G
 148 Ure / 6 GB vooraf-
 16 GB Aanboord stoorplek
gelaaide Nasionale
 1 GB Geheue
Kurrikulum inhoud.
 Wi-Fi , Bluetooth en GPS
 Geen Internet aflaai benodig
 Volle Microsoft Aanpasbare
 Graad 10 & 11 Wiskunde
Kantoorpakket
 Graad 10 & 11 Fisiese
 Dual core 1.5 GHz
Wetenskappe
 Voorkant kamera 2.0MP
 Graad 11 & 12 Fisika en
 HDMI poort
Chemie eksperimente
 12 Maande op-terrein
 Eksamen video’s – vrae en
waarborg
oplossings
 Gratis: Oortreksel, oorfone
en geheuekaart
R2 999.00
9.1 Baie lede van die beheerraad het nog nooit ʼn tablet gebruik nie.
9.1.1 Wat is ʼn tablet? (1)
9.1.2 ʼn Tablet het ʼn op-skerm sleutelbord. Verduidelik wat dit is en hoe dit
werk. (2)
Kopiereg voorbehou Blaai om asseblief
10 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
8.4 Besonderhede van leerders in ʼn skool kan in ʼn databasis soos die volgende
gestoor word:
Van Geslag Selnommer Geboortedatum Tuisdorp
Jabu M 0823265242 1981/01/11 East London
King V 0822512422 1991/01/12 Queenstown
Augustine V 0832652123 1989/01/11 Queenstown
Jeremy V 0820233333 1992/01/10 Mt Frere
8.4.1 Watter EEN van die 5 velde sou vir ʼn bestekwaarde gepas wees? (1)
8.4.2 Watter tegniek kan toegepas word om te verseker dat net ʼn M of ʼn
V in die Geslag veld ingelees kan word? (1)
8.4.3 Watter datatipe en veldgrootte is in die Selnommer veld gebruik? (2)
8.4.4 Watter datatipe kan gebruik word in die Tuisdorp veld om
verbruikers toe te laat om net van ʼn bepaalde lys opsies te kan
kies? (1)
8.5 Verslae laat besighede toe om data in ʼn formaat te druk wat makliker is om
te lees en te verstaan.
8.5.1 Watter funksie sou jy gebruik om die totale hoeveelheid rekords in
ʼn verslag te wys? (1)
8.5.2 Waar sou jy die funksie in VRAAG 8.5.1 plaas om te verseker dat
die korrekte bedrag bereken word? (1)
8.5.3 Waarvoor sou jy die groepeer funksie in ʼn verslag gebruik? (1)
[15]
TOTAAL AFDELING B: 75
Kopiereg voorbehou Blaai om asseblief
(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 9
VRAAG 7: SOSIALE IMPLIKASIES
7.1 IKT het beide ʼn positiewe en ʼn negatiewe impak op die besigheidswêreld.
Noem TWEE moontlike negatiewe effekte. (2)
7.2 Noem TWEE maniere waarop ʼn mens die moontlikheid van rekenaar-
verwante gesondheidsrisiko’s kan verminder. (2)
7.3 ʼn AUP word gebruik om verbruikers in kennis te stel van wat hulle mag en
nie mag doen op ʼn netwerk en/of ʼn rekenaars nie. Noem TWEE moontlike
items wat in jou skool netwerk se AUP ingesluit mag word. (2)
7.4 Noem TWEE maniere waarop die administrateur van ʼn netwerk die
sekuriteit van data kan beskerm. (2)
7.5 Verduidelik kortliks wat kwaadwillige sagteware is. (1)
7.6 Noem EEN voorbeeld van kwaadwillige sagteware wat word met
e-pos verbind. (1)
[10]
VRAAG 8: OPLOSSINGONTWIKKELING
8.1 Waarvoor sou elk van die volgende funksies word in ʼn sigblad gebruik?
8.1.1 CONCATENATE (1)
8.1.2 Die AND funksie (1)
8.2 ʼn Woordverwerker is een van die mees algemene-gebruikte programme in
ʼn besigheid.
