0% found this document useful (0 votes)
3 views12 pages

IT GR 11 June 2024 P2 Eng

The document is an examination paper for Grade 11 Information Technology, consisting of six sections covering various topics such as systems technologies, communication technologies, social implications, and solution development. It includes instructions for answering questions, a total of 120 marks, and a time limit of 3 hours. The paper features multiple-choice questions, short answer questions, and practical coding tasks.

Uploaded by

cotsokatlego
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views12 pages

IT GR 11 June 2024 P2 Eng

The document is an examination paper for Grade 11 Information Technology, consisting of six sections covering various topics such as systems technologies, communication technologies, social implications, and solution development. It includes instructions for answering questions, a total of 120 marks, and a time limit of 3 hours. The paper features multiple-choice questions, short answer questions, and practical coding tasks.

Uploaded by

cotsokatlego
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

GRADE 11

INFORMATION TECHNOLOGY

THEORY EXAMINATION – PAPER 2

JUNE 2024

MARKS: 120

TIME: 3 HOURS

This paper consists of 12 pages including the cover page.

Make sure you have the complete set.

Copyright reserved Please turn over


Information Technology/P2 2 June 2024
FS DBE

INSTRUCTIONS AND INFORMATION

1. This question paper consists of SIX sections:

SECTION A: Short Questions (15)


SECTION B: Systems Technologies (20)
SECTION C: Communication and Network Technologies (20)
SECTION D: Social implications (15)
SECTION E: Solution Development (15)
SECTION F: Integrated Scenario (35)

2. Read ALL the questions carefully.

3. Answer ALL the questions.

4. The mark allocation generally gives an indication of the number of


facts/reasons required.

5. Number the answers correctly according to the numbering system used in this
question paper.

6. Write neatly and legibly.

Copyright reserved Please turn over


Information Technology/P2 3 June 2024
FS DBE

SECTION A: SHORT QUESTIONS

QUESTION 1

1.1 Various options are provided as possible answers to the following questions.
Choose the answer and write only the letter (A–D) next to the question
number (1.1.1–1.1.10) in the ANSWER BOOK.

Example: 1.1.11 D

1.1.1 With which hardware device would you associate a SATA


connector?

A Monitor
B Hard drive
C CPU
D DIMMs (1)

1.1.2 This processing technique allows programs to split CPU time


between multiple tasks.

A Multitasking
B Pipelining
C Multithreading
D Multiprocessing (1)

1.1.3 Collection of programs that is designed to infiltrate and control a


computer.

A Spoofing
B Cloning
C Rootkit
D Computer worm (1)

1.1.4 Working in decentralised locations, e.g. from home, but using


modern communication occasionally to ‘check in’ at a physical office.

A Virtual office
B Mobile office
C Telecommuting
D Home office (1)

1.1.5 Why is a text file still empty after writing to it (no error messages)?

A The integers have not been converted to strings


B The file has been opened to read from.
C The file has not been closed after writing.
D The try – except block has been omitted. (1)

Copyright reserved Please turn over


Information Technology/P2 4 June 2024
FS DBE

1.1.6 The correct way to validate if a string (sName) is empty is:

A if sName = null
B if the length of the string is less than 0.
C if the string cannot be seen on the screen when it is displayed
D if the length of the string is 0. (1)

1.1.7 …….. is a network that allows users to log into a network from a
remote location via the Internet?

A Personal Area Network


B Local Area Network
C Virtual Private Network
D Wireless Local Area Network (1)

1.1.8 The total amount of data that can be transferred from one point to
another in a given period of time is called?

A Data bundles
B Baud rate
C Bandwidth
D Megabits per second (1)

1.1.9 Which one of the following is an example of a microblogging


service?

A Twitter
B Instagram
C Facebook Messenger
D Snapchat (1)

1.1.10 To check the range or boundaries…

A ensures that users enter only alphabetic data into a field.


B determines whether the data entered is within a fixed set of
values.
C ensures that users enter only numeric data into a field.
D verifies that a required field contains data. (1)

Copyright reserved Please turn over


Information Technology/P2 5 June 2024
FS DBE

1.2 Give one word/term for each of the following. Please write ONLY the
word/term next to the question number in your answering book.

1.2.1 The configuration of two or more hard drives designed to minimise the
possibility of data loss. (1)

1.2.2 A start-up test performed by the BIOS to ensure that all essential hardware is
present and in working order. (1)

1.2.3 A device (or software) used to block unauthorised access to a network. (1)

1.2.4 The capability of a machine to imitate intelligent human behaviour. (1)

1.2.5 The layout of the physical connection of the computers in a network. (1)

TOTAL SECTION A: 15

Copyright reserved Please turn over


Information Technology/P2 6 June 2024
FS DBE

SECTION B: SYSTEMS TECHNOLOGIES

QUESTION 2

2.1 What is a ZIF (Zero Insertion Force) socket used for? (1)

2.2 Modularity is a very important concept regarding the design of computer


hardware.

