Grade 12 - Theory Help
Grade 12 - Theory Help
THEORY REVISION
GRADE 12 – 10
GRADE 12
PAPER 1
SECTION 1
1. Choose a term/concept that matches the description in COLUMN A. Write only the letter next to the question
number. (10)
K BOYD
L Phishing
M Shareware
N F3
O GPS
P Ergonomics
Q Paint
R Plug-in
S txt
2
Choose the correct answer and write only the letter (A-D) next to the question number.
2.1 Which ONE of the following types of files is likely to contain hyperlinks? (C)
A. .bmp
B..exe
C..html
D. .avi
2.2 Which ONE of the following chart types is most appropriate for displaying the changes in temperature over a month
in Johannesburg? (B)
A. A pie chart
B. A line chart
C. A scatter chart
D. A bubble chart
2.3 In a spreadsheet, the following values have been assigned to cells A1-A3: A1=3, A2=6 an A3=9. The following
formula is typed into Cell A4: =SUM(A1:A3)/B1. What will appear in Cell A4? (C)
A. #NUM
B. 0
C. #DIV/0!
D. 18
2.4 Which ONE of the following is NOT an example of online storage. (B)
A. Google Drive
B. OLX
C. Sky Drive
D. Dropbox
2.5 A process whereby one can speed up disk access by rearranging the files on the hard disk of a computer
called……… (A)
A. disc cleanup
B. defragmentation
C. spooling
D. compression
2.6 Which ONE of the following wireless communication technologies has the shortest reach? (A)
A. Wi-Fi
B. LTE
C. 3G
D. Bluetooth
2.7 Which ONE of the following refers to software that is designed to fix bugs and provide new features for existing
software? (A)
A. Updates
B. Drivers
C.Virus definitions
D. Wizards
2.8 Which ONE of the following refers to a type of website that allows users to work together to create, add, delete or
modify the content? (B)
A. Webinar
B. Wiki
C. RSS feed
D. Podcast
2.9 Which ONE of the following ports is the best choice to use to download videos from a video camera to a PC? (D)
A. PS2
B. USB
C. Parallel
D. Firewire
3
2.10 Which ONE of the following is NOT directly associated with Spreadsheets? (A)
A. Input Mask
B. Cell
C. Worksheet
D.Absolute cell addressing.
3.1 A PDA is a smaller version of a tablet which also incorporates features found on smartphones, such as voice calls
and SMS’s.
False Phablet
3.2 Bandwidth provides always-on, high speed Internet connection and is ideal for fast downloads of software, photos,
videos and music.
False Broadband
3.3 RSS is a web feed that automatically provides users with updated content.
True
3.4 Grid computing refers to the sharing of resources such as programs and data storage offered as a service over the
Internet.
False Cloud computing
3.5 A hotspot is a wireless network technology used for connecting computers to a wireless network or to the Internet.
True
SECTION B
4. SYSTEM TECHNOLOGIES
4.1 The School Management Team wishes to buy computers for the computer lab at the hostel.
4.1.1 You suggest that the buy LED monitors. Motivate your answer. (2)
Takes up less desk space.
Uses less electricity.
Good image/high resolution.
Available in larger sizes.
Additional ports.
High contrast ratio.
4.1.2 Some suggest that they also buy a graphics card. What is the function of a graphics card? (1)
Graphics cards allow computers to produce graphics and images more quickly.
4.2 The School Management Team has to choose between buying cabled or wireless keyboards and mice name two
disadvantages of wireless devices. (2)
Require batteries, more expensive, can easily be removed/stolen, signal strength can be affected by electri-
cal sources (interference).
4.3 The management team wants to make use of biometric input to control access to the computer laboratory.
4.3.2 Name TWO methods of biometric input they could consider. (2)
Voice recognition, fingerprint recognition, iris recognition, retina scanning, signature verification.
4
4.3.3 Discuss TWO disadvantages of using biometric input for access control. (2)
Voice recognition will not work if you have flu or a cold that affects your voice.
Diabetes may affect your eyes and result in inaccurate iris scanning.
Cuts or burns to your fingers, hands or face may result in identification process not working.
Biometric devices are expensive.
4.4.1 State TWO ways (besides cloud storage) in which you could save hard drive space on your computer. (2)
Save on external storage.
Zip/compress large files.
Change pictures to jpeg files.
Delete unwanted files.
Delete duplicate files.
Uninstall unwanted programs.
4.5 The Management Team is interested in exploring ways in which physically challenged learners can have access to
computers in the laboratory.
4.5.1 Explain how a speech recognition program can be used to assist physically challenged (disabled) learners.(1)
Learners who cannot use their hands properly can use the speech recognition program to convert speech
to text.
Visually impaired learners can use speech recognition to give commands to the computer.
Visually impaired learners can use speech recognition to convert speech to text.
4.5.2 Name any ONE hardware device that can be acquired to assist the visually impaired (blind) learners in the hostel.
(1)
Braille keyboards/braille “display”.
Magnifying devices.
Large keyboards.
Braille printers.
4.6 In order for a computer to function it needs an operating system and application software.
4.6.3 Name TWO software related problems that could reduce the speed of the computer. (2)
Too many background programs.
Computer may be infected by malware/virus.
Too many programs open at the same time.
A defective application.
Software updates being automatically downloaded.
5.3 A computer shop offered your school the following package to connect to the Internet using ADSL.
4 Mbps/512 kbps uncapped ADSL
5 hours free Wi-Fi per month at more than 500 hotspots
5 GB Cloud storage account
5.3.1 Explain what the term uncapped refers to in the specification (1)
Uncapped means that there is no limit on the amount of data that can be downloaded or uploaded.
5.3.2 Why is video-conferencing and expensive method of communication if you to not have an uncapped Internet
connection? (1)
Video conferencing takes up a lot of cap (data bundles) because it makes use of video technology.
5.5 When computers are connected to the Internet, it increases the chances of security problems e.g. pop-ups.
5.6.1 State TWO advantages of Internet banking compared to conventional banking. (2)
Do not have to stand in queues/saves time.
Have access whenever you are on-line/24/7.
Do not have to carry large amounts of money around.
Keep track of your accounts.
Cuts down on travelling/transport costs.
Usually cheaper bank charges.
Safer as you do not have to go to the bank.
5.6.2 Name ONE way in which banks can protect their clients when they use online banking. (1)
Use of once-off/per session passwords sent to specified cellphone numbers.
Automatically logging off after a fixed time period.
Passwords/Pin numbers
SMS notification of transactions
Secure protocols such as SSL.
On-screen keypads for entering pin numbers.
5.7 Caching is one of the features that help us to use the Web more efficiently.
5.7.2 Give TWO main reasons for using web cache. (2)
Reduces bandwidth usage
Allow previous visited pages or data used to load quicker.
6. INFORMATION MANAGEMENT
6.1.1 Name TWO advantages of using online surveys to gather information. (2)
Faster than collecting by manual means.
Cheaper – you can save on research costs.
More accurate as responses go directly into the system.
Quick to analyse
Easier for researchers to manipulate data.
More honest responses.
More flexible as the order of the questions can easily be changed.
6.1.2 Name the application software that is best suited to process data obtained from a survey. Motivate your answer.
(2)
Spreadsheet can be used to do calculations/create graphs.
Database to extract information via queries.
6.4 Name ONE popular style according to which your bibliography can be formatted. (1)
APA
Harvard
6.5 One of the learners visited a website to gather information for an assignment.
Give TWO tips on how to check that information sourced from the Internet is in fact correct and reliable. (2)
Check the information against more than one source and cross-reference them to see whether the information can be
substantiated.
Check the bibliography or other references where you can access other sources that support the information.
What is possibly missing from the source?
Check that the information is free of errors – sources that have spelling and grammar mistakes might be inaccurate in
other ways as well.
Check whether the source ties in with what you already know.
How often has the information been used?
7
7. SOCIAL IMPLICATIONS
7.1 Phishing attempts are not limited to e-mail or the Internet. They are also sent as messages to cellphones.
7.1.2 State TWO ways in which you would recognise a phishing attempt. (2)
There may be spelling errors in the message
The e-mail may be sent from a web address other than the expected one
The message would ask you to follow a link and then enter sensitive information
Will ask to confirm confidential details such as passwords etc.
Inspect the properties of any links.
7.4 Explain how the following types of computer crime is, committed:
7.5 Although technology can benefit society in many ways, it can also be harmful to society.
Name TWO ways (other than criminal activities) in which technology can have a negative effect of society.(2)
Can reduce the personal and social interaction between people.
People may become less physically active which could lead to obesity and ill-health
The overuse of technology may cause physical harm to people, e.g. RSI.
Technology processes may result in unwanted by-products that pollute the environment.
E-waste can harm the environment.
People can use Internet for harmful research
8. SOLUTION DEVELOPMENT
8.1 Re-write the HTML code segment below to correct it: (1)
h1>Computer Application Technology<h>
<h1>Computer Application Technology</h1>
8.2 Rewrite the error-free HTML code below to solve the problem that will occur when it is executed in a browser.
(1)
<body bgcolor=”black”>
<body bgcolor=”blue’> (any colour except black can be accepted)
8
8.3 Study the extract from the spreadsheet below and answer the questions that follow:
A B C D E F
1 Test Results
2 Surname Name Class Test 1 Test 2 Total
3 100 100 200
4 King James 12A 60 45 105
5 NgQukumba Sizwe 12B 12 62 74
6 Nkonzo Likho 12B 15 24 39
7 Esel Evelina 12A 23 14 37
8 Barnes Jeff 12A 45 84 129
8.3.1 Suggest ONE way in which the names of the learners in Grade 12A can be extracted without copying each name
individually. (1)
Sort or filter according to class.
8.3.2 The teacher needs to have the same information which appears in the spreadsheet, in a database application.
Which feature of an office package can he use to achieve this? (1)
Import from (Get external data).
8.3.3 Why is the SUMIF function not suitable for determining the number of learners in the 12B class? (1)
Because SUMIF ADDS together and a function to COUNT is needed to determine the number of learners in
12B.
8.3.4 Which spreadsheet feature could be used to show values in Column D, that are greater than 15, in a particular
colour? (1)
Conditional formatting
8.4 One of the learners cannot open a file that he received as an attachment to an e-mail.
Name TWO ways in which he may be able to open the document. (2)
Save in an earlier/lower version
Open on a PC that has the correct software installed
Download and install a patch
Try opening in another program, e.g. Open Office.
8.5 Name ONE way advantage of working with “Styles” when creating a document in Word. (1)
Consistency - everything looks the same
Easier/faster/convenient to format
Automatic table of contents
8.6 Some of the learners are puzzled when they have to wait a few minutes before their documents are printed. The
concept of printer spooling is explained to them. (1)
Cancel print jobs
Restart a print job
Pause a print job
Change the order in which print jobs are handled.
8.7 One of the learners discovered that the word processing program has a feature that automatically allows you to add
captions to pictures, graphs or tables.
Give TWO reasons, other than saving time, why it is better to use this feature than to do it manually. (2)
Captions are always consistently positioned.
The format of the captions is always consistent.
Captions will update when any relevant change is made in the document.
Will show in any table of figures/graphs/tables.
Captions are automatically numbered consecutively.
8.8 The teachers are inputting their marks (as percentages) into a database. It is noticed that some teachers are enter-
ing marks that are higher than 100.
