COMPUTER APPLICATIONS TECHNOLOGY PAPER 2
GRADE 12
NOVEMBER 2019
MEMORANDUM
NATIONAL SENIOR CERTIFICATE
SUGGESTIONS AND RECOMMENDATIONS TO MARKERS
- Revisit the questions and the marking guideline frequently during the marking session.
- It is advisable to read the question frequently (and re-read) together with the candidate's response to check that it correlates, so that you are not misled by the candidate's statements/answers.
- Be careful not to focus on keywords or general statements, but rather read the entire answer. If in doubt, read the entire answer and then the question paper and the marking guideline.
- Ask yourself or your senior marker if the response could 'fit' into the marking guideline before allocating the correct marks to the candidate.
- Accept correct answers that are expressed differently, e.g. the marking guideline states 'slow' and the candidate responds with 'not fast'.
- Beware of overlapping answers to a specific question. In general, ONE mark is awarded per fact.
- Do not choose answers on the candidate's behalf. Where a question requires a candidate to LIST or NAME/STATE: mark the first number of instances required, e.g. the first TWO facts if the candidate presents a list of FIVE facts and only TWO facts were required, even if presented in paragraph format.
- Questions requiring longer answers must be regarded as a single unit. Marks can be awarded if correct statements are found anywhere in the paragraph.
SECTION A
QUESTION 1: MULTIPLE-CHOICE
1.1 D(1)
1.2 C(1)
1.3 B(1)
1.4 B(1)
1.5 A(1)
1.6 D(1)
1.7 C(1)
1.8 D(1)
1.9 D(1)
1.10 A(1)
Total: [10]
QUESTION 2: MATCHING ITEMS
2.1 E(1)
2.2 O(1)
2.3 L(1)
2.4 S(1)
2.5 K(1)
2.6 P(1)
2.7 T(1)
2.8 F(1)
2.9 C(1)
2.10 R(1)
Total: [10]
QUESTION 3: TRUE/FALSE ITEMS
(Note to marker: In Question 3.1, 3.3, and 3.4 candidates need to provide both the word 'False' and the correct term, e.g. motherboard, in order to get the mark.)
3.1Fal se, WAN ✓/MAN
3.2 True ✓
3.3 False, driver ✓
3.4 False, (Disk) Cleanup ✓
3.5 True ✓
[5]
TOTAL SECTION A: 25
SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES
4.1 TWO input devices found on a laptop computer
- Keyboard/Keypad
- Touch pad/Track pad
- Microphone
- Camera/Webcam
- Fingerprint scanner
- Track point/Pointing stick
✓✓ (Any two) (2)
4.2 TWO reasons why all text on a touch screen device does not display
- On-screen keyboard is blocking the text
- Font size is too large (zoomed)/Screen size is too small
- More than one app is opened which takes up screen space
- Text is scrolled out of view/Auto-rotation is not turned on
✓✓ (Any two) (2)
4.3 TWO functions of a UPS
- Provides temporary backup power during power failures/dips✓ to save work
- Protects the computer from power surges/fluctuations/dips✓ (2)
4.4 TWO reasons for using a data projector instead of a monitor
- The display can be used for large groups of people
- Image size can be varied
- Can display on a variety of surfaces
- Data projector is easier to move/carry around (Comparable sizes)
✓✓ (Any two) (2)
4.5 TWO advantages of HDMI cables over VGA cables
- Digital signal results in better audio/video quality (higher resolution)/HDMI enables better quality images/display
- Transmits both audio and video data
- Faster data transfer
✓✓ (Any two) (2)
4.6 TWO reasons why 3D-printers are not commonly used in home offices
- Not multifunction: cannot scan/copy/cannot print on paper
- Home office users generally do not need to print 3D models
- Emissions may possibly be toxic (smelly/odour)
✓✓ (Any two) (2)
4.7.1 ONE reason why 1024x768 does not refer to size of the monitor
1024x768 refers to the resolution and NOT the physical screen size/display ratio/Screen size is given in inches✓(2)
4.7.2 Term used to describe why software will not work on an earlier version of the OS
Compatibility✓ (1)
4.8 TWO reasons for purchasing an office suite rather than applications by various software developers
- Office suite/Applications will have a similar GUI/environment
- Easy to share data between applications/Integration of data
- All applications are available from a single installation
- Only single update required for all applications
✓✓ (Any two) (2)
4.9 TWO causes for an application to stop responding
- Lack of system resources, e.g. Not enough RAM to run application/Lack of disk access/Too many applications running in the background/Application is in the process of updating
- Lack of network access/connectivity
- Hardware malfunction, e.g. faulty RAM, CPU overheating, etc.