Suggest TWO reasons why hardware modularity within a computer is


important. (2)

2.3 The CPU does (almost) all the work in the computer. List the FOUR steps (of
the machine cycle) it typically goes through to carry out an instruction. (4)

2.4 You have heard some of your IT friends say: “Firmware on some of the
computer components may need to be upgraded”.

2.4.1 Would you find firmware on ROM, EEPROM or in the RAM?

Explain your answer. (2)

2.4.2 Define the term firmware. (2)

2.4.3 List THREE reasons for upgrading firmware on a device. (3)

2.4.4 What does ‘flashing the ROM’ mean? (1)

2.5 You have been given a task of testing the capabilities of an application
developed by your employer on multiple operating systems. It has been
suggested that you could manage this faster if you apply virtualisation using
the one newly purchased machine they have given you.

2.5.1 Give an example of virtualisation software. (1)

2.5.2 Explain in steps how you would set up and use virtualisation to test
the program on the various operating systems. (4)

TOTAL SECTION B: 20

Copyright reserved Please turn over


Information Technology/P2 7 June 2024
FS DBE

SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES

QUESTION 3

3.1 State TWO reasons why you would connect computers in a network. (2)

3.2 The major roll-out of FTTH (Fibre to the Home) in South Africa, has been
adopted mostly by former LTE subscribers.

3.2.1 Explain why FTTH is superior to other typical wireless transmission


media. (2)

3.2.2 Between FTTH and LTE, which one would you expected to have
high subscription installation costs? Explain your choice. (2)

3.3 List TWO devices needed for connection in a wired network. (2)

3.4 Cellular service providers like Vodacom, Telkom etc, have noticed that voice
service is no longer profitable as compared to internet service.

3.4.1 VoIP software on cell phones is free. Give TWO other advantages of
VoIP in general. (2)

3.4.2 Microblogging has proven to be a quicker channel for spreading


news online. Explain what microblogging is. (1)

3.5 Email remains the best way to communicate with other people. Name TWO
protocols that make it possible for emails to be sent and received. (2)

3.6 Explain what push-technology is in terms of mobile users using email


facilities. (2)

3.7 Mobile devices need to be always-on for the user to have optimum
experience of the device.

3.7.1 Explain what is meant by always-on. (1)

3.7.2 Browsers offer users the “Dark Mode” view, in order to reduce the
power consumption of mobile devices.
Suggest TWO other ways that can reduce the power consumption of
mobile devices. (2)

3.8 Location-based computing has become integral in how mobile applications


function.

Give TWO examples of how location-based computing is used by software on


mobile devices. (2)

TOTAL SECTION C: 20

Copyright reserved Please turn over


Information Technology/P2 8 June 2024
FS DBE

SECTION D: SOCIAL IMPLICATIONS

QUESTION 4

4.1 Your school has recently been given a server with 35 computers. A network
administrator has been tasked to implement network policies.

4.1.1 What are network policies? (2)

4.1.2 Where would the network administrator make changes to network


policies? (1)

4.1.3 What aspect of password policy can the network administrator set to
ensure that the learners choose secure passwords? (1)

4.1.4 What should a user do to ensure a secure password?


Provide THREE criteria for a secure password. (3)

4.1.5 You notice that some of the learners are able to access websites
that are illegal at your school. How can the network administrator
remedy this problem? (1)

4.2 The school has decided to implement an Acceptable Use Policy addressing
how learners use the network. What is the purpose of an Acceptable Use
Policy? (2)

4.3 Internet service providers frequently make use of an Acceptable Use Policy
for uncapped connections.

4.3.1 What is meant by throttling? (2)

4.3.2 State ONE reason why an ISP would throttle a user. (1)

4.3.3 Do all uncapped connections really provide unlimited data usage?


Motivate your answer. (2)

TOTAL SECTION D: 15

Copyright reserved Please turn over


Information Technology/P2 9 June 2024
FS DBE

SECTION E: SOLUTION DEVELOPMENT

QUESTION 5

5.1 A figure must be shown on the screen. The format depends on a number
provided by the user. If the number 3 is provided the figure generated is:
*
**
***
If the number 4 is provided, the figure generated is:
*
**
***
****

The following code is provided:

Line nr Code
1 iNum := StrToInt(InputBox(' ','Provide a nr',' '));
2 for i := 1 to (a) do
3 Begin
4 s := (b);
5 for j := 1 to (c) do
6 Begin
7 s := s + '*';
8 end;
9 Memo1.Lines.Add( (d) );
10 end;

Provide the whole completed line when you answer the next four questions.