9
8.8.1 Explain how a validation rule could be used to ensure that teachers enter only marks between 0 and 100. (Includ-
ing 0 and 100) in the database.
Give the actual validation rule you would use as part of your answer. (2)
A validation rule can be added to specific field that restricts values of more than 100.
Validation rule: >=0 and <=100
8.8.2 Which database feature could be used to ensure that teachers do not leave a mark “blank”? (1)
Required property.
Study the following implications for a desktop and a laptop computer and answer the questions that follow below:
COMPUTER A COMPUTER B
Intel Pentium Dual Core G2020 CPU HP 250 F7X46EA 15.6”
Intel Core i3 Notebook
Intel H16 Motherboard
Dual CoreG2020 2.9 GHz CPU
I3-3110m 2.4GHz CPU
2 GB DDR3 RAM
15.6 HD LCD Screen
I TB SATA3 HDD 4 GB RAM
Intel 512 MB Graphics 500 GB HDD
24x DVD +/- Writer Windows 8.1 Pro
Integrated 8 Channel Sound Integrated 3.2 MP Webcam
9.1 The School Management Team has to decide whether to purchase desktop computers or laptops.
9.1.3 Name TWO hardware components from the advertisements that play a significant role in the overall performance of
the computer. (2)
RAM
CPU
HDD
10
9.3 The Management Team needs to make a choice regarding software that is needed for the lab.
9.3.1 Why would you recommend that they buy an office suite rather than stand-alone applications? (2)
Can integrate between the different applications
Interface is standardised across the different applications
Functions are standardised across the programs
Cost – cheaper to purchase and office suite
Easier to manage updates.
9.3.2 The Management Team does not understand how licencing of software works.
Advise them by briefly explaining to them what type of licence they should buy in order to use the software in the
lab. Motivate your answer. (2)
Site licence – software can be installed in a number of computers, as long as the computers are owned by
the same company.
9.4 Proprietary software is very expensive so, the Management Team decided to investigate the use of free open source
software.
9.4.1 Mention TWO advantages (other than costs) of using free open source software. (2)
Has no copyright restrictions
Has no restriction as to the number of computers it can be used on
Source code is available for free and may be edited
May be distributed in a changed form, subject to the original licence agreement terms.
9.5 The Management Team also bought a new printer for the learners to print their assignments. When the first learner
wanted to print, as message appeared that said the printer driver could not be found.
9.5.2 Suggest TWO places where they could find the driver. (2)
On the disk that came with the printer
Supplied as part of driver database in the operating system
Download driver from the Internet.
9.6 During the process of installing the software an activation code was required.
9.6.2 Name TWO reasons why developers of software use activation codes. (2)
To ensure that the program is loaded only on the number of computers specified on the licence
Reduce piracy/certify that the program is an original copy/increase security
To link the copy of software to you
To register you as user to enable help and online support
9.6.3 When installing the software the learners were confronted with an option of a typical, custom or full type of installa-
tion.
Distinguish between a typical and custom installation. (2)
Custom installation allows more experienced users to choose the components of the program that must be
installed.
Typical installation contains the options and components of the software that most people want.
9.7 After a go-green campaign launched by the land service club of the school, the learners decided to go-green in the
computer lab as well.
9.7.1 State TWO ways in which the learners can reduce printing in order to save paper. (2)
Use print preview before printing
Print on both sides of the paper
Change document formatting, for example, smaller font size/reduce margin size
Print two or more pages to one sheet
Communicate/Save electronically
9.7.2 State TWO ways in which they can save on electricity. (2)
By switching computers off when not in use
Use energy saving devices e.g. LED screens
9.8 A parent of one of the learners donate an SSD for each computer in the Lab.
9.8.1 Name TWO reasons why added SSD’s to the computers will benefit the learners. (2)
They are much faster than normal hard drives.
The cannot be damaged easily/No moving parts/Durable
Energy efficient
They run quieter than traditional hard drives.
9.9 After losing some of their work as a result of loadshedding, the learners soon realise how important it is to back-up
their folders.
9.9.1 Name TWO important practices that should be part of a back-up policy. (2)
Use software that updates automatically.
Backup data only, not programs
Use external storage medium (external hard drive)
Keep backup in other location in case of theft, fire.
Do maintenance of data to have no unnecessary duplicates.
Archive large files not used often.
Check that backup works by opening backed up files once in a while.
9.9. Which storage device is the most suitable for back-ups? (1)
External hard drive
DVD
Flash drives
Blue ray disks
CD
9.10 One of the learners downloaded a bursary application form in PDF format.
9.10.1 Name TWO reasons why electronic documents are often distributed in PDF format. (2)
You do not need the program in which the document was created to open it.
The program required to read these documents is free/widely available
12
9.11 The learners soon realise that viruses and malware are a big concern, especially in a network environment.
It seems that even the anti-virus program that they installed 3 years ago is not effective anymore.
9.11.1 Explain to them why it is necessary to update your anti-virus program regularly by explaining how this software
works. (2)
An anti-virus program is a database with unique virus definitions. The anti-virus software detects the vi-
rus by comparing it to its database of definitions.
9.11.2 One of the teachers feels that computers will not get affected by viruses if they are not connected to the Internet.
Do you agree? Motivate your answer. (2)
No, viruses can install themselves on systems via any portable storage media.
9.11.3 Name TWO tips on how to prevent computers from being infected by viruses (other than the installing and updat-
ing of anti-virus software). (2)
Disable “auto run” features for flash drives
Scan all portable storage media before using them.
Do not open attachments from unknown sources.
Do not interact with/click on pop-ups that appear on the screen.
9.11.4 After a scan, the antivirus program displays a message saying that a virus was detected and quarantined.
Explain what if means when a virus is quarantined. (1)
The virus is moved into an area where it cannot cause harm.
9.12 One of the advantages of having a computer lab at the hostel is that learners can communicate easily with learn-
ers in other school via social networking websites.
_____________________________________________________________________________________
13
PAPER 2
SECTION A
1. Write down only the number of the description from Column A, and next to it the correct matching capital letter from
Column B. (10)
6. An address used to identify resources such as web pages on the internet. F DoS R
7. A file type that includes both audio and video content. G OMR M
L Rule
M MP4
N QR
O VGA
P Thread
Q HTML
R URL
S Biometric
14
2.1 Importing refers to saving data in a format that can be read by a different version of the same software or even a
completely different program.
False – exporting
2.2 Pharming refers to when users are tricked into clicking on an item on a web page which acts as a concealed link.
False – Click-jacking
2.4 Archiving is the process whereby browsers temporarily store web pages on a hard drive so they can be loaded more
quickly in the future.
False – caching
2.5 The FIND spreadsheet can be used to determine the position of a substring within a string.
True
3. Identify the correct answer for each question. Write down only the number of each question, and next to it the single
capital letter that represents the best answer. (10)
3.1 Which of the following terms is NOT directly associated with software?(D)
A. GUI
B. EULA
C. FOSS
D. SOHO
3.2 Which one of the following is a technology that uses tiny radio devices to store and send data?(A)
A. RFID
B. LTE
C. MICR
D. FTP
3.3 Which one of the following types of networks is generally associated with the use of Bluetooth and USB cables?(D)
A. LAN
B. HAN
C. WAN
D. PAN
3.4 Which one of the following statements about cloud computing is FALSE?(B)
A. You can ‘rent’ a virtual server from a company like Amazon.
B. You need to download the software to access the resources.
C. You can work with other users on the same document at the same time.
D. You need to have a good Internet connection to use cloud computing effectively.
3.5 Which one of the following is NOT a consideration when buying a printer?(A)
A. Contrast ration
B. System compatibility
C. Monthly duty cycle
D. Wireless capacity.
3.6 Which one of the following fields in a database table is suitable to act as a primary key?(D)
A. Field 1
B. Field 2
C. Field 3
D. None of the above
3.7 Which one of the following differences between SSDs (Solid State Drives) and traditional (mechanical) hard drives
is false?(D)
A. SSDs are faster than traditional hard drives
B. SSDs have no moving parts
C. SSDs run quieter than traditional hard drives
D. SSDs use more power than traditional hard drives
3.8 Which one of the following keystroke combinations will activate a menu option given as: File?(A)
A. <Alt><F>
B. <Ctrl><F>
C. <Esc><F>
D. <Shift><F>
3.9 Which one of the following spreadsheet calculations could result in the error message #DIV/0! being displayed.(B)
A. =SUM(A1:A7)
B. =A2/B3
C. =A3*AA5
D. =COUNTIF(B3:D4,0)
3.10 Which one of the following components might have a specification ‘Response time 5 ms’? (D)
A. Keyboard
B. Hard drive
C. Mouse
D. Monitor
4. SYSTEM TECHNOLOGIES
4.1 Consider the following specifications for a typical smartphone and answer the questions that follow below:
4.1.2 What is the 802.11 technology listed in the specifications better known as? (1)
WiFi
4.1.4 Briefly describe the significance for function of the NFC specification. (2)
Allows devices (e.g. smartphones) to connect wirelessly
4.1.5 Give the general name for programs that can be downloaded and installed on a smartphone. (1)
Apps
4.2 Consider the following advert and specifications for a computer and answer the questions that follow:
A
Plus FREE Gamepad
4.2.1 What component and what specification of the component does the specification 2.7 GHZ refer to? (2)
Component = Central Processing Unit (CPU)
Specification = speed
4.2.3 Give TWO general differences between memory and storage, apart from their different capacities. (2)
Memory (RAM) is volatile/needs power; storage is non-volatile/does not need power (or memory is tem-
porary storage while the computer is on, while storage is long-term even when computer is off).
Memory is faster than storage
Memory is always/only electronic; storage can be magnetic/optical/electronic
Memory is more expensive (per unit) than storage
Memory is always internal (DIMM on motherboard; storage = internal OR external
4.2.4 What component does the ‘HDMI’ specification refer to? (You may also give an example of what this component
could be used for). (1)
Port used to connect computer to a monitor/TV screen
4.2.5 Give an example of system software in the advert, besides the operating system. (1)
Kaspersky Anti-Virus 2015
4.2.6 Give the most likely connection port used to connect the external DVD-Writer to the computer. (1)
USB
4.2.8 Give ONE specification in the advert that indicates that this is probably a portable computer. (1)
15.6” Display (not a standard screen size for desktop computers)
WiFi3G (not usually included in desktop computers)
Webcam (not traditionally found in desktop monitors, but note that some desktop monitors DO have in-
tegrated webcam)
Battery
4.2.10 Briefly explain, with reference to the advertisement, why this gamepad can be described as both and input and
output device. (2)
Used for input e.g. buttons/controls that need to be pressed/manipulated and also provides output
(Vibration Feedback)
4.2.11 Name the device or technology that would be used to connect the gamepad to the computer. (1)
Bluetooth
4.4 Give ONE way in which a user can improve the general performance of a computer, without adding or changing
any hardware items? (1)
Stop/close unnecessary programs
Defragment the hard drive.
5.1 Consider the following features of an ADSL Internet connection package and answer the questions that follow:
5.1.1 Give the term generally used to describe the maximum monthly data usage (in this case 20 GB) (1)
Cap
5.1.2 What specification of the ADSL line does 4 Mbps refer to? (1)
Speed/bandwidth
5.1.4 Give the main reason for choosing a 3G Internet connection over an ADSL Internet connection. (1)
The connection needs to be portable/not tied to a fixed line such as ADSL.