- Corruption of the software/Faulty software/Software bug
- Malware, e.g. Virus infection, Hacking software
✓✓ (Any two)
(Note to marker: Allocate two marks if the candidate gives two valid points in the same bullet, e.g. Faulty RAM and faulty CPU.) (2)
4.10 TWO reasons why a picture becomes blurred or is unclear
- The picture size was increased/Pixilation
- It was saved at a lower resolution
- It was saved in a different file format
- Aspect ratio was changed
- Sharpness/Softness/Contrast of the picture was adjusted
- Graphic effects were applied
✓✓ (Any two) (2)
4.11 How convergence contributes to green computing
Fewer devices means:
- fewer resources/materials being used (in the manufacturing process)
- less going to landfills/less e-waste
- fewer emissions (e.g. in manufacturing/transport)
- less power/electricity being consumed
✓✓ (Any two) (2)
4.12.1 Term for analogue broadcast changed to digital broadcast
(Digital) migration✓ (3)
4.12.2 TWO advantages of digital broadcasting technology for the viewer
- Sharper picture/video/higher resolution/Support HD devices
- Streaming/video on demand
- Better quality sound
- More television channels available
- Music/Radio channels also available
- The availability of other services, e.g. optional languages/subtitles/parental lock, etc.
- Electronic programming guide
✓✓ (Any two) (2)
[25]
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES
5.1 TWO advantages of networked computers over stand-alone computers
- Sharing of hardware
- Installing/Sharing of applications
- Sharing of documents/files
- Enables communication between computers
- Centralised/Improved security is possible
- Updates can be shared/centralised
- Device management
- Sharing of internet connectivity
- Backups can be centralised
- Centralised data
✓✓ (Any two) (2)
5.2.1 Port to connect computer to a wired network
Port A/Ethernet port✓
(Note to marker: Accept Port B together with a motivation, e.g. adaptor.)(2)
5.2.2 Way to connect to a wireless network
(Wireless) dongle✓ in Port B
OR
Router/modem in Port A/B
(Note to marker: Do not accept Port A or B only.) (1)
5.3 Type of connection that uses light for data transmission
Fibre✓ /Li-Fi (1)
5.4 ONE solution for users to log on to a LAN
- Switch the server/switch on
- Refresh the user accounts/Restart the server/computer/ switch/Create new user accounts/Roll back the server to previous settings
- Plug the network cable in
- Faulty hardware: Replace the damaged network cable/Switch/Port
- Review user permissions (NOT passwords)/firewall/timed access
- Clean virus infection on the server
✓ (Any one) (1)
5.5 ONE reason why buffering occurs while streaming a video
- There is not enough bandwidth/High internet traffic
- ISP throttled your connection
- Problems with the streaming server
- Poor signal strength/Connection was interrupted
✓ (Any one) (1)
5.6 Purpose of a home page setting in a browser
Automatically loads a (favourite) web page every time the browser is started✓/Acts as an indirect bookmark (1)
5.7 TWO outcomes from clicking on a website hyperlink
- (Automatically) directs a user to other pages/sections of the website/other websites
- Opens the e-mail interface
- Can initiate/trigger file downloads/link to multimedia files
- Could result in a dialog box, e.g. Error message
✓✓(Any two) (2)
5.8 TWO ways to ensure privacy on social media: Facebook/ WhatsApp
- Ensure that only authorised people can see the posts/ content/Use privacy settings
- Disable cookies
- Disable/Restrict access to 3rd party apps/Disable sharing of data with social network service provider, if possible
- Block users that you do not want to communicate with
- Hide/Do not share personal details
- Disable the 'share location' feature
✓✓ (Any two) (2)
5.9 TWO limitations of e-commerce
- Items cannot be tried out before purchase
- Requires some form of banking account/Usually cannot transact in cash
- Not all services can be purchased through online stores, e.g. haircut, medical visits, etc.