(a) Complete line 2. (2)

(b) Complete line 4. (2)

(c) Complete line 5. (2)

(d) Complete line 9. (2)

Copyright reserved Please turn over


Information Technology/P2 10 June 2024
FS DBE

5.2
Index 1 2 3 4 5 6 7
Value 10 8 14 13 10

The declaration for the above array is:


arrNums := array [1..7] of integer;

The variable iElements (of type integer) is also declared and is used to
indicate the number of elements (values) in the array. The value of iElements
is currently 5.

The following code is provided. It should determine the sum of all the values
at even indices and print the final sum to the screen:

Line nr Code
1 (a)
2 for i := 1 to (b) do
3 Begin
4 if (c) then
5 Begin
6 Inc( (d), arNum[i])
7 end;
8 end;
9 Memo1.Lines.Add('End of program');
10

Please provide the whole completed line when you answer questions
(a) to (e) below:

(a) Line 1. (1)

(b) Complete line 2. (1)

(c) Complete line 4. (2)

(d) Complete line 6. (1)

(e) The final sum has not been displayed.


Between which two lines should the code to display the final sum be
inserted? (2)

TOTAL SECTION E: 15

Copyright reserved Please turn over


Information Technology/P2 11 June 2024
FS DBE

SECTION F: INTEGRATED SCENARIO

QUESTION 6

Due to the recent drought in the country, the Government implemented some strict
water restrictions. Although these restrictions have since been lessened, there remains
a need for continued monitoring of water levels, and water consumption. The
Government has spent huge amounts of money on these monitoring systems, but
there are still systems in place that need to be maintained and monitored.

Answer the following questions about the influence that ICT systems can have on
these matters.

6.1 Inspectors are sent out to investigate claims of water abuse. They have to
document proof of the abuse and use mobile devices to take pictures. What is
the technology that is used when including GPS information with a photo? (1)

6.2 The communication part of ICT was crucial for the Government during the
drought.

6.2.1 The government can send information, regarding the status of a


natural disaster like a drought, using different technologies. Briefly
describe TWO different communication technologies where e-
communication can be used.

Name the type of technology and provide an example of the type of


information that can be sent out using these communication
technologies. (4)

6.2.2 Explain how ICT systems make the prediction of the weather easier. (2)

6.3 In addition to monitoring water usage, the government also monitors dam
levels. There are computerised systems in place for this.

6.3.1 These systems need to send daily updates about the changes in
water levels. What is the most stable internet connection that can be
used for these communications? (1)

6.3.2 When creating the monitoring software, would a low-level or a high-


level programming language be better suited? Motivate your
answer. Your motivation should demonstrate a clear understanding
of what each is best suitable for. (2)

6.4 Each dam control room will need to have a server.

6.4.1 What connection type would be best suited to connect the sensor to
the server? (1)

6.4.2 Servers come with hot-swappable hard drives. Explain the concept
of hot-swappable. (2)

Copyright reserved Please turn over


Information Technology/P2 12 June 2024
FS DBE

6.5 Threats to data are a very real concern for the government. Answer the
following questions about threats to the data.

6.5.1 In a corporate environment, data has to be secured both physically


and electronically. Name one way in which data can be secured
physically. (1)

6.5.2 Making backups of data is not always as simple as simply copying


the files to an external hard drive. In addition to copying files, what
else does backup software, like Windows Backup make backups of
when creating a backup? (1)

6.5.3 Why is this (your answer to 6.5.2) so advantageous? (1)

6.5.4 What is the main advantage of making use of online backup


services? (2)

6.5.5 Explain the difference between backing up data and archiving data. (4)

6.6 Almost all servers are connected to a UPS device.

6.6.1 Explain what a UPS is. (2)

6.6.2 Why is it important for servers to be connected to UPS devices? (2)

6.7 Inaccurate data is useless. Explain the difference between validating data and
verifying data. Use examples in your explanation. (4)

6.8 Water usage meters still depend on manual inspection. Human errors can
easily occur as it relies on people to physically go out to the correct address,
write down the water meter reading, and then re-enter the data once they get
back to the office. Answer the following questions about how this process can
be improved.

6.8.1 Hand-held devices can be used to read the information from the
meter. What would be the simplest way to identify the water meter,
using the handheld scanner? (1)

6.8.2 What would be the best technology to provide these handheld


devices with internet connectivity (1)

6.8.3 Which operating system would be best suited for these handheld
devices, when taking into consideration that they will have to have
internet access, be able to send and receive e-mails, monitor water
levels on water meters, as well as dams.
State TWO reasons for your choice. (3)

TOTAL SECTION F: 35

GRAND TOTAL: 120

Copyright reserved

You might also like