5.2 VoIP is a protocol used by software packages such as Skype and Facebook.
5.2.2 Give TWO advantages of using VoIP software, other than any answer you gave to question 5.2.1. (2)
Cheaper than normal phone calls/VoIP software is usually free
Can transfer files
Can include video in the call
Don’t need to worry about Service Provider/SIM card issues between different countries and continents.
5.3 List TWO things you should avoid doing when using the Internet, in order to protect yourself against computer
crime. (2)
Do not give out personal information (i.e. ID number) unnecessarily
Do not click on links in pop-ups
Do not click on links in suspicious e-mail messages (phishing attempts) etc.
Do not open e-mail attachments unless you are sure of their safety/origin
Do not leave your computer unattended, without logging off/locking PC
Do not respond to hoaxes (e.g. get-rich-quick schemes) etc.
18
5.4 Give TWO advantages of using online storage, apart from the fact that it is a simple and cost-effective way to
share and transfer files. (2)
Accessible wherever there is Internet access
Allows for files to be synchronized across multiple devices
Accessible from/via a variety of devices
Backup and security handled by the service provider
Saves space on local storage
Data remains accessible if computer or device is damage/stolen, etc.
5.5 SETI@home and Folding@home are projects that rely on grid computing.
Explain briefly what grid computing is. (2)
A way in which the resources (processing power and time) of different computers are shared (and used
at the same time) to solve a single problem.
5.6 Information overload happens when people cannot cope with the amount of information they have to deal with.
5.6.1 Briefly explain how the use of RSS feeds can help prevent information overload. (1)
Users can choose from which websites they wish to receive updated content automatically.
5.6.2 Give ONE other way (besides using RSS technology) to prevent information overload. (1)
Learn to read quickly and to identify key points.
Learn to analyse and compare sources
Don’t add to problem by forwarding unnecessary information to others.
Take a disciplined/structured/focused approach to dealing with information.
(Also accept the following examples:
Create a routine/ fixed time to deal with information
Remove distractions (IM, browsing)
Filter e-mail/create categories etc
Use search tools properly (advanced searches, good keywords etc).
6. INFORMATION MANAGEMENT
6.1 Questionnaires created in a word processor often use form fields for both closed questions and open-ended types of
questions.
6.1.1 Briefly explain the difference between closed and open-ended types of questions. (2)
Closed question: Can be answered directly by facts/one answer/undisputed answer.
Open-ended question: Need further investigation/include higher-level questions that help to make
judgements or recommendations/suggest advantages & disadvantages, etc.
6.1.2 Briefly explain why a drop-down form field is often used in closed questions. (1)
One can provide a set of answers from which the selection must be made.
6.2 Give TWO possible benefits of conducting surveys online instead of manually or ‘by hand’ on paper, besides the fact
that it saves time and is easier. (2)
(Do not accept saves time and is easier)
Potentially more accurate data
The survey itself can easily be changed/adapted
Potentially wider survey sample available (more people)
Can cause multimedia to enhance/explain
Easier to process results (already in digital format)
Cheaper than manual methods (using paper, people)
Smaller ‘carbon footprint’/better for environment, etc
6.3 Spreadsheets and databases are both powerful tools for manipulating and processing data.
Give TWO reasons why it is sometimes better to use a spreadsheet, rather than a database, to analyse and pre-
sent data. (2)
Excel has more functions for working with numbers
If one wishes/needs to work with numbers, a spreadsheet is handy because of the tabular format and the
features which this provides, such as relative and absolute cell referencing and copying func-
tions/formulas.
Quicker and easier to copy/move/delete data, as it is not bound by database table structure (records and
fields), integrity rules etc.
No need to create different objects (tables, queries, forms, reports), or to switch between views (e.g. De-
sign and Datasheet), in order to process and present information –
19
the “working” view is also in “More useful error messages, if mistakes in calculations
Easier and quicker to test “what-if” scenarios and trends
More formatting and graphical options to present data (e.g. merged cells, borders, individual cell colours,
text orientation)
Can create charts/graphs
6.4 Give ONE general advantage of using a website, over a PowerPoint presentation, to present the findings of an in-
vestigation. (1)
Can reach a wider audience
No need to specify a viewing time
No need to specify a viewing place
No travelling involved, so environment
“James”,”Block”,1,0,”General”,”10:00”
“Than-
di”,”Sinoxolo”,1,0,”Vegetarian”,”23:00”
“Bianca”,”Du Toit”,1,0,”Halaal”,”21:00”
6.5.1 Give the type of format in which the file was saved. (1)
CSV – Comma Separated Value
6.5.2 The data in the file will be imported into an Access table.
Explain the significance or function of the commas in each of the lines, in terms of the Access table structure. (1)
Commas determine the fields of each record.
7. SOCIAL IMPLICATIONS
7.3 Green computing is a term used to describe computer usage that is sensitive to the environment.
7.3.1 Briefly explain how the use of digital communications has the potential to contribute to green computing. (1)
Less printing – cut down on paper, ink
Less travelling (i.e. more telecommuting) – cut down on vehicle emissions etc
Lower (physical) storage and other infrastructure requirements that can have a negative impact on environment etc
20
7.3.2 Give ONE way in which we can limit the amount of electricity we use when working with computers. (1)
Switch off (monitors, devices, chargers etc) when not in use
Use power-saving features ‘sleep’, and ‘hibernation’ modes etc
(Accept specific examples for e.g. smartphones)
Dim screen brightness
Keep screen time-out short
Disable Bluetooth, WiFi, GPS, 3G/4G (when not in use)
Don’t leave apps running in the background – close unnecessary ones
Do not use ‘vibrate’
Turn off non-essential notifications
Turn off ‘push’ e-mail – i.e. change setting to ‘fetch” e-mail instead
Don’t leave phone in sunlight/warm environments (battery runs out sooner)
7.3.3 Briefly explain why you should not throw an old (but still working) printer in the rubbish, AND give one suggestion
what to do with this printer that would be environmentally more acceptable. (2)
Printers contain harmful chemicals/materials that can cause environmental damage
Recycle the printer properly/donate to someone who could use it
7.4 Give ONE output device that people who suffer from poor eyesight or blindness could use to help them use a com-
puter more easily. (1)
Magnification devices
Braille printer
Speaker/headphones (for e.g. text-to-speech)
Braille ‘display’
7.5 Some sites allow you to log in with Facebook instead of registering directly on the site. Briefly explain the benefit of
this for Facebook. (1)
It allows Facebook to get more information about its users for marketing purposes.
8. SOLUTION DEVELOPMENT
8.1 The Accessibility Checker was used on a certain Word document. The following screenshot of the inspection result
shows there are 21 instances of ‘Missing Alt Text’:
Accessibility Checker x
Inspection results
ERRORS
Missing AltText (21)
8.1.1 From which type of objects in the document is the alternate text missing? (1)
Non-text objects (images, diagrams, SmartArt)
8.1.2 For which type of user handicap will this document be made more accessible if the ‘Missing Alt Text’ errors are
fixed?
Blindness/partial vision
8.2 Give ONE advantage of saving and distributing a word processing document in PDF format, rather than in a word
processing format. (1)
Recipient can read document without having program in which it was created
Reader program easily and freely available
Electronic documents converted to PDF format can be smaller in size – faster to send and less storage
space needed
No need to worry about compatibility issues – i.e. which version of Word will be used to read the document
8.3 A friend received the following error message when she tried to insert an automatic Table of Contents in a Word
document.
No table of contents entries found.
Briefly explain why not entries for a table of contents were found in the document. (1)
The Word document did not contain any text formatted in one of the built-in heading styles (i.eHeading 1)
or
The Word document did contain text formatted in one of the built-in heading styles, but no provision was
21
made in the Table of Contents Options dialog box, for a TOC Level (1,2,3, etc) to be linked to one of these
styles, or to another user-defined style.
8.4 Examine the following screenshot of a spreadsheet showing the top five percentages in a test and answer the ques-
tions that follow:
8.4.1 Write down the result or answer of the following calculation performed on the above data:
=MEDIAN (A3:E3) (1)
70%
8.4.2 Give the name of the type of error you would get if you entered the following in cell F3:
=AVERAGE (A3:F3). (1)
Circular reference
8.5 Examine the following screenshot of a spreadsheet and answer the questions that follow:
8.5.1 Give only the name of the text function that was used to determine the number of digits in the ID number. (1)
LEN
8.5.2 The first 6 digits of a person’s ID number give the date of birth of the person, in the format YYMMDD.
Give only the name of the text function that was used to extract the month (11) from the ID number. (1)
MID
8.6 The function below was used in a spreadsheet to round the number in Cell A6 up to 2 places after the decimal point:
=ROUNDUP(“2”,A6)
Give TWO reasons why this function will NOT work correctly. (2)
Function should be: =ROUNDUP(A6,2)
Order of arguments: first cell reference (A6), then the number (2)
Number 2 (places after decimal point) must NOT be in quotation marks
8.7 The following dialog box (‘Enter Parameter Value’) appeared unexpectedly when a query containing a calculated
field was performed in Access:
OK Cancel
Give the most likely mistake that was made in the calculated field. (1)
‘New Price’ that was used as a field in the calculation did not correspond with an actual field name - proba-
bly a spelling mistake, or the space was left out by mistake (e.g. NewPrice)
22
8.8 The following Access query is supposed to display the ages in years of all the Grade 12 learners who will be younger
than 17 years on 31 December 2015:
Sort:
Show:
Criteria:
or: 12 >17
Give FOUR reasons why the above query design will NOT produce the required information. (4)
Date 31/12/2015 not enclosed by hash symbols (#31/12/2015#
Show box for Age field not ‘ticked’
Criteria in Grade and DateOfBirth fields in different rows.
>17 instead of <17
9. INTEGRATED SCENARIO
9.1 The five desktop computers in the Media Centre are networked to a server in the Computer Room.
Examine the following diagram of the basic layout of the computers in the Media Centre and answer the question
that follow:
Media Centre
C
A
To Computer Room
9.1.1Give the name of the device (A), to which the computers in the Media Centre are connected (1)
Switch
9.1.2 Give the name of the type of network cable (B) commonly used to the connect each computer to the device (A)
(1)
UTP
9.1.3 Fibre optic cable (C) is used to connect the computers in the Media Centre to the server in the Computer Room
(a) Give TWO general functions of a server in a network. (1)
Provide resources/services to other computers in the network
File server – stores users’ files centrally/other source files/ backups
E-mail server – handles em-mail needs of organisation
Internet/Proxy server – Internet access and control/malware control
Print server – handles printing requirements
Application server – application software/website hosting
(b) Give the main advantage of using fibre optic cable for this purpose (2)
Higher speed/bandwidth
Longer cable runs and Greater distances
23
9.2 You have been asked to draw up an AUP, and to investigate software to control (i.e. ‘block’ or ‘unblock’) the use of
flash drives on the computers.