- Relies on internet connectivity
- Digital skills
- Warranty claims can be difficult
- Can be impersonal
- May be exposed to fraud/scams
- Possible delay in delivery
✓✓ (Any two) (2)
5.10 Technology used to secure data
Encryption✓ /SSL/TLS (1)
[15]
QUESTION 6: INFORMATION MANAGEMENT
6.1.1 Purpose of an abstract
A brief summary/overview/outline of the report✓(2)
6.1.2 Purpose of an introduction
- To give a (description of the) purpose of the report
- To give background information about the topic
- To give a brief idea of what the researcher did/research process was to solve the problem
✓ (Any one)
(Note to marker: Do not accept 'target audience'.) (1)
6.2 TWO reasons for information not being suitable
- The author is not an authority on the topic/Cannot obtain bibliographical information
- The information is too old
- Information in the document was found to be plagiarised
- The information is biased
- The information is contradictory
- Information cannot be cross-referenced
- The information is very limited and does not adequately cover the topic
✓✓ (Any two) (2)
6.3.1 ONE limitation of closed questions in a questionnaire
- Limited options may lead to skewed data
- Options may be biased towards a point of view
- Respondent may want to give an answer not in the list/Limits possible responses that could be given by the respondent
- No indications of whether the respondent understood the questions
✓ (Any one)(3)
6.3.2 TWO benefits for a researcher when closed questions are answered electronically
- Easier to process/analyse responses in a graph/spreadsheet/ database
- The creation of graphs can be automated
- Can read all responses/Bad handwriting is not an issue/Do not have to retype the responses/Fewer errors in data
- Data capturing can be automated
- Easy to share data with others/publish dataset
- Data validation of responses can be done
- Possible response times are quicker
- Higher return rate is possible
✓✓ (Any two) (2)
6.4 THREE reasons why the graph is difficult to interpret
- The title obscures the content of the graph/The title may make it difficult to see detail/interpret the graph
- The graph shows a big difference in the bars but values are very close
- The combined percentages go well beyond 100%/It is not obvious that the graph displays parts of a whole/A pie chart would be more suitable
- The Y-axis starts at 80% rather than 0%/Incorrect upper and lower limits of the Y-axis
- The legend has a meaningless label
- Axes are not labelled
✓✓✓ (Any three) (3)
[10]
QUESTION 7: SOCIAL IMPLICATIONS
7.1.1 TWO activities on the internet that could lead to addiction
- Social networking/Constantly checking messages
- Checking profiles of others
- (Online) gaming
- Watching inappropriate content/pornography
- (Online) shopping/(online) auctions
- Watching (online) videos
- (Online) dating
- (Online) gambling
✓✓ (Any two) (2)
7.1.2 TWO warning signs of internet addiction
- Withdrawal from/Dislike of social activities/Isolation
- Obsessed with their internet activities/Spend all their time at the computer/Constant need for data
- Mental health issues/Depression/Anxiety/Aggression/Withdrawal
- Physical symptoms: Repetitive stress injuries/Carpal Tunnel Syndrome/Headaches/Fatigue
- Secretive behaviour with computing devices
- Truancy/Absence from school/work
✓✓ (Any two)
(Note to marker: Allocate two marks even if candidate lists two points from the same bullet.) (2)
7.2 TWO potential ethical problems of companies accessing big data
- Breach of privacy: Use of data for certain purposes/tasks without permission, e.g. selling people's data profiles to third parties for marketing
- Use of personal data to target/tempt specific people into making unnecessary purchases
- Companies may exploit data/Unfair bias becomes the accepted norm
- Lack of security controls/Open to cyber-attacks
✓✓ (Any two) (2)
7.3 ONE way law enforcement authorities could trace cyber criminals
- Track/Trace/Check on the internet activities of users, e.g. visiting questionable sites, posting offensive comments, etc.
