IT GR 11 June 2024 P2 Eng
IT GR 11 June 2024 P2 Eng
INFORMATION TECHNOLOGY
JUNE 2024
MARKS: 120
TIME: 3 HOURS
5. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
1.1 Various options are provided as possible answers to the following questions.
Choose the answer and write only the letter (A–D) next to the question
number (1.1.1–1.1.10) in the ANSWER BOOK.
Example: 1.1.11 D
A Monitor
B Hard drive
C CPU
D DIMMs (1)
A Multitasking
B Pipelining
C Multithreading
D Multiprocessing (1)
A Spoofing
B Cloning
C Rootkit
D Computer worm (1)
A Virtual office
B Mobile office
C Telecommuting
D Home office (1)
1.1.5 Why is a text file still empty after writing to it (no error messages)?
A if sName = null
B if the length of the string is less than 0.
C if the string cannot be seen on the screen when it is displayed
D if the length of the string is 0. (1)
1.1.7 …….. is a network that allows users to log into a network from a
remote location via the Internet?
1.1.8 The total amount of data that can be transferred from one point to
another in a given period of time is called?
A Data bundles
B Baud rate
C Bandwidth
D Megabits per second (1)
A Twitter
B Instagram
C Facebook Messenger
D Snapchat (1)
1.2 Give one word/term for each of the following. Please write ONLY the
word/term next to the question number in your answering book.
1.2.1 The configuration of two or more hard drives designed to minimise the
possibility of data loss. (1)
1.2.2 A start-up test performed by the BIOS to ensure that all essential hardware is
present and in working order. (1)
1.2.3 A device (or software) used to block unauthorised access to a network. (1)
1.2.5 The layout of the physical connection of the computers in a network. (1)
TOTAL SECTION A: 15
QUESTION 2
2.1 What is a ZIF (Zero Insertion Force) socket used for? (1)
2.3 The CPU does (almost) all the work in the computer. List the FOUR steps (of
the machine cycle) it typically goes through to carry out an instruction. (4)
2.4 You have heard some of your IT friends say: “Firmware on some of the
computer components may need to be upgraded”.
2.5 You have been given a task of testing the capabilities of an application
developed by your employer on multiple operating systems. It has been
suggested that you could manage this faster if you apply virtualisation using
the one newly purchased machine they have given you.
2.5.2 Explain in steps how you would set up and use virtualisation to test
the program on the various operating systems. (4)
TOTAL SECTION B: 20
QUESTION 3
3.1 State TWO reasons why you would connect computers in a network. (2)
3.2 The major roll-out of FTTH (Fibre to the Home) in South Africa, has been
adopted mostly by former LTE subscribers.
3.2.2 Between FTTH and LTE, which one would you expected to have
high subscription installation costs? Explain your choice. (2)
3.3 List TWO devices needed for connection in a wired network. (2)
3.4 Cellular service providers like Vodacom, Telkom etc, have noticed that voice
service is no longer profitable as compared to internet service.
3.4.1 VoIP software on cell phones is free. Give TWO other advantages of
VoIP in general. (2)
3.5 Email remains the best way to communicate with other people. Name TWO
protocols that make it possible for emails to be sent and received. (2)
3.7 Mobile devices need to be always-on for the user to have optimum
experience of the device.
3.7.2 Browsers offer users the “Dark Mode” view, in order to reduce the
power consumption of mobile devices.
Suggest TWO other ways that can reduce the power consumption of
mobile devices. (2)
TOTAL SECTION C: 20
QUESTION 4
4.1 Your school has recently been given a server with 35 computers. A network
administrator has been tasked to implement network policies.
4.1.3 What aspect of password policy can the network administrator set to
ensure that the learners choose secure passwords? (1)
4.1.5 You notice that some of the learners are able to access websites
that are illegal at your school. How can the network administrator
remedy this problem? (1)
4.2 The school has decided to implement an Acceptable Use Policy addressing
how learners use the network. What is the purpose of an Acceptable Use
Policy? (2)
4.3 Internet service providers frequently make use of an Acceptable Use Policy
for uncapped connections.
4.3.2 State ONE reason why an ISP would throttle a user. (1)
TOTAL SECTION D: 15
QUESTION 5
5.1 A figure must be shown on the screen. The format depends on a number
provided by the user. If the number 3 is provided the figure generated is:
*
**
***
If the number 4 is provided, the figure generated is:
*
**
***
****
Line nr Code
1 iNum := StrToInt(InputBox(' ','Provide a nr',' '));
2 for i := 1 to (a) do
3 Begin
4 s := (b);
5 for j := 1 to (c) do
6 Begin
7 s := s + '*';
8 end;
9 Memo1.Lines.Add( (d) );
10 end;
Provide the whole completed line when you answer the next four questions.
5.2
Index 1 2 3 4 5 6 7
Value 10 8 14 13 10
The variable iElements (of type integer) is also declared and is used to
indicate the number of elements (values) in the array. The value of iElements
is currently 5.
The following code is provided. It should determine the sum of all the values
at even indices and print the final sum to the screen:
Line nr Code
1 (a)
2 for i := 1 to (b) do
3 Begin
4 if (c) then
5 Begin
6 Inc( (d), arNum[i])
7 end;
8 end;
9 Memo1.Lines.Add('End of program');
10
Please provide the whole completed line when you answer questions
(a) to (e) below:
TOTAL SECTION E: 15
QUESTION 6
Due to the recent drought in the country, the Government implemented some strict
water restrictions. Although these restrictions have since been lessened, there remains
a need for continued monitoring of water levels, and water consumption. The
Government has spent huge amounts of money on these monitoring systems, but
there are still systems in place that need to be maintained and monitored.
Answer the following questions about the influence that ICT systems can have on
these matters.
6.1 Inspectors are sent out to investigate claims of water abuse. They have to
document proof of the abuse and use mobile devices to take pictures. What is
the technology that is used when including GPS information with a photo? (1)
6.2 The communication part of ICT was crucial for the Government during the
drought.
6.2.2 Explain how ICT systems make the prediction of the weather easier. (2)
6.3 In addition to monitoring water usage, the government also monitors dam
levels. There are computerised systems in place for this.
6.3.1 These systems need to send daily updates about the changes in
water levels. What is the most stable internet connection that can be
used for these communications? (1)
6.4.1 What connection type would be best suited to connect the sensor to
the server? (1)
6.4.2 Servers come with hot-swappable hard drives. Explain the concept
of hot-swappable. (2)
6.5 Threats to data are a very real concern for the government. Answer the
following questions about threats to the data.
6.5.5 Explain the difference between backing up data and archiving data. (4)
6.7 Inaccurate data is useless. Explain the difference between validating data and
verifying data. Use examples in your explanation. (4)
6.8 Water usage meters still depend on manual inspection. Human errors can
easily occur as it relies on people to physically go out to the correct address,
write down the water meter reading, and then re-enter the data once they get
back to the office. Answer the following questions about how this process can
be improved.
6.8.1 Hand-held devices can be used to read the information from the
meter. What would be the simplest way to identify the water meter,
using the handheld scanner? (1)
6.8.3 Which operating system would be best suited for these handheld
devices, when taking into consideration that they will have to have
internet access, be able to send and receive e-mails, monitor water
levels on water meters, as well as dams.
State TWO reasons for your choice. (3)
TOTAL SECTION F: 35
Copyright reserved