9.2.2 Give ONE likely reason for the decision to control the use of flash drives. (1)
Prevent theft of data/information – including illegal downloads
Prevent use of unauthorised software, e.g. computer games – with associated waste of time/loss of focus
and productivity
Prevent spreading of malware such as viruses
9.3 The Media Centre currently has one multifunction injet printer to satisfy the large printing demand. (1)
9.3.1 Give ONE reason why the current printer will probably not be suitable for long-term use in the Media Centre (1)
Higher running costs (inkjet)
Slower printing – difficult to satisfy ‘large printing demand’
General print quality not as good as ‘another’ (=laser) printer
Not designed for heavy printing demands/can fail more easily
9.3.2 Name another type of printer that may be more suitable for the Media Centre. (1)
Laser
9.3.3 Give ONE reason for keeping the current printer in use at the Media Centre, apart from any reasons relating to
green computing. (1)
Multifunction printer – so that it can also be used for scanning, copying, faxing etc (must mention at least
one function other than printing)
Could be used as back-up printer, in case other printer fails/runs out of toner
Potentially better (than e.g. laser printer) for high quality colour photos
9.4 Consider the following dialog box, which shows three documents waiting to be printed on the HP Officejet printer,
and answer the questions that follow:
9.4.1 What name is given to a list of ‘print jobs’ awaiting printing? (1)
Queue
9.4.2 Give ONE reason for using this dialog box, besides obtaining the information already displayed – i.e. the names
of documents, their status, number of pages and size. (1)
To delete the print job (cancel without printout – hardcopy no longer needed)
To pause the print job (because of a paper jam, or to install new ink cartridge)
To restart the print job (after it was paused for a reason
9.5 The purchase of a tablet and a notebook for the Media Centre is being considered.
9.5.1 Give the name of a wireless technology that could be used to connect the tablet and the notebook wirelessly to
the network. (1)
WiFi/Bluetooth
9.5.2 Give TWO ways in which photos stored on the tablet could be transferred to the notebook, besides wirelessly. (2)
Memory card
USB cable (must mention USB)
UTP cable (must mention UTP, or at least ‘network cable’)
(PRINTED UP TO HERE)
PAPER 3
SECTION A
QUESTION 1 (10)
Choose a term/concept from COLUMN B that best matches the description in COLUMN A. Write only the letter
A-S next to the question number.
1.3 Tags that have only an opening and no closing tab. C grid computing M
A group of computers in one network that are accessed and controlled by
1.4 D opening tag A
the same set of rules and procedures.
Amount of data that can travel from one point to another over a
1.5 E HTML N
connection in a set period of time.
A hint or information that pops up when resting the cursor on an icon or
1.6 F cache K
object.
An audio/video recording of a live event, made available to download and
1.7 G podcast G
list to at a later time.
1.8 A group of networks connected to each other globally. H Cap B
K tooltip
L broadband
M empty tag
N bandwidth
O ergonomics
P download
Q extranet
R cell reference
S Wi-Fi
Various options are given as possible answers to the following questions. Choose the answer and write only the
letter (A-D) next to the question number.
25
2.1 Which one of the following does NOT logically belong to the others? C
A. Scanner
B. Mouse
C. Monitor
D. Keybord
2.4 Which one of the following graphs best displays the changes in temperature over a period of a month. B
A. Pie chart
B. Line chart
C. Scatter chart
D. Bubble chart
2.5 What type of data is normally contained within a file with a .mov. extension? D
A. Sound
B. Picture
C. Graphic
D. Video
2.7 Which ONE of the following sites is NOT directly associated with e-commerce. C
A. Amazon
B. eBay
C. Gumtree
D. Kalahari
2.8 Which ONE of the following functions allows you to combine the content from different cells into one when
using a spreadsheet. B
A. Addition
B. CONCATENATE
C. VLOOKUP
D. Merge
2.9 A file that is pre-formatted with regard to layout, fonts and/or margins. A
A. Template
B. Example
C. Document
D. CV
2.10 Which ONE of the following is NOT directly related to an Internet connection? D
A. Switch
B. Router
C. Hub
D. None of the above
All of the following statements are FALSE. Rewrite the statement in order for it to be TRUE by ONLY changing
the underlined word/phrase.
3.1 A web browser patch is an additional piece of software that potentially gives a web browser more functions. Plug-
in
3.2 Swapping is the term used to describe the rapid swapping of data between the RAM and hard drive. Thrashing
3.3 Fragmentation is the process where a utility rearranges the clusters on the disk so that files are saved in
sequential clusters. Defragmentation
3.4 Spyware is an application that displays online advertisement on the web pages, e-mail or other Internet services.
Adware
3.5 Formatting is a process where files and folders are made smaller in size without losing any information.
Compressing
SECTION B
SCENARIO
The local municipality has approached your school with funds to install a computer centre on agreement that the
computer centre will also be used by the local community.
4.1 The organisers would like to buy high end hardware and software.
4.1.2 Explain to the organisers TWO advantages of buying a scanner to use in the computer centre. (2)
Scanners convert images or documents from hard copies to electronic copies on your computer.
These copies can be edited or sent electronically.
Electronic backups/archives.
Name TWO specifications (excluding cost) to keep in mind when deciding on a digital camera. (2)
Resolution
Zoom features
Storage capacity/storage type
Removable/non-removable lens
Battery type
4.1.4 List TWO ways in which photographs can be transferred from a digital camera to a computer.
USB cables/connection (2)
Remove and insert memory cards
Wireless such as Bluetooth/Wi-Fi/Eye-Fi
4.1.5 What is the difference between a barcode and and RDIF tag? (2)
RFID tags are small radio devices used to store data whilst bar code devices use machine readable
codes attached to goods.
4.1.6 Explain to organisers why they should use RFID tags instead of barcodes for inventory purposes. (1)
No need to physically look for the barcode and scan it with a portable scanner
4.2.1 Which printer will be suitable for the computer centre where a lot of monochrome documents will be printed?
(1)
Laser printer
4.2.2 Name TWO possible causes of a printer not working, a day after it was functioning perfectly.
(2)
Check the wall socket for power
Check if the printer is turned on
Check if printer has paper
Check if printer has ink
Check if printer is a default printer
4.3.2 Some new flash drives are equipped with biometric security. What does the term biometric mean in this context
(1)
Device can only be used/accessed by using a biological feature unique to the person like a fingerprint.
4.3.3 Name ONE advantage of having an external hard drive in a computer centre. (1)
Allows for portable backups
Can save/spare disk space in the computers
4.3.4 What port would you normally use to connect the external hard drive to a computer? (1)
USB port
4.4 The organisers need to make a choice with regard to software that will be needed.
28
4.4.2 What is the difference between the minimum and recommended specifications with regard to software? (2)
Minimum system requirements are the lowest hardware and software specifications
an application needs to work at all, and a recommended system requirements are hardware and
software specification that will enable the application to work at its best.
4.4.4 Some software needs an activation code to work. Explain what an activation code is. (1)
An activation code is a specific software based key for a computer program that certifies that the copy
of the program is original.
4.4.5 Why would you recommend the installation of trial software? (1)
To test the software before buying.
5.3.1 What is the major difference between real time messaging and e-mail communication? (2)
Real time messaging is a communication method in which users communicate
directly with each other without any delay whereas e-mail messaging is a commu-nication method where
communication is delayed.
5.3.4 What is the difference between a web-based and an ISP-based and an ISP-based
e-mail account? (2)
Web-based mail allows you to manage your mail via a web browser whilst ISP-
based e-mail accounts are located on the ISP server and need e–mail client such as MS Outlook to check
your e-mail.
5.4 Unfortunately the Internet may also negatively affect your computer.
5.4.1 What is the main difference between an e-mail hoax and e-mail spoofing? (2)
29
An e-mail hoax is a false message that describes false information and an e-mail spoofing is a process in
which a criminal sends an e-mail where the sender address looks like a legitimate e-mail address, such
as a bank.
6.2 Mention TWO criteria to help assessing information contained in a website. (2)
Affiliation
Author
Content
Objectivity
Trustworthy
Date of publication
List TWO aspects of a spreadsheet that can be used to manipulate data. (2)
Graphs
Functions
Formulae
6.4 When searching the Internet for information, you need to narrow down your search for more accurate
results.
6.4.1 Explain the term “hit” by referring to how a search engine works. (1)
A hit is the number of responses/websites one gets when he uses a search engine to search for
information in the Internet.
6.4.2 When searching for information on the Internet regarding the new technology, explain why you receive more hits
when adding quotation marks such as “new technology”. (1)
Quotation marks force the search engine to look at all the words within the quotation marks together
instead of separately.
6.4.3 Besides quotation marks, mention TWO more ways search results can be narrowed down. (2)
Limit the search to a certain type of information e.g. images
Use specific words/phrases
Use logical operators such as ‘AND’
Search within date ranges
Use specific domain/advanced search features
Dedicated search engines
7.1 Mention TWO advantages of using ICT with regard to communication. (2)
Contributes to green computing
People all over the world can collaborate
Data can be transferred from one application to the other
Employees can communicate
Saves money and time
30
7.2 Besides installing an anti-virus which is updated regularly, name TWO more ways in which you can prevent virus
infection on your computer. (2)
Do not share removable storage
Do not download from suspicious websites
Do not open e-mail from suspecting source
Do not use pirated software
7.4 Banks advise customers not to use public computers for banking transactions.
7.4.1 Explain why banks give this guideline by referring to keyloggers. (2)
Keyloggers are used to record every keystroke a user makes on a computer. Public computers have a
higher chance of being infected due to the amount of people that use them.
7.4.2 List TWOsafety measures used by banks to ensure the safety of their customers when banking online. (2)
One time passwords
SMS when banking accounts are entered
Use password/username/account number or combination etc
8.1 Explain what each of the following error messages in spreadsheet would indicate and outline the solution to
each:
Http denotes the location where the website is located. The browser was looking for the website in the
folder in the computer not in the World Wide Web
8.3 Outline how it is possible to have a whole document in portrait with only the last page changed to landscape.(2)
Put the cursor on the last page and change layout to landscape applying it to this point forward.
8.4 In a document the author has used the Enter key repeatedly to move headings to the top of each page.
8.4.1 Why is this not a good choice to move the headings in this way? (1)
As a document is created/edited the headings will have to be moved continually (manually) to keep them
at the top of a page.
8.5 The name Müller needs to be added to the report. What feature of a word processor can be used to add the
characters ë and ü? (1)
ASCII characters/insert symbols
31
8.6 What is the difference between using formatting and the ROUND function when rounding a number in a
spreadsheet? (2)
Format to no decimal – displays the rounde off number, but retains the value after the decimal point for
calculations.
ROUND function – rounds off the number and removes the valule after the decimal point
8.7 What feature of a word processor could be used to find an easier word that means the same as “amalgamated”?
Thesaurus/synonyms
SCENARIO
Your Grade 12 CAT class has been approached to help the municipality make correct decisions when buying new
computers. The computers will be networked and connected to the Internet. The committee in charge needs to make
informed decisions as they need to keep expenditure as low as possible.
The adverts below have been brought to you for advice on which to buy.
COMPUTER B
COMPUTER A
Intel Core i7-2600 3.4
Intel Celeron 2.4 GHz CPU GHz
8 GB DDR RAM 8GB RAM
500GB HDD I TB HDD
16x DVD RW 15.6” LED monitor
17” LCD Monitor 16x Multi card reader
Ubuntu 12.10 16x Blu-ray RW
USB Optical Mouse Wi-Fi 802.11 b/g/n
HP 1018 Laser Printer Integrated Webcam
2 year guarantee HDMI port
Windows 8
Optional – Data Projector
9.1 The workers would prefer to have a wireless keyboard and mouse for eachcom-
puter.