- Internet activities leave behind data (breadcrumbs/History/cookies) that can be traced
- Profile users based on their internet activities
- Information provided by victims
✓ (Any one) (1)
7.4 ONE way in which social media is able to influence public opinion
Posts (opinions) made by influencers/celebrities/authorities/companies on social media manipulate/could influence public opinion/behaviour both positively or negatively ✓
(Note to marker: Accept any realistic response related to the influence of social media, e.g. Fake news, trending posts/comments, etc.) (1)
7.5 TWO negative effects of software piracy for creators
- Software manufacturers lose revenue/Loss of sales
- Discourages the creation of new software/Can affect the quality of new software developed
- Possible job losses
- Reputational damage because users are unaware of malware in the pirated software
✓✓ (Any two) (2)
[10]
QUESTION 8: SOLUTION DEVELOPMENT
8.1 ONE benefit of using styles for headings in a long WP document
- Easy to create a table of contents/Enables the use of automatic table of contents
- Consistent format of headings/Professional layout of document
- Easy to modify/update multiple headings at the same time
✓ (Any one)
(Note to marker: Only accept time saving when motivated.) (1)
8.2 TWO reasons for using sections breaks
- Different headers and footers can be applied to a document
- Different page numbering can be applied in one document
- Watermarks can be inserted on only some pages in one document
- Various page settings, e.g. page orientations/paper sizes/margins/borders can be applied to one document
- Various column layouts can be applied to one document
- Different vertical alignment options can be applied in one document
✓✓ (Any two) (2)
8.3 TWO word processing features used by a reviewer
- Tracking/Track changes/Markup
- Comments
- Use highlighting/use different colour fonts/strikethrough to indicate suggested changes (2)
8.4.1 ONE reason for the display of non-printing symbols
Show/Hide feature is activated/Show formatting, e.g. spaces, tabs, etc.✓(2)
8.4.2 Reason why there is no bullet next to 'Shelter'
Soft return/enter was used/Pressed Shift+Enter/Did not press the Enter key on its own/It is part of the bulleted text ✓(1)
8.5 How to use Page Break Preview in a spreadsheet
Drag the (blue) page break ✓ with the mouse to customise the printable area (1)
8.6 Purpose of the exclamation mark in a spreadsheet
Exclamation mark indicates a reference to another sheet/workbook/The cell A1 is in the 'data' worksheet✓ (1)
8.7 Cell format of a time answer in a spreadsheet
General/Number✓ (1)
8.8 TWO mistakes in a formula preventing correct autofill
- The reference to cell A2 should not be an absolute reference/The row reference cell A2 should not be an absolute cell reference/It should be A2 or $A2✓
- There should be absolute cell referencing ($) in cell E1/Cell E1 should be a complete absolute cell reference/It should be $E$1✓
(Note to marker: Allocate one mark for reference to absolute cell referencing without specifying the cells.) (2)
8.9 Purpose of square brackets in a database calculation
Square brackets reference a field (name) ✓ or a table
(Note to marker: Accept reference to extract a value from a column.
