INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NATIONAL SENIOR CERTIFICATE
MEMORANDUM
SEPTEMBER 2018
INSTRUCTIONS AND INFORMATION
Read the following instructions carefully before answering the questions.
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 Archiving ✓ (1)
1.1.2 Bandwidth ✓ (1)
1.1.3 Biometric (Security) ✓ (1)
1.1.4 Foreign key ✓ (1)
1.1.5 Disk defragmentation/defrag ✓ (1)
1.1.6 Shareware ✓ (1)
1.1.7 Piggybacking ✓ (1)
1.1.8 Hyperlink ✓ (1)
1.1.9 Ergonomics ✓ (1)
1.1.10 E-waste ✓ (1)
1.2
1.2.1 D ✓ Digital Signature (1)
1.2.2 A ✓ Flaming (1)
1.2.3 C ✓ Encode Data (1)
1.2.4 A ✓ a method used by peripherals to gain the CPU’s attention when they need to communicate (1)
1.2.5 C ✓ TRUE OR NOT (TRUE OR NOT FALSE) =TRUE (1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1
2.1.1 System Software/Operating System ✓ (1)
2.1.2 Software which manages/controls all the activities that take place in a computer. ✓✓ (1)
2.1.3 Smartphone ✓ or Tablet (1)
2.1.4
2.2 The combining of several technologies and functions into a single multi-purpose device. ✓✓ (1)
2.3 Accept any THREE of the following: ✓✓✓
2.4 They are much cheaper ✓ Easily available ✓
ALSO ACCEPT
Can store more data and may be repaired. (2)
2.5
2.5.1 Thrashing ✓ (1)
2.5.2 It makes use of space on secondary memory / storage / hard drive using it as primary memory / RAM. ✓
Virtual memory (one mark only) (2)
2.5.3 It might be difficult to obtain RAM chips ✓
DIMMs that are compatible with the older motherboards ✓✓ (2)
2.6
2.6.1 Computer 1 ✓ (1)
2.6.2 The Intel core i7 CPU ✓ (1)
2.6.3 Each core can process separate programs ✓ at the same time. ✓
OR
Each core acts like a separate CPU making it possible to execute multiple tasks simultaneously. (2)
2.6.4
2.6.4.1 The faster the clock speed, the faster the CPU speed ✓✓ (2)
2.6.4.2 The speed of the system clock ✓ will be multiplied by a specific value ✓ in order to obtain the required clock speed for the specific CPU.
Clock multiplication – one mark only. (2)
2.7
2.7.1 It connects the different components on the motherboard. ✓
OR
The internal buses transfer data and instructions between components. (1)
2.7.2 CPU ✓ and RAM ✓ (2)
TOTAL SECTION B: 27
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Correct layout ✓
Diagram include:
Switch/Hub ✓
Computers ✓(3)
3.1.2 Any TWO of: ✓✓
3.1.3 A combination of at least two topologies; star, bus or ring ✓ (1)
3.2
3.2.1 mobility ✓
OR
cost saving / easier to set up (1)
3.2.2 Any TWO of: ✓✓
3.2.3 Because the signal is broadcasted, it is easy to intercept the signal ✓ and therefore the data, and passwords, can be accessed. (1)
3.3
3.3.1 Push technology is when the server notifies the device that a new message has arrived and then downloads it to the mobile device. ✓
Concepts:
Automated download
FOR 1 mark: Notification only (2)
3.3.2 Any TWO of: ✓✓
3.4
3.4.1 VoIP✓(1)
3.4.2 Any TWO of: ✓✓
3.4.3 Cross-platform means that software is designed to run on different operating systems. ✓ (1)
3.5
3.5.1 You need to know the web address to be able to tell your browser what site you wish to view. ✓This means that, if you had to use only browser software to access online data and information, then you would need to know the URL of every web page you ever wanted to visit. (1)
3.5.2 A search engine works as a discovery tool and information locator. ✓✓
You only need to know one URL – that of the search engine. You start your browser, go to the search engine, type in your search criteria and you are presented with a list of sites that meet your search criteria. (1)
3.5.3 Too many results ✓ and they are not always of appropriate quality (what is required). ✓✓ (2)
3.5.4 Mediated searches use people to compile lists of sites in different categories and to make sure that the sites that make it onto the list are genuinely useful, have relevant and up-to-date content and are not scams or affected by malware. ✓✓
The results returned by this type of search are far fewer than the results that a normal algorithm-based search engine would return, but the idea is that human mediation and selection will give you results that are better and more interesting or relevant. ✓ (2)
TOTAL SECTION C: 24