9.1.2 Which TWO hardware components of a computer would have the most influence (2)
CPU (Processor)
RAM
Motherboard
9.1.3 Identify the optical drive in Computer B and mention whether it would be able to read CDs (2)
Blu-Ray will read a CD because new technology is backward compatible.
9.1.4 Explain what the abbreviation HDMI in Computer B indicates and mention ONE possible use of it. (2)
HDMI is an interface for high definition video and sound for transferring uncompressed video data or
audio data from an HDMI compliant device.
9.1.5 List any TWO input devices that can be used by people with disabilities. (2)
Touch screens
Specially designed keyboards
9.1.6 Outline a possible use for a webcam and a data projector for the committee. (2)
Webcam to record images that can be transmitted over the Internet
9.1.7 What is the speed of the CPU contained within Computer A? (1)
2.4 GHz
9.2 The organisers want to save money by using free open source software (FOSS)
9.2.1 Identify the open source software mentioned in one of the adverts. (1)
Ubuntu 12.10
9.2.3 Suggest TWO advantages of buying an office suite instead of stand-alone applications.
9.2.4 Which type of software can be used for input by visually impaired users? (1)
Speed to text/speech recognition
9.2.5 What type of program would open a file saved in a PDF format? (1)
PDF reader
9.3 You recommend they use SSDs for any portable computers.
9.3.1 What is the main difference between a traditional HHD and an SSD? (1)
SSD uses flash memory instead of any moving parts.
9.4.1 Name TWO possible additional functions that can be performed by a multi-functional printer except for the ability
to print. (2)
Fax
Scan
Photocopier
Send documents as e-mail attachments
9.4.2 Name TWO aspects that might impact system compatibility (2)
Software
Storage space
Storage devices
Operating system
Cables versus wirelss
9.4.3 The printer’s manual indicates a ppm specification. Explain what the ppm specification of a printer means.(1)
ppm – this means how many papers can be printed a minute
9.4.4 Mention TWO ways in which the centre can save on paper. (2)
Use print preview function before printing
E-mail instead of printing
Print both sides of the paper
Multiple pages on one paper
9.4.6 List TWO actions that can be performed within a printer spooler. (2)
Cancel a print job
Pause a print job
Alter priority of printing jobs
9.5.1 Mention TWO criteria to consider when choosing the type of Internet connection to be used. (2)
Mobility
Cap/Data use
Coverage/Availability
Speed of connection
Cost
9.5.2 List TWO possible advantages of using an ADSL Internet connection instead of 3G. (2)
Permanent connection
You make calls and receive calls and use the line for Internet Access at the same time
Most ADSL routers have Wi-Fi access
9.5.4 Except for normal browsing, name TWO examples of Internet services that the committee can use. (2)
E-mail services
Real time services
VOIP
Video conferencing
Cloud computing
9.5.5 Name any TWO government Internet-based services that the community members can access (2)
Renewal of TV licenses
Election information
Unemployment Insurance Fund
Educational publications
Tax returns
34
9.5.6 Explain what a zombie is in the context of a possible computer-related risk. (2)
Computer zombie – is a computer that has been taken over by a criminal and is controlled from a
different location
9.5.7 List TWO advantages of using web-based applications such as Google Docs. (2)
Can use the software in any computer as long as you are connected to the Internet
Software is always up to date
No need to download or install application
PAPER 4
1.7 A field of study aiimed at reducig the effects of RSI for the user G Byte P
L Query
M GHz
N report
O OCR
P Ergonomics
Q Processing
R Output
S IF
35
Various options are given as possible answers to the following questions. Choose the answer and write only the letter
next to the question number.
2.1 Which ONE of the following is a spreadsheet function that is used to find the total for cell values in a range
only if a specific condition is met. (1)
A IF
B COUNTIF
C SUMIF
D SUM
2.2 Which ONE of the following printers works by constructing objects forom materialssuch as plastics(1)
A Dot matrix printer
B 3D printer
C Inkjet printer
D Colour laser printer
2.4 Which ONE of the following refers to cellular technology used for data transfer? (1)
A WiMAX
B Bluetooth
C WiFi
D LTE
2.5 Which ONE of the following devices is the best example of convergence? (1)
A Smartphone
B USB modem
C MP3 player
D Webcam
2.6 Which ONE of the following refers to a situation where a web user is tricked into selecting a hidden link?
(1)
A Double clicking
B Keylogging
C Click-jacking
D Hyperlinking
2.7 Which ONE of the following refers to a concept where employees can connect their own devices to the com-
pany network and do their official work on these devices? (1)
A RSI
B DoS
C BIOS
D BYOD
2.8 Which file format is used to save text without containing any formatting such as colours and font sizes?
(1)
A PDF
B RTF
C TXT
D HTML
2.9 Which ONE of the following refers to a technology where the processing power of multiple networked
computers is combined to perform a specific task? (1)
A Grid computing
B Green computing
C File sharing
D Mobile computing
36
2.10 Which ONE of the following is the changing of an e-mail header so that it appears as if the e-mail was
sent from an address other than the one from which it was actually
sent? (1)
A Bcc
B Cracking
C Spoofing
D Hacking
Indicate whether the following statements are TRUE or FALSE. Choose the answer and write “T” or “F”. Change
the underlined word(s) to make the statements TRUE.
3.1 A document with a PDF file extension can be used to prevent users from changing its contents.True or False,drmz
(1)
3.2 A blog is a website that allows users to work together on changing its content using a web browser.False,
wiki/wikipedia (1)
3.3 An audio file, such as news programme or an interview that can be downloaded from the Internet, is called a patch.
False, podcast/MP3 (1)
3.5 A query can be used in a spreadsheet to extract specific information from a large set of data.
False,database (1)
SECTION B
4.1 Most modern web browsers have a feature called tabbed web browsing.
State TWO advantages of tabbed web browsing. (2)
More than one website/pages can be opened/closed in a single window
Ease of navigation between open websites/page, greater browsing efficiency
Allows for normal as well as private browsing in the same window
Taskbar is less cluttered
Allows multiple home pages that all open automatically
Organise tabs in a group to save as a favourite
Less resource-intensive than running a separate instances/copies for each page of the same browser.
4.2 Give TWO reasons why biometric input can be more secure than using traditional measures such as passwords.
(2)
A person’s physical characteristics are unique
The person concerned has to be present for the input
Physical characteristics cannot be easily falsified
Passwords are often left around/guessed/hacked
(DO NOT REFER TO COST)
4.3 Buying a computer can sometimes be very difficult because there are so many hardware options to
consider
4.3.1 Name TWO of the main components on a computer that have a significant effect on the overall processing
performance of the system. (2)
RAM/memory
CPU
CPU related e.g. heat sink, cache
GPU/graphics card
Hard drive/SSD
(DO NOT REFER TO ONLY STORAGE)
4.3.2 Explain what a trackpad/touchpad is and state ONE disadvantage of using a trackpad/touch pad instead of a
normal mouse. (2)
Touchpad/trackpad is a touch sensitive area where the user can move the pointer on the screen by
touching the touchpad/trackpad surface instead of using a mouse.
37
AND
Usually built into devices such as a laptop/cannot be removed
Less intuitive to use/Takes more time to position cursor accurately
Operations where multiple clicks are involved may be more difficult
Drag and drop operations could be more difficult
Can accidentally be touched thereby moving the cursor to an unintended place on the screen
Cannot be used for gaming/Less responsive
Sweaty dirty and moist fingers/Wearing gloves/Anything that causes a barrier can disrupt pointer
4.3.4 State ONE possible disadvantage of having a built-in monitor on a computer such as a notebook computer.
(1)
Impossible/Difficult to upgrade
Costly to repair
Whole machine needs to go in if repair is needed.
4.4 A business has to decide which printer they should purchase to print pamphlets
in large volumes
4.4.1 Recommend a type of printer for their needs AND give a reason to support your recommendation. (2)
Laser printer/(Networked) office copier
AND
High speed
Cost effective on hight volume prints (black and white)
4.4.2 Name TWO new technologies or additional features that appear in modern printers. (2)
Connectivity via network/wireless e.g. Wi-Fi and Bluetooth
Integrated software features e,g, remote printing
3D printing
Memory card reader/Direct printing from flash drive
Erasable toner/Unprinting
Touch screen/pad interface
(ACCEPT ONLY ONE REFERENCE TO MULTIFUNCTION CAN FAX/COPY/SCAN/COLLATING/BINDING)
4.5 The opening of programs on a computer sometimes becomes slower over a period of time.
4.5.1 A support technician suggests that the hard drive might be fragmented. He recommends defragmenting
the hard drive.
Briefly describe what occurs during the defragmentation process. (2)
Scattered parts of files
Re-organised into adjacent/contiguous area/together
4.5.2 Identify TWO other software-related problems that could reduce the speed of a computer, besides fragmentation.
Write down a potential solution for EACH of the problems you identify (it could be done in the form of a table).
(4)
PROBLEM: Malware/virus infection:
SOLUTION: remove with anti-virus program/removal tool
AND/OR
PROBLEM: Too many programs open at the same time for the amount of RAM available/memory
full/programs running in the background
SOLUTION: Close unused programs/Find an close any unnecessary programs running in the
background
AND/OR
PROBLEM: Software updates being automatically downloaded
SOLUTION: Switch off automatic updates
38
AND/OR
PROBLEM: Defective application bug
SOLUTION: Update/Replace defective applications
AND/OR
PROBLEM: Too many unnecessary files/temporary files on the hard drive
SOLUTION: Use Disk Cleanup/Remove unnecessary files or programs
(DO NOT REFER TO DEFRAGMENTATION OR UPGADE ISSUES)
Printed up to here
5.4 State an advantage of using fibre-optic cables instead of copper wires as a communication medium. (1)
Fibre-optic cables allow for:
Higher data transmission speed compared to copper wires
Lower attenuation/less interference
Less susceptible to lightning strikes.
Less likely to be stolen
5.5 A number of hardware issues, such as the type of equipment, affect the performance and stability of a Wi-Fi signal
State THREE factors, besides hardware issues, that can have an influence on a Wi-Fi signal. (3)
Physical obstacles/walls
Closeness/Proximity/Distance to the access point/router
Electrical/Magnetic interference/Signal overlapping
Network load/Too many computers on the network/Contention ratio
Weather conditions
Poor quality/Low speed connection devices used
Availability of electricity
5.6 Give an example of what NFC (near field communication) can be used for. (1)
Sharing/Transferring files
Identity verification/Authentication purposes
Location-based profile automation
Can be used in payment systems
Switch devices on or off, etc
5.8 Name ONE type of connection to the Internet, besides a landline. (1)
Satellite
Cellular/3G/LTE/GPRS/HSDPA/EDGE/4G
Wireless/Wi-Fi/wiMax/iBurst/Radio technology
39
5.9 More and more people choose to use online, web-based e-mail service. (1)
5.9.2 State ONE possible advantage of using a web-based e-mail system compared to using a local e-mail system
compared to using a local e-mail system such as Microsoft Outlook. (1)
E-mail can be accessed at any location with Internet access
E-mails are not lost in case of computer crash
No need to upgrade software/no need to purchase or install software
May have better e-mail management options e.g. with regard to spam and phishing reporting
Tighter integration with other web-services, e.g. Google Drive for attachments
5.9.3 Which e-mail field will be used to hide the address of a recipient who gets a copy of the same e-mail. (1)
Bcc
6.2 State TWO advantages of using questions that have a fixed set of possible answers (closed questions) when using
an electronic form. (2)
Quicker/Easier to complete by respondents/Less susceptible to misinterpretation
Less chance of data capture errors
Easier to perform data validation
Easier to store/process/analyse information/Limits possible responses/Less susceptible to
misinterpretation.
