COMPUTER APPLICATION TECHNOLOGY PAPER 2
GRADE 12
NATIONAL SENIOR CERTIFICATE EXAMINATIONS
MAY/JUNE 2020
SUGGESTIONS AND RECOMMENDATIONS TO MARKERS
- Revisit the questions and the marking guidelines frequently during the marking session.
- It is advisable to read (and re-read) the question frequently together with the candidate's response to check that they correlate, so that you are not misled by the candidate's statements/answers.
- Be careful not to focus on keywords or general statements, but rather read the entire answer. If in doubt, read the entire answer and then the question and the answer in the marking guideline.
- Ask yourself or your senior marker if the response could 'fit' into the marking guideline before allocating the correct marks to the candidate.
- Accept correct answers that are expressed differently, e.g. the marking guideline states 'slow' and the learner responds with 'not fast'.
- Beware of overlapping answers to a specific question. In general, ONE mark is awarded per fact.
- Do not choose answers on the candidate's behalf. Where a question requires a candidate to LIST, NAME or STATE: mark the first number of instances required, e.g. the first TWO facts if the candidate presents a list of FIVE facts and only TWO facts were required, even if presented in paragraph format.
- Questions requiring longer answers must be regarded as a single unit. Marks can be awarded if correct statements are found anywhere in the paragraph.
SECTION A
QUESTION 1: MULTIPLE-CHOICE
1.1 B ✓
1.2 C ✓
1.3 D ✓
1.4 C ✓
1.5 C ✓
1.6 A ✓
1.7 D ✓
1.8 B ✓
1.9 A✓
1.10 B ✓
Total: [10]
QUESTION 2: MATCHING ITEMS
2.1 P ✓
2.2 O ✓
2.3 H ✓
2.4 K ✓
2.5 M ✓
2.6 A ✓
2.7 D ✓
2.8 C✓
2.9 E✓
2.10 F✓
Total: [10]
QUESTION 3: TRUE/FALSE ITEMS
(Note to marker: In Question, 3.3, and 3.5 candidates need to provide both the word 'False' and the correct term, e.g. False - motherboard, in order to get the mark.)
3.1 True ✓
3.2 True ✓
3.3 False, size/type/extension ✓
3.4 True ✓
3.5 False, Antivirus/Anti-malware ✓
[5]
TOTAL SECTION A: 25
SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES
4.1.1 Choice:
HDD ✓
4.1.2 Reason:
- Improves performance/speed
- More RAM will enable working with many programs/data files opened at the same time without slowing the computer down, etc.✓ (Any one)
4.1.3 Choice:
Windows 10 Professional Edition ✓
4.1.4 Reason for choosing an operating system
- Business users will require latest features/security offered by Windows 10
- Windows 7 is not supported by Microsoft anymore
- Windows 10 is currently preloaded ✓ (Any one)
4.2 TWO reasons for an entry level CPU
- An entry level CPU has enough processing power for a computer used in a SOHO ✓
- It would be an unnecessary expense to get a more powerful CPU that is used to capacity ✓
4.3 Software/Hardware used to prevent unauthorised network access
Firewall/Router ✓
4.4.1 TWO problems that occur when the hard disk drive is full
- (Getting prompts that) there is no space left/Cannot save anything
- Thrashing/System is slow
- System sometimes freezes/crashes
- Programs do not open
✓✓ (Any two)
4.4.2 A system utility used to remove unwanted files
Disk Cleanup/CCleaner, etc. ✓(Accept any other valid response)
4.4.3 ONE way to free up space on the HDD
- Compress (Zip/Archive) files/folders/drive (Do not accept any reference to removing files or defragging)
- Disable hibernation/Disable System Restore (on Windows 10)/ Change the settings of the virtual memory (Windows 7)
✓ (Any one)
4.5 TWO ways to solve the problem of a PC that will not boot
- Re-seat all cards/modules on the motherboard
- Boot up/Repair/Update/Reinstall the system from an external device, e.g. drive, USB stick or optical drive, etc.