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1 A desktop database is usually used for single user applications and is installed on personal computers. ✓
A server database is installed on the server and is accessed by the user using a network connection and shared by users. ✓✓ (2)
4.2 Data integrity in a database is ensured by implementing principles of normalisation ✓✓ and including validation in your database design. ✓✓ (2)
4.3 Name and Describe any THREE of: ✓✓✓
Any correct example in each case. (3)
4.4 Any TWO methods/techniques: ✓✓
4.5 Data maintenance involves keeping information up to date. ✓ (1)
4.6
4.6.1 Normalisation refers to the process of organising a database into separate tables ✓ in such a way as to avoid the duplication of data and also to update/deletion anomalies. ✓ (2)
4.6.2 A field that identifies each record with a unique value. ✓ (1)
4.6.3
tblSuppliers | tblOrders | |||
PK | SupplierID | PK | ItemName | |
Name | FK | SupplierID | ||
Contact | QuantityOrdered | |||
DeliveryDate | ||||
UnitPrice | ||||
DateOrdered | ||||
DeliveryCost |
Table Names ✓✓
Primary Keys ✓✓
Foreign Key ✓
Relationship ✓ (6)
4.7
4.7.1 SELECT * FROM tblproducts ✓Order BY Price ✓ (2)
4.7.2 UPDATE tblproducts ✓ SET name=’Pecan Pie’ ✓ WHERE name= ’Pecan Pe’ ✓ (3)
TOTAL SECTION D: 24
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1 declare empty string ✓
get length of string ✓
loop ✓ from first character to length of string
if the current character is a space ✓
change the following character (correct character) ✓ to capital letter ✓
if the current character is not a space ✓
add to a new string variable ✓
ACCEPT any correct method. (8)
5.2 5.2.1 To generate a string ✓ designed by the programmer which will usually display the object fields (attributes/class variables) ✓ (2)
5.2.2
5.2.3
5.2.4 A parameterised method has got brackets () with arguments or variables inside the brackets, ✓ Whilst a non-parameterised method has got no brackets, meaning that it does not have arguments ✓ (2)
5.3
5.3.1
5.3.2 Syntax Error: Compiler will not compile the program and indicates the error. ✓
Runtime error: Program crashes / displays an exception. ✓
Logical error: Results are not what they are expected to be. ✓ (3)
5.4
5.4.1 Constructor ✓ (1)
5.4.2 To send the information (input) to the other unit so it can be assigned to the attributes. ✓ (1)
5.4.3 Function ✓ (1)
5.4.4 Opens text file so that contents can be read ✓ (1)
5.4.5 iVisits := iVisits +1; (1)
5.4.6 To give the variable a starting value ✓ (to avoid Delphi generating a random value) (1)
TOTAL SECTION E: 33
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 This technique involves keeping multiple copies of data (sometimes referred to as mirroring). ✓Doing this means that, even if one set of data fails, the parallel set can be used immediately, resulting in no downtime. ✓ (2)
6.1.2 It means that you need, at a minimum, to double the storage requirements for your system ✓ (and if you have more than one mirror, then you need to multiply this by as many copies as there are of the data). ✓ (2)
6.1.3 For safety and security reasons. ✓ (1)
6.2
6.2.1 The URL for a dynamic page usually contains many parameters after the actual file name, to include information for the server that will enable it to generate the dynamic page that you end up seeing. ✓
You can see the web page’s file extension in the URL, located in the address field of the Web browser. If it is ‘.htm’ or ‘.html’, the page is probably static. If the extension is ‘.php’, ‘.asp’ or ‘.jsp’, the page is most likely dynamic. ✓✓ (2)
6.2.2 Any THREE of: ✓✓✓
6.3
6.3.1 To store the backups safely off-site in case of theft, fire, etc. ✓ (1)
6.3.2 Any THREE of: ✓✓✓
6.3.3 Any THREE of: ✓✓✓
6.4
6.4.1 ANY ONE of: ✓
6.4.2 Encryption is the scrambling of text/data ✓ into a format that cannot easily be read by someone else, using a specified set of rules/algorithm/key/formula. ✓ (2)
6.4.3 ANY THREE of: ✓✓✓
6.5
6.5.1 Constant interruptions prevent you from focusing your attention on whatever task you are supposed to be doing. ✓
Social networking can consume several hours of your time each day. ✓ (2)
6.5.2 Any ONE advantage of: ✓
ONE disadvantage, it is not in the public domain. ✓ (2)
TOTAL SECTION F: 27
GRAND TOTAL: 150