8.2.1 Watter lêerformaat sou jy gebruik om te verhoed dat enige
veranderinge op ʼn dokument aangebring word? (1)
8.2.2 Watter funksie sou jy gebruik om seker te maak van eenvormige
formatering van opskrifte in ʼn dokument? (1)
8.2.3 Watter funksie sou jy gebruik om direk na ʼn spesifieke punt in ʼn
dokument te gaan? (1)
8.3 Noem TWEE redes hoekom jy ʼn databasis in plaas van ʼn sigblad vir groot
hoeveelhede data sou gebruik. (2)
Kopiereg voorbehou Blaai om asseblief
8 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
VRAAG 6: INLIGTINGBESTUUR
Bestuur van inligting is ʼn belangrike aspek van die besigheidswêreld.
6.1 ʼn Goed deurdagte taakdefinisie is baie belangrik vir ʼn navorsingsprojek.
6.1.1 Wat is ʼn taakdefinisie? (1)
6.1.2 Hoekom is dit belangrik om die taakdefinisie in jou eie woorde uit
te druk? (1)
6.2 Die belangrikste deel van navorsing is om die regte vrae te vra.
6.2.1 Wat is ʼn oop vraag? (1)
6.2.2 Hoekom is dit nie ʼn goeie idee om oop vrae in ʼn opname
(‘survey’) te gebruik nie? (1)
6.3 Uitvoer van data is ʼn belangrike funksie in dataverwerking.
6.3.1 Verduidelik die betekenis van die term afvoer van data deur na ʼn
gepaste voorbeeld te verwys. (2)
6.3.2 Wat is ʼn CSV lêer? (1)
6.3.3 Verduidelik, deur verwysing na die term ‘delimiter’, hoe ʼn CSV
lêer sy doel bereik. (2)
6.4 Verduidelik wat ʼn bylaag is soos gebruik in ʼn navorsingsprojek. (1)
[10]
Kopiereg voorbehou Blaai om asseblief
(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 7
4.4 Sagteware is ʼn integrale deel van enige rekenaarstelsel.
4.4.1 Wat is die verskil tussen ʼn sagtewarefout en sagteware
regstelling? (2)
4.4.2 Sagteware kan aan- of aflyn opgedateer. Noem EEN voorbeeld
van waar aflynopdatering gedoen sal word. (1)
4.4.3 Wat word bedoel met die term aanpasbaarheid met verwysing
na sagteware wat op ʼn rekenaar geïnstalleer word? (1)
4.4.4 Noem TWEE sagteware eienskappe op hededaagse
bedryfstelsels wat bruikbaarheid vir fisiese gestremde
verbruikers kan verhoog. (2)
[25]
VRAAG 5: INTERNET- EN NETWERKTEGNOLOGIEЁ
5.1 Definieer die term rekenaarnetwerk. (1)
5.2 Lys TWEE tipes hulpbronne wat oor ʼn netwerk gedeel kan word. (2)
5.3 Rekenaars kan in ʼn gebou word aan ʼn netwerk gekoppel.
5.3.1 Verduidelik wat die term kliënt beteken in terme van ʼn LAN. (1)
5.3.2 Wat is ʼn bediener? (1)
5.3.3 Wat is die verskil in rol tussen ʼn ‘proxy’ bediener en ʼn
lêerbediener? (2)
5.3.4 Noem TWEE kategorieë van media wat vir die oordra van data
in ʼn netwerk gebruik word. (2)
5.3.5 Noem TWEE voordele van die gebruik van ʼn WLAN. (2)
5.3.6 Wat is die funksie van ʼn roeteerder in ʼn netwerk? (1)
5.4 Baie besighede en universiteite maak van ʼn intranet gebruik.
5.4.1 Wat is ʼn intranet? (1)
5.4.2 Noem TWEE voordele van ʼn intranet. (2)
[15]
Kopiereg voorbehou Blaai om asseblief
6 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
AFDELING B
VRAAG 4: STELSELTEGNOLOGIE
4.1 Data op rekenaars kan vasgelê word deur middel van ʼn verskeidenheid
toevoertoestelle.