6.3 State TWO ways in which to check the reliability or accuracy of information from an Internet source. (2)
Check credentials/affiliation of the author/organisation running the website.
Establish how recent/current the information is/Check when it was last updated
Cross-reference with other sources
Check objectivity/bias with other sources
Look at the general presentation, e.g. spelling errors
Frequency which the source has been cited.
6.4 The graph/chart below represents a comparison of the average temperatures per month from January(Jan)
to December (Dec).
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
40
6.4.1 Name a more suitable type of graph/chart to represent this information. (1)
Bar graph
Column graph/Histogram
Line graph
Scatter graph
Area graph
6.4.2 Recommend THREE improvements to the above graph/chart other than changing the type of graph. (3)
Add a suitable chart title/heading
Make use of data labels/values/percentages
Add meaningful/descriptive axis titles/lables
Use of colour/shading
(NOT KEY/LEGEND)
7.1.1 State ONE way in which one can responsibly dispose of an old laptop battery? (1)
Send the battery for recycling/e-waste collection
Take it back to the manufacturer/reseller
Trade in for a new one
7.1.2 State TWO ways in which computer technology can be used to protect the environment. (2)
Paperless office helps reverse forest deforestation
Tracking endangered species
Power management
More efficient use of scarce resources
Monitoring issues such as climate change/pollution/carbon emmission
7.1.3 Give ONE example of the use of computer technology that has a negative effect on the environment, other than the
disposal of batteries. (1)
E-waste pollution such as dumping old computer equipment
Energy wastage such as not shutting down workstations when not in use/not using energy saving
equipment
Wasting paper
7.2 Give the the term for the practice when somebody, for example, opens a Facebook account using another person’s
details. (1)
Identity theft/Fraud/Impersonation
7.3.2 Suggest TWO possible ways in which to prevent or combat phishing on receipt of such an e-mail. (2)
Close/Delete the e-mail
Do not follow any links in an e-mail as a general rule/Do not give out personal information
Report the e-mail phishing
Blacklist/Block the particular e-mail address
Call/contact company to verify
7.4 Give ONE example of how downloading copyrighted material without permission could affect the owners or
creators of the material. (2)
Loss of income/revenue
Job losses/Collapse in the relevant industry
Poor quality products might damage the owner’s reputation
41
8.1 You have studied web page development in your CAT course.
8.1.1 What is the name of the language that uses tags and attributes to create web pages? (1)
HTML (XTML,XHTL,HTM)
8.1.2 What is the difference in function between the <ul> and <ol> tags used in the code for a web page? (2)
<u> displays bulleted list
<ol> displays a numbered list
8.1.3 Give TWO possible reasons why an image you added on an HTML web page does ont display when viewed in a
web browser. (2)
Image is not in the specified folder
Image extension is different from HTML cod
Spelling/typing error
Web browser cannot display the image type/format
Incorrect tags used
Image reference not presented/correct
8.2.1 The names of various schools are listed in a field in a database table
Which criteria would you enter in a query to extract the names of all the schools that have the word ‘business’
anywhere in their name? (2)
“*business*”
Use an asterix on both sides of the word business
8.2.2 State TWO advantages or/reasons for using codes instead of the ‘full text’ in a database, for example 0847
instead of the text ‘Business Studies’ (2)
Easier for the data capture/Shorter to type
Fewer mistakes when entering data
Easier to use in queries
Use less storage space
E
8.3 Spreadsheets are commonly used to analyse data
8.3.1 Name a feature of a spreadsheet program that can be used to automatically highlight cells if they contain specific
values.
(Conditional formatting
8.3.2 The function below was used in a spreadsheet to count the number of cells in the range A1:A10 that
contain values of 50 or higher:
=COUNTIF(A1:A10,<50)
Give TWO reasons why this function will NOT work correctly (2)
Incorrect relational operator, e.g. (>50)
Including the value 50, e.g. (>=50) OR (>49)
Criteria must appear in quotes/Inverted commas (“>=50”
8.3.3 Which feature within a spreadsheet program can be used to display words underneath one other within the same
cell? (1)
Text wrapping (alt+enter)
8.4 State TWO advantages of using the ‘Track Changes’ feature of a word processing program. (2)
Allows/Facilitates editing of one document by multiple users
Allows for original data/changes to be reviewed/viewed before committed/Changes can be accepted or
rejected
It is possible to see which changes were made by which users
42
SCENARIO
Your school recently started a photography club. As the technical assistant you will
be helping club members with any computer-related problems. Members are
encouraged to bring along any device capable of taking photographs, such as digital
cameras, smartphones and tablets
9.1.1 Name any TWO camera specifications that will have an impact on the quality of a photograph (2)
Quality of the lens
Quality/size/type of sensor, e.g. CMOS performs better in low light than CCD, colour depth
On-board software/Software filters
ISO rating
Digital vs. optical zoom
Image stabilisation
Image processor
Megapixel value/Resolution
Shutter speed
Flash
9.1.3 Study the specifications below and answer the questions that follow:
20 MP
4” LED touch screen
26x optical zoom
Micro HDMI and USB port
4 GB SD card included
9.2 The most common way to transfer photographs from a digital camera to a computer
9.2.1 When connecting the camera to a USB port on the computer, you notice that a driver is being
automatically installed. (1)
What is the function of a device driver?
A device driver allows for communication between the device/camera and the computer operating system
The device driver allows the operating system/computer to control the device/camera
It allows the computer to ‘see’/use/recognise the device/camera
9.2.2 The device driver was installed without inserting a storage medium such as a CD. (1)
From which location could the device driver have been installed?
As part of the operating system already stored on the computer
Stored on-board/on camera
(Automatically) downloaded from the Internet
43
9.2.3 Name TWO other ways, besides using a USB cable, in which photographs can be transferred from a digital
camera to a computer. (2)
Memory card reader
Bluetooth
3G/Wi-Fi (such as Eye-Fi)/E-mail
Automatically uploads/synchronises to cloud storage such as Dropbox
Firewire
9.3 The secretary has been trying to send a picture as an e-mail attachment to the local newspaper. The e-mail
was rejected as the attachment exceeded the maximum size limit of 15 MB. (2)
Name 2 possible ways in which to reduce the size of the picture.
Lower the resolution/DPI value of the photograph
Change to monochrome/grayscale
Crops parts of photo not needed
Compression/Change file format
Reduce the photograph dimensions
9.5 A major concern for the members of the photography club is losing the photographs they have downloaded
onto their computers.
You recommend that they have an effective backup policy to prevent the loss of data if their computers are
damaged or stolen. (2)
9.5.1 Name TWO practical guidelines or strategies they can include in their backup policy.
Make regular backups
Keep backups off-site
Rotate storage media used for backup (use more than one DVD)
Use more than one storage medium (use DVD, external hard drive in combination, cloud storage)
Checking that backups are viable/can be used to restore data
Incremental backup/only backup new or changed files
Use a clear file structure/labels/meaningful names
Automate the backup structure
Exclude certain file types
9.5.2 The school principal stated that he uses cloud storage to store the photographs he takes with his
smartphone. (2)
(a) State TWO possible disadvantages of using cloud storage for this purpose
Access to the cloud depends on the availability/quality
Limited free storage available
Uses up data bundle which can be expensive on smartphones
Can’t be sure that his photographs will be kept private/safe
Continued viability of cloud storage provider
(b) The school principal made sure that the synchronisation (‘synching’) option on his smartphone has
been enabled. (1)
What advantage does ‘synchronisation’ (‘synching’) offer in this context.
New photographs taken with his smartphone will automatically be uploaded to the cloud
New photographs are synchronised to all devices connected to the server
9.6 One of the members has a camera with the option of saving GPS information to a photograph.
9.6.2 Discuss ONE reason for adding GPS information to a photograph. (1)
Find the location of where a photo was taken e.g. the geographical location e.g. geotagging
Import the GPS coordinates to a computer to record the locations where the photos were taken e.g. Google
Maps
44
9.7 State TWO advantages of using touch screens on mobile devices such as a digital camera or smartphone.(2)
More space for a larger screen due to fewer physical buttons
On-screen menus and buttons can be customised/different layouts
Gestures e.g. swiping
More intuitive use/Easier to work with
9.8.2 Name THREE technical criteria or issues, besides the cost, that should be considered when choosing the type ot
broadband Internet connection. (3)
Coverage/signal strength
Need for mobility or not
Additional services offered, e.g. web hosting, technical support
Speed
Cap/Uncapped/Amount of data
Shaped and unshaped
Fair usage policy
(Do not list cost or other non-technical issues. Size not acceptable)
9.8.3 Access to the Internet means that the club members can use VoIP technology such as Skype. (1)
What is the main advantage of using VoIP to make calls instead of normal telephone calls
Cheaper calls
Call costs the same, irrespective of distance
Can make calls to multiple platforms such as smartphone to a laptop/computer/tablet/Skype device.
9.9 The club members will need Internet access on all the computers. This means a network will have to be installed
9.9.1 State TWO advantages of installing a wireless LAN (WLAN) instead of a cabled LAN.
Wireless connections can be used in some cases where cables cannot reach or be used
Portable devices can be moved around and stay connected/Mobility
Less clutter of cables
Easier to add/connect additional equipment/nodes, etc
9.9.2 What would the function of a NIC (network interface card) be on a network.
To connect the computers to the network/The physical connection between the computing device and the
communications medium/allows communication between the networking device and the network
9.10 The club would like to upload their photographs to social networking websites on the Internet for their
parents to see. (4)
9.10.1 State TWO advantages of posting the photographs on a social network website. (2)
No need to distribute manually to all interested parties
Parties can be notified automatically of new uploads.
The photographs might be available to the general public/Can be accessed from anywhere
Photos can be grouped into electronic albums
Use as an alternative backup method
Showcasing/Attracting comments
9.10.2 State TWO ethical guidelines for the club members to consider when posting pictures on the Internet. (2)
Respect privace of individuals before posting/Sensitive aspects of photographs could lead to embarrasment
Photos should not be offensive
Permission must be sought before posting e.g. for under-age subjects
9.11 The photography club wishes to buy a new computer which will be used for photo editing.
Consider the specifications of a possible new computer as shown below
9.11.1 Which essential output device does NOT appear in the specifications above? (1)
Monitor/Screen/Display
9.11.2 State TWO advantages of installing or adding a memory card reader to the computer. (2)
No need for using/carrying along cables to connect a camera
No need to install drivers to access each camera.