- Check for and replace faulty hardware
✓✓ (Any two)
4.6 Disadvantage of convergence
- Functionality of many devices is lost if the device fails
- Difficult to upgrade only one part of the device
✓ (Any one)
4.7 TWO reasons to use note-taking software
- Enables rapid capturing of ideas from a variety of inputs, e.g. video, audio, handwriting, etc.
- Access on the go/Synchronises notes between devices
- Realtime collaboration
- Can synchronise notes and a sound recording
- Handwriting recognition can convert 'handwritten' notes into typed text (when a stylus/finger is used on a touchscreen)
- Enables effective searches for items in notes, i.e. text in diagrams
✓✓ (Any two)
4.8 TWO functions of a web browser other than viewing web pages
- Provides a facility to download files/content
- Manages plug-ins/extensions
- Stores the link/URL to recently visited web pages
- Can store favourites/bookmarks/history
- Provides a pop-up blocker
- Enables caching
- Has a feature to block websites
- Manages data usage
- Manages proxy settings
- Acts as a file explorer/opens different types of files/documents
- Enables video streaming
- Allows SaaS (software as a service)
✓✓ (Any two)
4.9.1 TWO challenges when updating software
- May consume too much data
- Automatic updates could slow down the computer/reduced performance
- Features could be removed
- Could be time consuming
- Updates could be interrupted/corrupted
- Cannot use software/applications while updating
Accept:
Bugs/Security loopholes could be introduced to software/Software could become unstable
✓✓ (Any two)
4.9.2 ONE way to ensure computer does not update while it is in use
Set a suitable time for updates ✓ /Use Task Scheduler
4.10 Reason for not successfully saving with Send to and solution
Reason:
This action will only create a shortcut, and not save the actual file to desktop ✓
Solution:
- Copy and paste to the desktop
- Open the document and save it to the desktop ('File Save As')
- Click and drag to the Desktop if already saved elsewhere
✓(Any one)
4.11 TWO solutions for voice recognition software not understanding
- Change/Replace/Check the microphone
- Adjust the gain on the microphone
- Reduce background noise
- Try to speak clearer/slower
- Spend time training the voice recognition software
- Update the driver/reset the hardware
✓✓ (Any two)
[25]
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES
5.1 TWO advantages of grid computing
- Ability to use many combined resources
- The use of a combination of resources saves time and money
(Do NOT accept 'saves time/money' only – must be qualified) - Solves complex problems that need a huge amount of processing power
- If one computer fails, the task can be taken over by another computer
✓✓ (Any two)
5.2.1 Identify devices in a network
A – Switch/Router/Hub ✓
B – (Print/NAS) Server ✓ (Accept main computer)
C – Router/Modem/Gateway ✓
5.2.2 Type of network for D
LAN/HAN ✓ (Accept client-server network)
5.3 TWO reasons to turn off Bluetooth if connectivity is not required
- May interfere with other wireless signals
- Avoid being tracked
- Reduces the possibility of hacking attacks/more secure
- Prevent auto-connect (to other paired devices)
- Saves battery power
✓✓ (Any two)
5.4 TWO changes to make a password more secure
- Include at least one special character (Accept an example of a special character)
- Include at least one upper case character
- Change the repeating characters
✓✓ (Any two)
5.5 Reason for an OTP sent to your smartphone
- To continue using the service/To ensure only the authorised/allowed user is using the account
- Extra layer of security that will prevent use of the service if login details are stolen
- 2-step/factor authentication
✓ (Any one)
5.6 Reason for using Bcc feature in e-mails
- To hide the addresses of some other recipients/To hide the fact that the e-mail was sent to more recipients ✓
5.7 Communication medium used for undersea cables
- (Optical) fibre ✓/Fibre (optic)
5.8 TWO disadvantages of FTP technology
- More complex/Transfer process may be more complicated than using drag-and-drop methods
- Modern web browsers are dropping support for FTP
- In some cases, one has to resort to specialised software
- FTP lacks security/can be vulnerable to hacking
- Interruptions and restarting may slow down the process
✓✓ (Any two)
2
[15]
QUESTION 6: INFORMATION MANAGEMENT
6.1 TWO ways to detect plagiarism in a learner's PAT
- Search for specific sentences from the PAT on the internet to check for the original source/Check internet search history
- Investigate if no references were given
- Look for words or phrases that seem beyond the ability of the learner/Americanisms/Some sentences do not seem to fit with the style of the writing
- Compare work from different learners for similarities
- Check learner's previous files/folder activity or phases to verify authentic work
- Use online plagiarism software (Accept valid plagiarism detection services, e.g. Turnitin, SafeAssign, etc.)