4.1.1 Lys TWEE voordele van aftasters. (2)
4.1.2 Definieer die term biometriese toevoer. (1)
4.1.3 Lys TWEE nadele van biometriese toevoer. (2)
4.1.4 Noem TWEE voorbeelde van toevoertoestelle vir
visueelgestremde verbruikers. (2)
4.1.5 Raakskerms het as toevoertoestel op draagbare toestelle baie
gewild geword. Noem TWEE moontlike redes hiervoor. (2)
4.2 ʼn Interaktiewe witbord is ʼn gewilde toestel vir gebruik in ʼn klaskamer.
4.2.1 Wat is ʼn interaktiewe witbord? (1)
4.2.2 Noem TWEE voordele van die gebruik van ʼn interaktiewe witbord. (2)
4.2.3 Noem TWEE afvoertoestelle wat gewoonlik ʼn DPI spesifikasie
het. (2)
4.3 Stoorplek is baie belangrik met betrekking tot rekenaargebruik.
4.3.1 Wat is die funksie van primêre geheue? (1)
4.3.2 Hoekom sou rekenaargebruikers meer sekondêre geheue as
primêre geheue benodig? (1)
4.3.3 Rugsteune moet weg van ʼn rekenaarlokaal gestoor word.
Hoekom is dit belangrik? (1)
4.3.4 Sommige mense verkies om data aanlyn te stoor. Lys TWEE
voordele van aanlynstoorplek. (2)
Kopiereg voorbehou Blaai om asseblief
(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 5
2.7 Watter EEN van die volgende is normaalweg NIE ʼn eienskap van slimfone NIE?
A Koordlose konnektiwiteit
B Programmeerbaarheid
C Sinkroniseer PIM data met PR
D Al die bogenoemde word gewoonlik op slimfone gevind (1)
2.8 Watter EEN van die volgende sou die mees effektiewe toestel wees om groot
hoeveelhede syfers in te lees?
A Virtuele sleutelbord
B Numeriese sleutelbord
C Muis
D Sakrekenaar (1)
2.9 Watter EEN van die volgende verwys na die verbruik van materiaal en
hulpbronne sonder die erkenning van die oorspronklike outeurs?
A Datadiefstal
B Identiteitsdiefstal
C Roofkopiëring
D Plagiaat (1)
2.10 Watter EEN van die volgende stellings rakende ʼn brandmuur is WAAR?
A ʼn Brandmuur verhoed roofkopiëring.
B Brandmuur sagteware moet daagliks opgedateer word.
C ʼn Brandmuur monitor kommunikasie tussen jou rekenaar en die Internet.
D ʼn Brandmuur is nie nodig nie indien jy ʼn Internetkonneksie het. (1)
[10]
VRAAG 3: VERANDERDE WAAR/ONWAAR
Dui aan of die volgende stellings WAAR of ONWAAR is. Herskryf die stellings wat
ONWAAR is, om dit WAAR te maak deur NET die woord/frase wat onderstreep is te
vervang. (Jy mag NIE net die woord NIE gebruik om die stelling se doel te wysig nie.)
3.1 RSS is sagteware wat ʼn verbruiker toelaat op webblaaie oop te maak en te
vertoon.
3.2 ʼn Werkstasie is ʼn rekenaarstelsel of toestel wat gebruik word om waardes van
verkope by ʼn kontrolepunt te bereken.
3.3 Zipping is ʼn manier om datalêers saam te pers.
3.4 Die datatipe van ʼn lêer word deur 3 of 4 letters agteraan die lêernaam aangedui.
3.5 ʼn Opskrif (‘Caption’) is ʼn kort lyntjie teks wat gebruik word om ʼn prentjie of
illustrasie te beskryf in ʼn dokument. [8]
TOTAAL AFDELING A: 25
Kopiereg voorbehou Blaai om asseblief
4 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
VRAAG 2: MEERVOUDIGEKEUSE-VRAE
Verskeie opsies word as moontlike antwoorde vir die volgende vrae gegee. Kies die
gepaste antwoord en skryf slegs die letter (A–D) langs die vraagnommer (2.1–2.10)
in die ANTWOORDEBOEK neer, byvoorbeeld 2.11 D.