Can read a variety of media types
Memory cards can be used to store data other than photographs like a flash drive
9.11.5 Why would increasing the amount of RAM increase the performance of a computer? (1)
More programs/data can be loaded
Less need for reading/writing to or from the slower hard drive
Less need for virtual memory
9.12 The club members need software to edit their photographs. They want to use free and open-source
software (FOSS)
What is the main advantage of using FOSS in this situation, besides the fact that it is free? (1)
It can be altered/changes can be made
Source code is available to be edited
Improvements/can be changed to suit your needs/updates are shared with others
Can be installed on multiple computers without legal action
9.13 State TWO ways in which the photography club can practise green computing in terms of EACH of the
following issues:
9.14 The club will use a database to keep track of member details.
Name THREE database field properties that can be used to ensure that valid and accurate data is entered into the
database (3)
Input maskes
Required fields
Default values
Validation rule
Using specific data formats
Field sizes
Lookup Wizard
Primary key
46
PAPER 5
SECTION A
QUESTION 1
Write down only the number of the description from Column A, and next to it the correct matching
capital letter from Column B.
1.1 An application that can filter, sort and group data A Convergence I
An online service or technology that makes it possible for people
1.2 who share similar interests to communicate with each other re- B Fingerprint reader E
gardless of distance or time
A website that allows people to add and edit content together with
1.3 C Mail merge G
others
The trend where a variety technologies is integrated into one sin-
1.4 D Pharming A
gle device
A word processing function that allows a user to automatically
1.5 produce multiple personalised documents from a single template E Social networks C
and data source
The practice of rerouting users to bogus or unexpected websites
.6 F Grid computing D
when they enter a URL in their web browser
1.7 Markers used to indicate elements and formatting on a web page G Wiki H
K Bandwidth
L Blog
M Adware
N Functions
O Word processor
(7)
QUESTION 2
Various options are given as possible answers to the following questions. Choose the answer and write only the
letter (A-D) next to the question number.
2.1 Programs designed for use on smartphones and table computer are commonly known as:
A scripts
B drivers
C file managers
D apps
2.2 When files are stored in “the cloud”, they are stored on a ....
A remote server
B portable device
C Blue-ray disk
D USB flash
47
2.3 The word ‘asymmetric’ in the abbreviation ADSL refers to the ......
A digital divide with regards to Internet access
B line shaping due to excessive use
C difference in download and upload speeds
D cap (limit) being enforced
2.4 Files with the extension wav, aac and ogg can be converted to a file type with the file extension
A text.
B mp3.
C docx.
D dll.
2.6 Tricking a user into revealing confidential information, such as a password, is known as ......
A social engineering
B crowdsourcing
C data manipulation
D pharming
2.7 Once all the responses to a survey have been collected and collated, the data is ready to be ....
A presented
B analysed
C backed up
D e-mailed
2.8 If you want to copy and paste only the result of a formula in a spreadsheet and not the formula itself the
paste option you should select is ........
A paste a link
B paste formatting
C paste values
D transpose
2.9 To enable them to keep track of information on several thousand employees, a large organisation is likely to
make use of a .....
A wiki
B spreadsheet
C database
D content aggregate
2.10 Using multiple computer systems as though they were one computer is known as ........
A grid computing
B cloud computing
C virtual computing
D scientific computing
QUESTION 3
Indicate whether the following statements are TRUE or FALSE. Choose the answer and write ‘true’ or ‘false’ next
to the question number. Change the underlined word(s) to make the statements if it is FALSE. Change the
underlined word(a) to make the statements TRUE. You may not simply use the word ‘NOT’ to change the
statement). (8)
EXAMPLE:
QUESTION ANSWER
False
Deframentation is characterised by unequal access to ICT by
The Digital divide is characterised by unequal access to
unequal access to ICT by different groups of people.
ICT by different groups of people.
3.1 A PSU is a device used to provide power to all the separate components within a computer.
TRUE
3.2 Public hotspots allow users to connect to the Internet using 3G.
FALSE
Public hotspots allow users to connect to the Internet using Wi-Fi
3.3 A query in a database application is created in order to give a user an easy way to enter a record into a table.
FALSE
A form in a database application is created in order to give a user an easy way to enter records in a tabl
3.4 System requirements describe which hardware and software is needed for software to be installed and run.
TRUE
3.5 The ‘Print Screen’ key on the keyboard takes a screenshot and sends it directly to the printer.
FALSE
The “Print Screen” key on the keyboard takes a screenshot and sends it directly to the clipboard
4.1 What is the major difference between USB 2.0 and USB 3.0 with regards to data transfer? (1)
USB 3.0 has a faster data transmission rate than USB 2.0.
4.2.2 State TWO possible disadvantages of having an integrated device such as a video adapter. (2)
Very difficult (in some cases impossible) to replace
If the video adapter stops working, you will need to replace the whole motherboard or buy a new,
separate graphics adapter. In the case of a notebook this is impossible
The video adapter shares RAM with other hardware
4.3 Would the computer described above be suitable for a power user such as a video-editing profession?
Motivate your answer by giving TWO reasons to support your answer. (3)
NO
Limited storage space on the hard drive
CPU is a Cerelon which would not suffice for a power user
Integrated graphics cannot handle high-end video editing or manipulation
(Do not accept a simple ‘NO’ as an answer).
49
4.4 Which port on the notebook computer allows the computer to be connected to a modern television set? (1)
HDMI
4.5 Give TWO reasons why a notebook computer would be more suitable than a desktop computer for learners in a
school. (2)
Portability/Can be easily taken to any classroom
Occupies les space
Standard notebooks have more Internet connectivity options.
Can work on battery power
4.6. State TWO benefits of an SSD when used in mobile devices. (2)
Faster than a conventional hard drive
More robust
More energy efficient
Weighs less
4.7 In order to use the Internet effectively for services such as video streaming and transferring large amounts
of data, access to a broadband Internet connection is needed.
4.7.1 Which specification in the advertisement would allow for broadband connectivity? Motivate your answer.(2)
802.11n Wi-Fi as the computer can be connected wirelessly to a network which in turn may provide a
broadband Internet connection
4.7.2 Give TWO reasons why some users might prefer a wireless broadband connection instead of a wired connection.(2)
Devices can be moved easier and still retain their Internet connectivity
Less clutter/no cables
A broadband Internet connection can be made in locations where wired broadband infrastructure is not
available, such as rural areas.
4.8.1 Name the operating system that is packaged with the computer in the advertisement. (1)
Windows 8
4.8.3 Which category of software would users need over and above the operating system in order to use the computer
for daily tasks? (1)
Application software/Office suite
4.9 Any software will generally have minimum software and hardware requirements.
Give TWO reasons why it would be better to invest in hardware that exceeds (is better than) these minimum
requirements. (2)
To ensure that the software performs optimally
In effect a user will be able to use the hardware for a longer period, as it will be compatible with newer
software for a longer period
4.10 Explain what disk fragmentation is by also explaining how this could slow down your computer. (2)
Disk fragmentation refers to parts of a file being scattered into non-consequential/contiguous/adjacent
sections of a disk.
It slows down a computer as all the parts must first be gathered, slowing down disk access in the
process.
50
5.1 Give the generic name (abbreviation/acronym) for the type of network that spans a large geographical area. (1)
WAN (Wide Area Network)
GAN (Global Area Network)
MAN (Metropolitan Area Network)
VPN (Virtual Private Network)
5.2 Briefly discuss the function of each of the following devices within a network:
5.3 Bluetooth is activated on two devices, but no data can be transferred between them.
Suggest a solution to this problem. (1)
Pair your devices
Bring your devices within range
You may have to give permission for a file transfer to occur
Make sure you are trying to connect to the device you think you are connecting to, e.g. another device in
range may have the same name.
5.5 Name a function or feature of a web browser that would allow a user to return to a specific website even if the
browsing history has been deleted. (1)
Use a bookmark/favourite
NOT
Writing down/memorising
Using a web search
Starting to type a part of the URL in the address bar without having created a bookmark first
5.6 Explain how software developers generate a profit from adware, even though it is distributed for free. (1)
Advertisers pay the developer to show their advertisements within the app/program using banners or pop-
ups
5.7 State TWO advantages of podcasts over real-time streaming broadcasts. (2)
Listen at a time suitable to you
Better quality sound
Save on data (using less expensive Wi-Fi connection for downloads)
Avoid streaming issues, e.g. buffering
Podcasts can easily be distributed
5.9 Describe TWO ways in which available bandwidth plays a role when watching videos online from services like
YouTube. (2)
More bandwidth – better quality video
More bandwidth – smooth playback
Lower bandwidth can make watching videos online impossible
More bandwidth – one can get ‘capped’ quicker as higher bandwidth allows users to stream in higher
quality, which uses more data.
6.2 Questionnaires are an effective way of sourcing data from a group of people.
6.2.2 Which application software would be best suited to handling information from a questionnaire? Motivate your
answer. (2)
Spreadsheet
Results from a questionnaire can be easily analysed using a spreadsheet
6.3 Give TWO examples where you would use a database instead of a spreadsheet to process data. (2)
When there is a need to relate or link data
Easier to perform queries to find specific informatio
To produce reports
When graphical representation of results is not required
To provide an easier format for users to enter data using a form
Multiple users can edit the database at the same time
Data bases have the capacity to store more data than a spreadsheet
When the bulk of the information entered is not numerical
7.2 State ONE typical way in which your computer may be misused by cybercriminals if they use your computer as part of their
botnet (zombie army). (1)
Spamming
Distributed Denial-of-Service attacks
Brute-force dictionary attacks on servers
Unauthorised banner display
Click jacking (the malicious practice of manipulating a website user's activity by concealing hyperlinks beneath
legitimate clickable content,)
52
7.4 Describe TWO potential negative effects that the use of social networks can have on people. (2)
You may start thinking that casual acquintances on social networking sites are your real friends
Dangers of cyber-stalking/cyber-bullying
Danger of online predators/paedophiles
Someone you do not know may monitor your online presence and seek to benefit from it to your
disadvantage
Social networks are very addictive
7.5 Passwords are important for protecting users when accessing websites.
7.5.1 State TWO strategies or techniques you can use to create or manage strong passwords. (2)
Keep your password length as long as possible
Make sure passwords do not contain recognisable words
Never use the same password for more than one domain/service
Your password should contain a mix of uppercase and lowercase letters, numbers and special characters
Encrypt your passwords
Make use of password management systems/software e.g. KeePass, LastPass etc.
7.6 Name ONE legally acceptable use of file-sharing application, such as BitTorrent. (1)
May be used for legal downloads, e.g. open-source software
May be used to distribute documents or other files on which no copyright is applicable
7.7 Give your opinion regarding the following statement by giving TWO reasons or examples to support your
answer.
AND/OR
8.1.1 Rewrite the HTML code segment below and correct it. (1)
<h1CAT<h1
<h1>CAT</h>
8.1.2 Identify the problem that will occur when the error-free code segment below is executed in a browser
Suggest ONE way of fixing the problem (2)
<html>
<body bgcolor=”black”>
<h1>Hello World</h1>
</body>
</html>
The text and background colour will both be black, making the text ‘Hello World’ invisible.
53
A possible solution:
Change page background colour
<body>
<body bgcolor=’yellow’>
Change font colour
<font color=’white’>Hello World</font>
<font color=’white’><h1>Hello World</h1></font>
8.2.1 Indicate in which section the function =Count(*) must be placed in a database report in order to count the number
of records for each group of records in the report. (1)
Group footer
Group header
8.2.2 Identify the type of database object in which you are likely to find the formula below. (1)
Total:[Price]*[Quantity]
Query
8.3 Mr Cele is sharing a document with his brother who is using an older version of the word processing
application than the one that Mr Cele uses.