✓✓ (Any two)
6.2 TWO ways that make a chart/graph easier to interpret
- Add a chart title/heading
- Use legends
- Use axes/series labels
- Use gridlines
- Add data labels
- Add colours
- Use trend lines
- Select appropriate chart type
✓✓ (Any two)
6.3.1 TWO advantages of using drop-down form fields in an electronic questionnaire
- User is restricted to options given
- Easier to process the data from the responses
- Reduce spelling errors
- Quicker to answer the questionnaire than typing answers
- Save space on the questionnaire
✓✓ (Any two)
6.3.2 Option that should be removed from the drop-down box and reason why
Longer than five days ✓
Motivation
Partial overlap with 'Three days or more' ✓
6.4 TWO ways to ensure logical grouping and flow of information in a formal report
- Use (numbered) headings/subheadings to group related information in paragraphs
- Use a Table of Contents as an overview of the document structure
- Note the order of precedence, e.g. never start with a conclusion ahead of findings, with findings ahead of project background, etc.
- Remain consistent, e.g. each finding should be linked to the evidence in the same order
✓✓ (Any two)
2
[10]
QUESTION 7: SOCIAL IMPLICATIONS
7.1 Definition of social engineering
The act of misleading/manipulating people ✓ to obtain confidential information ✓ for fraudulent purpose
7.2TWO negative implications for a company of employees using work computers for private tasks
- Less time for work purposes/Waste of time/Lower productivity
- Possible loss of revenue/profits for the employer
- Risk of malware infecting computers
- Employer may be liable for crimes committed from the workplace
- Data costs for the employer may rise
- Company information may be hacked
- Reputational risk to the company
✓✓ (Any two)
2
7.3 ONE software technology used with cameras to identify criminals
- Artificial Intelligence (AI) to enhance quality of images
- Push technology to alert user when movement is sensed by the camera/to identify the size of moving object or suspicious movement
- Facial recognition/thermal imaging
- Number plate/license plate recognition ✓(Any one)
7.4 TWO strategies to discourage cyberbullying
- Report the offender
- Block the offender from contacting them
- Do not respond to taunts/messages from the bully
- Avoid/Be selective in your use of social media/Do not initiate a discussion that could lead to cyberbullying of anyone
- Do not make controversial posts that may open you up to harassment
✓✓ (Any two)
7.5 ONE reason for unknowingly trusting a program containing a Trojan
Program containing a Trojan pretends to be a useful program ✓
7.6.1 Term to describe furniture design in a working environment
Ergonomics ✓
7.6.2 Health benefit of the advertised chair
- Provides back support to prevent backache
- Allows the user to sit comfortably for longer periods/improves productivity
- Adjustable height
- Head rest for neck support
✓(Any one)
[10]
QUESTION 8: SOLUTION DEVELOPMENT
8.1 TWO methods to set the indents in a word processing document
- Use the ruler
- Use the paragraph dialog box/Indentation option in paragraph dialog box
- Use a tab dialog box
- Use a style
- Use the Increase Indent/Decrease Indent button on the ribbon
✓✓ (Any two)
8.2 ONE example of formatting restriction in an electronic form
- Prevent formatting changes (Read-Only)
- Force all changes to be tracked
- Allow comments only
- Allow only the filling in of the form
- Limit formatting to a selection of styles
✓(Any one)
8.3 Reason why an existing file does not show in the file list/dialog
- 'All files' option is not selected from the list of extensions in the Open dialogThe file has a hidden attribute set
- Wrong application/folder/drive is used when trying to find the file
✓(Any one)
8.4 Purpose of a small square in the bottom right corner of cell C1
To perform an Auto Fill/copy function ✓ by dragging or double-clicking