Do not accept 'Column heading' per se.) (1)
8.10 Effect of moving =Count(*) from DB group footer to report footer
The function will count all the values ✓ of all the records in the table/report instead of just the values of a group/It results in only one answer at the end of the report (1)
8.11 Tag for text to appear on the web browser tab
Move the text 'December Holidays' to between the title tags✓
(Note to marker: Accept <title> December holidays </title>.) (1)
[15]
TOTAL SECTION B: 75
SECTION C
QUESTION 9: INTEGRATED SCENARIO
9.1.1 Speed of the faster CPU
2.4 GHz✓
9.1.2 ONE reason for the tablet being more suitable for outdoor use
- A tablet is portable/Not dependent on external power source
- The tablet is LTE/4G/Wi-Fi enabled
- Can be easily tilted/moved around to avoid glare
✓(Any one) (1)
9.1.3 TWO ways to extend the storage space of the tablet
- Use an SD Card/memory card
- Use an (OTG) flash drive/external hard drive
- Use an online/cloud storage service
✓✓ (Any two) (2)
9.1.4 ONE reason for the desktop computer being better for graphics processing
- Has a (dedicated) video/graphics card
- Has more RAM
✓ (Any one)(1)
9.1.5 Explanation of an on-site warranty
The manufacturer will arrange for pickup or repair the device at the client's premises✓
Reason why tablets do not have on-site warranties
Tablets are small/portable enough for the owner to easily take it back to the store✓ (2)
9.2.1 ONE advantage of real-time communication
Interaction/Help is immediate/No delays in messages✓ (1)
9.2.2 TWO types of internet connection needed during the competition
- Satellite
- Cellular (3G, 4G, 5G, LTE)
- Wi-Fi/Wireless
✓✓ (Any two) (2)
9.2.3 TWO hardware devices used for video conferencing
- Webcam/Camera
- Speakers/Earphones/Headphones
- Microphone
- (Bluetooth) Headset
- Monitor/Screen/Projector
- Smartphone/Computer/Tablet
✓✓ (Any two) (2)
9.3.1 TWO online platforms to publish videos
- YouTube
- School's website/other websites
- Blogs/Vlogs
- WhatsApp/WeChat/Telegram (group)
- Facebook
- Instagram
- Snapchat
- TikTok
- Twitter
- Vimeo, etc.
✓✓ (Any two) (2)
9.3.2 How to locate a video on the internet
- Use the word 'video' in the search string✓/Set search type to video/video tab (advanced search)
- Search string must include the school name/cooking competition name/dish name/video name✓ (2)
9.3.3 TWO specifications of a camera that influence video quality other than the sensor
- Resolution/Megapixels
- Colour depth
- (Quality of the) lens
- Optical (vs digital) zoom
- Frame rate
- ISO rating
- File formats available for saving
- Video stabilisation/Shudder is reduced
- Speed of the memory card, etc.
✓✓ (Any two) (2)
9.3.4 TWO reasons for compressing video files
- To decrease the amount of data used when sharing files/Limited bandwidth for sharing files
- Possible limited storage space on the device/cloud service
- Faster uploading
✓✓ (Any two) (2)
9.4.1 TWO spreadsheet features for accurate data capturing
- Data validation/Drop down list
- Lock cells/Protect cells
- Conditional formatting
- Freeze panes
✓✓ (Any two)(2)
9.4.2 An alternative way to add values in a range
Use the SUM ✓ function (1)
9.4.3 Function to lookup data
VLOOKUP/HLOOKUP/XLOOKUP✓
(Note to marker: Accept an answer that uses MATCH and INDEX together.) (1)
9.4.4 ONE way to make a spreadsheet document available on any OS
- Save as PDF
- Print to PDF
- Save/Convert a screenshot to any picture format
✓ (Any one) (1)
[25]
QUESTION 10: INTEGRATED SCENARIO
10.1 TWO specifications to consider when buying a printer
- Resolution/DPI/Quality of the printouts
- Printer speed/PPM
- Connectivity options, e.g. Wireless, USB, etc.