8.3.1 What must Mr Cele consider when saving documents, so that there are no formatting problems when it is
accessed on his brother’s computer? Motivate your answer (2)
Save the document in an older format
This will ensure that backward compatibility/formatting is retained when used with older versions of the
application
8.4.1 What is the difference in use between the spreadsheet functions COUNTIF and COUNTA? (2)
COUNTIF – counts the number of cells within a range that match a given condition
COUNTA – counts the number of cells in a range that are not empty
Your school has to elect a new School Representative Council. The principal would like to hold an election using
computers and a program that will allow pictures of the candidates to be shown on the computers. This will not
only save time (as the computers will automatically total the votes) but will also save on costs, such as paper. Mr
Dawson, the principal of your school, has asked your CAT class to help organise and run the election process.
54
9.1 Mr Dawson has ordered 20 new computers to help with the election process Answer the questions below he
has regarding the computers he has ordered.
9.1.2 The integrated video adapters use shared memory as opposed to dedicated memory.
Explain to Mr Dawson the difference between shared memory and dedicated memory (2)
The video adapter does not have its own dedicated memor
It shares/uses the RAM on the computer
9.1.3 Election candidates will have their photos shown on the screens. Students can vote by clicking on the
photos displayed on the screen.
Identify TWO possible advantages for voters during the election process if they were to use touch screens.(2)
More intuitive to use by voters
No need to use cumbersome keyboards or a mouse
Less complicated for those who are not computer literate
9.2 Mr Dawson needs to take pictures of all the candidates to place on the computers
9.2.1 Give TWO reasons why Mr Dawson should use a digital camera to take pictures instead of a webcam (2)
Easier to move around with digital a camera
The average digital camera takes much better quality photographs
More features such as ISO settings, scenee selection
9.2.2 Mr Dawson needs to transfer the photographs he has taken from the digital camera to his computer.
State TWO ways in which he can accomplish this. (2)
Using the cable supplied with the camera to connect he camera to the computer
Place the camera’s memory card into a card reader on the computer
Some digital cameras have a wireless functionality such as Bluetooth or Wi-Fi which will allow photograps
to be transferred to the computer
Using a memory card that has Wi-Fi capabilities (such as the Eye-Fi memory card)
9.2.3 The photographs from the digital camera take up a large amount of storage space which means the
memory card needs to be emptied regularly.
Outline TWO possible ways in which more photographs can be taken before Mr Dawson would need to empty the
memory card. (2)
Install a memory card with more storage space
Lower the resolution of the photograhs the camera takes
9.2.4 Give ONE example of information that Mr Dawson would be able to retrieve from the megadata in an image file.
(1)
ISO speed.
Aperture
Whether the flash was used
The GPS location the photograph was taken at
Camera brand and model
Shutter speed
9.3 If the voting data is backed-up, then the results and other reports can always be created.
Mr Dawson needs to make sure that the voting data from the election is backed up properly.
9.3.2 Give TWO possible reasons why most people do not regularly make backups. (2)
People forget to make back-ups regularly
Some people don’t know how to make back-up
Back-ups can be expensive to make due to the need for extra hardware
55
9.3.3 State TWO advantages of using cloud storage instead of storage media such as CDs, DVD’s and flash drives for
backups. (2)
Can access data from anywhere in the world where Internet connection is available
Saves local storage
Data is less likely to be lost
9.4 Staff will be able to vote from their wireless devices such as smartphones and tablets.
9.4.1 State TWO advantages of using an on-screen keyboard on a smartphone or a tablet instead of a traditional
physical keyboard. (2)
More space available for a larger screen
Keyboard layout can be changed as needed
The size and shape of the keys and keyboard can be adjusted via software
9.5 The local IT technician has provided Mr Dawson with a biometric security device that may be used during
the voting process.
9.5.1 State ONE advantage of using biometric security to ensure that each learner can only vote once. (1)
Biometric input accurately identifies the user
Much easier for users than typing in passwords
More difficult to ‘get-around’/bypass it
9.5.3 Mr Dawson cannot find the original installation CD that contains the drivers needed to install the biometric device.
Identify TWO possible sources other than the installation CD where he can try and find the necessary driver.(2)
The original supplier
The Internet (supplier website or a third party website
On a ROM chip integrated into the device
The driver might be included in the operating system
From someone who has the same device
From a computer store
9.6 Mr Dawson would like to make printouts of important documents before and after the election process.
Recommend a type of printer for each of the scenarios below:
Do NOT give brand names or specific models; just the TYPE of printer that would be best suited.
9.6.1 Printing high quality colour pictures that will be put up in the school for learners to see who they can vote for.
(1)
Inkjet/Photo printer
9.6.2 Printing a document that will contain the rules for the election process. The school will print 900 monochrome
(black and white) pages. (1)
Laser printer
9.7 Mr Dawson will be using his personal laptop to finalise the election results. Unfortunately, he sometimes
has trouble with his laptop and printer. Explain to him how he can solve the following problems:
9.7.1 The laptop has slowed down considerably over the last year.
Give TWO possible reasons for this. (2)
Fragmentation
Antivirus software may be using too many resources
Too many programs loaded/not enough RAM available
Malware might have infected the computer
56
9.7.2 One of the applications Mr Dawson is using has stopped responding to all input.
Outline the process he should follow to close the non-responding application. (2)
Press Ctrl, Alt and Del buttons/Activate task manager
Terminate the non-responding application
9.8 Mr Dawson would like to publish the pictures and names of the election candidates in a blog.
9.8.1 Discuss TWO reasons that would make a blog the preferred solution for publishing the names and pictures .(2)
Blogs are easy to create
Blogs are usually free
Readers can subcribe to the blog for updates (via RSS)
Readers can read commentsl on posts
9.8.2 Parents want to keep up to date with regards to the election via the blog. However some of the parents also
have other blogs they frequently read.
Outline a possible solution to their problem which would allow them to read new posts from all of the blogs without
needing to visit each website separately. (1)
9.9 Some of the learners are on a sports tour in a different province. They will be casting their votes via the
Internet.
Explain to Mr Dawson how a firewall would ensure the security of a network. (1)
The firewall will prohibit any unauthorised access to the network from the Internet
9.10 Mr Dawson has approached an ISP for an uncapped, shaped Internet connection
9.10.1 Distinguish between the term uncapped and shaped with reference to an Internet connection. (2)
Uncapped refers to the fact that there is no limit to the amount of data that can be uploaded or
downloaded.
Shaped refers to limiting the speed of certain services e.g. video stream
9.10.2 The ISP has warned Mr Dawson that high usage on the uncapped line will result in the line being
throttled.
Explain to Mr Dawson what the term throttled means in this context. (1)
If more than a certain amount of data is downloaded or uploaded the download/upload speed of the line
will be reduced.
9.11 Mr Dawson needs to update two of the softwar packages on the computers in order for the election to
proceed as planned
9.11.1 Explain to Mr Dawson the difference between a service pack and a patch. (2)
A patch is a small piece of software that is used to correct a specific problem with a program
A service pack is a collection of patches/updates released as one download/installation media
9.11.2 State TWO possible ways in which Mr Dawson can acquire the service packs/patches needed to update the
software. (2)
Activating the automatic update option
Click on the update option within the application
Manually download and install the relevant patch/service pack
Acquire a storage medium such as a CD with the required patch/service pack on it
9.11.3 One of the applications has been discontinued and needs to be replaced. Mr Dawson has been advised to
find and install a shareware version of the application.
Name TWO benefits of using shareware. (2)
Installing shareware software allows one to first see if all the appropriate functions/feature are available
That will prevent that you waste money on software the does not meet your needs
57
9.12 Due to the fact that the network will be connected to the Internet, Mr Dawson is worried about security
risks affecting the computers on the network.
Describe to him what each of the following security risks are:
9.13 Mr Dawson needs to send an e-mail to each of the election candidates. He notices the option of adding an
address in the Cc or Bcc field.
Explain to him what the difference is between the the Cc field and the Bcc field. (2)
Addresses in the Cc field are visible to all the other recipients
Addresses in the Bcc field are not visible to other recipients
Printed up to here
PAPER 6
QUESTION 1 – MATCHING ITEMS
Write down only the number of the description from Column A, and next to it the correct
matching capital letter from Column B. (10)
1.7 The rate at which data is transferred from one point to another G Style H
K Spooler
L Broadband
M EULA
N Macro
O IF
58
Various options are given as possible answers to the following questions. Choose the answer and write only the
letter (A-D) next to the question number. (10)
2.1 Which ONE of the following is not a way of contributing to ‘green computing’?
A Replacing hardware every two years
B Refilling ink and toner cartridges
C Using hardware that is “Energy Star” compliant
D Limiting the amount of printing done in an office
2.2 Which ONE of the following would NOT represent a service typically provided with an e-banking facility?
A Inter-account transfers
B Balance enquiries
C Withdrawing cash
D Paying of bills
2.3 An area in a public place such as a restaurant, where you can gain access to the internet, is known as a(n)
A WISP
B ISP
C LAN
D hotspot
2.4 Which one of the following would you use to transfer files from your cell phone to your computer?
A HTTPS
B WAN
C Bluetooth
D ADSL
2.5 The dumping of hardware technology in landfill sites is also known as...........
A e-learning
B e-computers
C e-scrap
D e-commerce
2.6 A term referring to the gap between people who have access to technology and those who do not:
A Digital device
B Illiterate
C Digital divide
D e-gap
2.7 Software or a function of a browser that can be used to stop learners accessing unsuitable websites is called:
A Freeware
B A filter
C Encryption software
D Shareware
2.8 Which ONE of the following e-mail options allows you to send a copy of the message so that the recipient’s name is
visible to other recipients of the message?
A Bcc
B Forward
C To
D Cc
2.9 Which ONE of the following CANNOT be used as a data source for mail merge in a word processing program?
A A presentations file
B A spreadsheet file
C A word processing document
D A database file
2.10 Which ONE of the following spreadsheet function will be used to count only the numeric entries in a list?
A COUNTA
B COUNT
C SUMIF
D COUNTIF
59
SECTION B
Read the scenario below carefully as the questions that follow are based on it.
SCENARIO
The librarian at your school, Mr Books, has decided to start using computers in the school’s media
centre/library for administration. Unfortunately his computer knowledge is not as high as will be needed. He
has approached you as the Grade 12 Computer Application Technology learners to help him make the
correct decisions. You will be acting as the team leader and will be dealing with Mr Books directly
QUESTION 3
3.1 Mr Books will need a computer that he will be using for the administration of the library. He has decided that he will
need to buy a laptop and received the following specifications on a quote from the local IT technician”:
LAPTOP
3.1.1 Mr Books wants to create documents such as letters, spreadsheets and slideshows about his library. (1)
What type of software package would he be required to install on the laptop to create the above-mentioned items?
3.1.3 Besides the above hardware component, name TWO more hardware devices he should have to make video
conferencing possible. (2)
3.1.4 The laptop does not contain a modem as standard. Will Mr Books be able to connect to the internet without a
modem? Give a reason for your answer. (2)
3.1.5 Mr Books would like to know whether he should buy an operating system. You explain that an operating
system is already present.
Identify the operating system of the laptop. (2)
3.1.6 The advert lists Bluetooth as being a standard connection on the laptop.
List TWO advantages of Bluetooth over infrared data transmission.
60