8.5 Reason for absolute cell reference in VLOOKUP table range
So that if the VLOOKUP function is copied and pasted the range being checked will not change ✓/So that it can copy down correctly
8.6 Processing that was done to the original data
- Sorting according to Department first ✓
- Then sorted by Number_in_Stock ✓
(Note to marker: Allocate only one mark if reference has been made to sorting but is not specified)
8.7.1 Reason why a merge field cannot be inserted
- The data source (Recipients) is not linked/connected/created/ selected
- Incorrect data source
✓ (Any one)
8.7.2 Reason why some expected records do not display in Mail Merge
- Errors in creating the filter or recipient list
- Some data is missing from the data source
✓ (Any one)
8.8.1 Objects on which database queries can be based
- Tables
- Queries
✓ (Any one)
8.8.2 How to view the name of the object on which a query is based
Open the query in Design View and view the name of the object in the Table row ✓ /The name of the object will appear above the field list in Design view
8.9 Diagram of table in HTML
Description, |
Item 2 | Item 1 ✓ |
Mark distribution:
- Correct diagram of a table structure: 2 rows x 2 columns, 1st row merged ✓
- Correct labels ✓
- Correct order: ,
[15]
TOTAL SECTION B:
SECTION C: INTEGRATED SCENARIO
QUESTION 9
9.1 TWO reasons for using ICTs to record/manage health screening data
- Capture data more efficiently/Devices can record data/Reduce queues when capturing data
- Easier to share data
- Easier to see patterns
- Processing/Analysing the data is easier
- Green computing, saves paper
- Less handling of paper to reduce the spread of the virus/ ICTs can be easily sanitised
✓✓ (Any two)
9.2.1 TWO reasons for a tablet over a laptop for health screening
- Tablet is smaller, which makes it more portable and easier to handle while moving around
- Tablets generally have a longer battery life
- Input can be faster with a touch screen
- Graphical input, e.g. barcodes, QR codes
- Tablets are easier to sanitise
- Low-end tablets will generally be cheaper than laptops, in this context
✓✓ (Any two)
9.2.2 TWO specifications when buying a tablet
- Wi-Fi/Cellular/Bluetooth connectivity
- Front and rear facing cameras
- Expandable storage/Size of internal storage
- Battery life
- (Screen) size/resolution
- RAM
- CPU
- Software version/Current operating system
✓✓ (Any two)
9.3.1 ONE way for the tablet to communicate with the server
- Can be connected via Wi-Fi/Wi-Fi access point
- Use a USB cable to connect the tablet directly to the server
✓ (Any one)
9.3.2 TWO ways to solve the problem of the tablet not connecting
- Install an access point closer to the where the tablet is used
- Restart network devices
- Move the tablet to a better line of sight to the access point
- Install range extender/repeater/boost signal strength
- Set tablet to Wi-Fi Always On/connect automatically/by default
✓✓ (Any two)
9.4.1 Spreadsheet feature to remove unnecessary spaces in the headings
Find and Replace ✓
9.4.2 Spreadsheet feature to automatically highlight a value
Conditional formatting ✓
9.4.3 Spreadsheet function to determine number of learners with a cough
COUNTIF ✓
9.5.1 THREE improvements that could be made to Date of birth field
- Change Data Type to Date/Time
- Set Format to Short/Long date
- Show Date Picker
- Add a validation rule to limit input to relevant dates
- Use an input mask to ensure correct format
✓✓✓ (Any three)
9.5.2 Reason for filling in Description options in database table
Enables understanding the data required for the records in the database ✓ /Maintenance purposes
9.6 TWO reasons to make a cloud backup of data
- Data can be accessed from any device with access to the internet anywhere in the world
- Backup is at a remote location (Accept any reference to the reasons for offsite backup,e.g. theft, fire, virus, etc.)