- Printer capacity (industrial level)/Duty cycle
- Multifunction ability, e.g. copying, scanning, etc.
- Paper size/Borderless printing
- User interface options
- Duplex/Two-sided printing option
- Colour/Monochrome printing
- Printing technology, i.e. size and number of ink tanks, toner, etc.
- Paper tray capacity
✓✓ (Any two) (2)
10.2.1 ONE kind of damage to a computer from a power surge
- Hardware damage, e.g. to power supply, motherboard, etc.
- Corruption/Loss of data
✓ (Any one) (1)
10.2.2 TWO ways to dispose of a computer in an environmentally friendly way
- Recycle the components
- Use a service provider/retailer that disposes of e-waste
- Re-use/sell/donate working components
✓✓ (Any two) (2)
10.3.1 Type of user that uses high-end hardware and software
Super/Power user✓ (1)
10.3.2 TWO reasons to restrict access to the server room
- Additional layer of access control for employees
- To prevent burglaries/theft of data/hardware
- To prevent physical damage/vandalism/tampering with the network
✓✓ (Any two) (2)
10.3.3 TWO reasons for blocking USB ports
- Theft of data/Unauthorised copying of data
- Flash drives often carry viruses
- Prevents employees from attaching other devices
- Prevents employees from bringing in games/personal documents/software, etc.
✓✓ (Any two) (2)
10.4 TWO benefits of grid computing
- Large processing tasks are shared over many computers/Enormous processing power
- Can use existing resources/No need to buy an expensive supercomputer
- The failure of one computer will not affect processing of tasks
- Scaling of processing power is easy
- Uses idle resources
✓✓ (Any two) (2)
10.5.1 Cause of the software problem
Bug ✓
Solution
- System restore/Roll back to previous date/time where the software worked properly
- Install a patch/service pack (from the vendor website)
- Re-install the software
✓ (Any one)
(Note to marker: Accept 'Glitch' as the cause with 'Restart' as the solution.) (2)
10.5.2 TWO reasons why OS updates should NOT automatically download on networked computers
- Automatic updates may use a lot of bandwidth
- Automatic updates may use a lot of storage space
- Updates may slow down the network/Computers may restart automatically to install updates during times when they are in use
- Updates may cause the computers/network to become unstable/May cause compatibility issues with existing software/ Possible introduction of bugs
- OS updates may not be needed by the users
✓✓ (Any two)
(Note to marker: Do not accept any answer related to data usage and cost.) (2)
10.6.1 TWO reasons for automatic backups
- Saves time due to scheduled backups/No user intervention required for backups
- Ensures backup is always/regularly/timeously done/Employees may forget if done manually
- Time/schedule backups when computers are not in use
✓✓ (Any two)
(Note to marker: Do NOT accept reasons for a backup that is NOT automatic.) (2)
10.6.2 TWO guidelines in the policy for making backups, other than making regular backups or setting automatic backups
- Only backup when computers are not being used
- Do not store backups in the same location as the original data/Specify location of backups
- Specify a storage medium
- Backup to multiple types of media
- Do incremental backups to save space/data/Only backup recent data and not everything
- Do not backup software/programs that can be reinstalled
- Encrypt sensitive data on backup/Ensure changes cannot be made to the backup
- Testing of backups
- Responsible person for backups
✓✓ (Any two) (2)
10.7.1 Technology that is used to obtain location data
GPS✓ (1)
10.7.2 Term for the data that is embedded in a picture file
Metadata✓ /Geotagging (1)
10.8.1 Why the data type of StationID is Short Text
- No calculations will be done
- The zero at the start of the number will display/In a Number data type the zero at the start of the number will not display
- It may be a code in which the numbers carry a specific meaning
✓ (Any one) (1)
10.8.2 How to sort rainfall values in ascending order per station
- Group by StationName✓
- Sort by Rainfall✓ (2)
[25]
TOTAL SECTION C: 50
GRAND TOTAL: 150