2.1 Watter EEN van die volgende lêeruitbreidings word met klank verbind?
A .exe
B .mp3
C .jpeg
D .pdf (1)
2.2 Term wat gebruik word om ʼn fout in rekenaarprogrammering aan te dui.
A Rekenaarvirus
B Spioenware
C Sagteware regstelling
D Sagtewarefout (1)
2.3 Watter EEN van die volgende is NIE ʼn lêereienskap NIE?
A Argief
B Saamgepers
C Versteek
D Leesalleen (1)
2.4 Internet Explorer, Firefox en Google Chrome is voorbeelde van …
A soekenjins.
B webdeurblaaiers.
C webouteur programme.
D kletskamers. (1)
2.5 Watter EEN van die volgende pas NIE logies by die ander NIE?
A ‘Voice over Internet Protocol’
B Spraakherkenning
C Teks-na-spraak
D Skermleser (1)
2.6 ʼn Datatipe in ʼn databasis wat groot hoeveelhede teks kan stoor.
A Hiperskakel
B Memo
C Text
D OLE (1)
Kopiereg voorbehou Blaai om asseblief
(NOVEMBER 2014) REKENAARTOEPASSINGSTEGNOLOGIE V2 3
AFDELING A
VRAAG 1: PASITEMS
Kies ʼn term/begrip uit KOLOM B om by die beskrywing in KOLOM A te pas. Skryf
slegs die letter (A–Q) langs die vraagnommer (1.1–1.7) in die ANTWOORDEBOEK
neer, byvoorbeeld 1.8 S.
KOLOM A KOLOM B
1.1 ʼn Afkorting wat aandui dat onakkurate data A Groenrekenarisering
toevoer tot onakkurate afvoer lei
1.2 ʼn Gewilde draagbare, koordlose toestel B Digitale skeiding
ontwerp om verbruikers van ʼn platvorm te
voorsien vir telefoonoproepe, e-pos,
teksboodskappe en Internettoegang
1.3 ʼn Toestel wat as beide ʼn toevoer-en afvoer- C PDA
toestel kan dien
1.4 ʼn Toevoerapparaat wat gebruik word om D Onderwerp
lewendige beelde oor die Internet te stuur per
webbediener
1.5 ʼn Voorbeeld van ʼn soekenjin E IDV
1.6 ʼn Opsie wanneer ʼn e-pos opgestel word wat F Cc
toelaat dat e-pos gestuur word aan
ontvangers sonder dat die e-pos adres
sigbaar aan al die ontvangers van die
boodskap is
1.7 ʼn Konsep wat gewoonlik met ʼn papierlose G Slimfoon
kantoor assosieer word
H IDSL
I Raakskerm
J Yahoo
K GIGO prinsiep
L Digitale kamera
M Webkamera
N Bcc
O Ergonomie
P Bewaring
Q WYSIWYG
(7 x 1) [7]
Kopiereg voorbehou Blaai om asseblief
2 REKENAARTOEPASSINGSTEGNOLOGIE V2 (NOVEMBER 2014)
INSTRUKSIES EN INLIGTING
1. Hierdie vraestel bestaan uit:
AFDELING A (25 punte)
AFDELING B (75 punte)
AFDELING C (50 punte)
2. Beantwoord AL die vrae.
3. Nommer die antwoorde volgens die nommeringstelsel soos gebruik in die
vraestel.
4. Begin ELKE vraag op ʼn nuwe bladsy.
5. Los ʼn lyn oop na elke vraag.
6. Let op dat daar gewoonlik EEN punt per feit toegeken word. ʼn Vraag wat 2
punte tel moet dus beantwoord word met twee feite, ens.
7. Skryf netjies en leesbaar.
Kopiereg voorbehou Blaai om asseblief
NASIONALE
SENIOR SERTIFIKAAT
GRAAD 11
NOVEMBER 2014
REKENAARTOEPASSINGSTEGNOLOGIE V2
PUNTE: 150
TYD: 3 uur
*ICATDM2*
Hierdie vraestel bestaan uit 13 bladsye.

You might also like