- More secure than removable drives/No physical damage
(Do NOT accept: Free up space on the hard drive)
✓✓ (Any two)
9.7 TWO ways for school to share health information electronically
- Attached the data to an e-mail/WhatsApp/SMS/MMS/Fax
- Provide access/send a link to the data in a folder on a shared drive
- Provide the District Office with an electronic storage medium that contains the data
- Upload data to a central database (via an app)
✓✓ (Any two)
9.8.1 Service that makes sharing of long web addresses easier
URL shortener ✓ e.g. Bitly, TinyURL, etc. (Accept any other valid response)
9.8.2 TWO ways in which fake information is made to seem believable
- Experts are incorrectly cited or referenced
- Pretends to be from a reliable author
- Information presented in a professional/technical format that seems to be reliable
- Sometimes shared by people you normally trust on social media
- 'Made up' statistics made to seem believable
✓✓ (Any two)
9.8.3 TWO ways to avoid being fooled by fake information
- Check information accuracy against other sources
- Check the credibility of the author
- Look for bias
- Use checking services such as Snopes
- Check the spelling and grammar
✓✓ (Any two)
[25]
QUESTION 10
10.1.1 Definition of m-learning
- Education and training delivered over the internet ✓
- using mobile devices such as tablets/laptops/smartphones ✓
- that can be accessed anywhere/anytime/at home ✓
10.1.2 TWO kinds of e-learning resources
- Online lessons/virtual meetings/streaming of lessons/webinars, etc.
- (Educational) videos/images
- E-books/electronic notes, etc.
- Online quizzes and tests
- Simulation apps
- Podcasts/audio files/pre-recorded lessons
- Tutoring apps
(Note to marker:
Do NOT accept examples such as: Zoom, Google Classroom, etc.)
✓✓ (Any two)
10.1.3 TWO examples of virtual reality (VR) enhancing learning
- Go on virtual 3D educational tours
- Simulate science experiments, etc.
- Can develop skills through simulations, e.g. flight simulator
✓✓ (Any two)
10.1.4 TWO word processing features for feedback
- Comments
- Track changes
- Highlights/Different font colours to indicate issues
- Hyperlinks/Embed links
✓✓ (Any two)
10.2 Term for concept of lack of access to ICTs
Digital divide ✓
10.3.1 TWO advantages of using the ISP for the website
- No need for extra local storage space/server
- Maintenance of hardware/software is outsourced
- Reduced downtime
- Separate internal and external networks
- School does not need to have a server with a fixed IP address
- Easily scalable
✓✓ (Any two)
10.3.2 TWO reasons for image not displaying in a browser
- Picture resource is not available/deleted
- Picture is in another folder
- Browser security may be blocking the picture
- Browser settings do not show pictures to limit data usage
- Browser does not recognise the file type associated with the image
(Note to marker: Do not accept any reference to HTML code or misspelt file extension.)
✓✓ (Any two)
10.3.3 Reason why website displays differently on smartphone screens
Layout of the webpage may not have been designed for a smartphone/ smaller screen ✓
10.4.1 Reason for having broadband connection for e-learning
- High speed access to the interne
- Always on
- Large volumes of data
✓ (Any one)
10.4.2 Advantage of unshaped line for e-learning
No other services will be given preference over downloading learning material. ✓/Line speed will not be negatively affected
10.4.3 A way to avoid information overload
- Give priority to certain tasks
- Take regular breaks from your devices/Do not check your smartphone all the time
- Organise school work according to subject
- Limit the number of links followed
✓ (Any one)
10.5 TWO criteria to determine if devices are usable for learning
- Devices are in good working order
- Devices are not too old/Compatible with current software/Compatible with school programs
- Have enough storage space for necessary software
- All the connected hardware is included, e.g. mouse, keyboard, charger, etc.
- OS/Application software is licenced
✓✓ (Any two)
10.6 TWO technologies used to control stock
- RFID tags
- Barcodes
- Scanners to read tags/barcodes
- Database (of stock items)
✓✓ (Any two)
10.7.1 ONE reason why a database is more suitable than a spreadsheet
- Ease of capturing through forms
- Queries based on criteria
- Easy to do reports
- Use of functions/calculations in a summary/report
- Data does not require extensive 'number-crunching'/calculations
✓ (Any one)
10.7.2 ONE way to transfer graph data from database to spreadsheet without retyping
Import the data from a database/Export the data to a spreadsheet ✓ / Copy and paste the data to a spreadsheet
10.7.3 ONE way to ensure that graph updates in word processor if spreadsheet data changes
Link the graph✓/Select update
[25]
TOTAL SECTION C: 50
GRAND TOTAL: 150