COMPUTER APPLICATIONS TECHNOLOGY PAPER 2
GRADE 12
NATIONAL SENIOR CERTIFICATE
MEMORANDUM
SEPTEMBER 2018
SECTION A: SHORT QUESTIONS
QUESTION 1: MULTIPLE-CHOICE
1.1 C ✓ (1)
1.2 B ✓ (1)
1.3 B ✓ (1)
1.4 D ✓ (1)
1.5 D ✓ (1)
1.6 B ✓ (1)
1.7 A ✓ (1)
1.8 D ✓ (1)
1.9 C ✓ (1)
1.10 A ✓ (1)
[10]
QUESTION 2: MATCHING ITEMS
2.1 H ✓ (1)
2.2 A ✓ (1)
2.3 K ✓ (1)
2.4 M ✓ (1)
2.5 I ✓ (1)
2.6 N ✓ (1)
2.7 B ✓ (1)
2.8 F ✓ (1)
2.9 C ✓ (1)
2.10 L ✓ (1)
[10]
QUESTION 3: MODIFIED TRUE OR FALSE
3.1 False – Beta (1)
3.2 False – Bandwidth (1)
3.3 True (1)
3.4 True (1)
3.5 False – QR (1)
[5]
TOTAL SECTION A: 25
SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES
4.1 | 4.1.1 | All in one computer ✓ | (1) | 3 |
4.1.2 | You can repair the computer by replacing a broken or faulty You can upgrade the computer by adding new parts or replacing | (2) | ||
4.2 | 4.2.1 | • Speed ✓− A higher speed means more instructions can be processed in the same amount of time. ✓ • Cores ✓– Each core can be working on a separate program but at the same time. ✓ | (4) | 6 |
4.2.2 | CPU needs cache memory to avoid waiting ✓ for slower components. ✓ | (2) | ||
4.3 | 4.3.1 | Solid state drive ✓ | (1) | 3 |
4.3.2 | (a) There is no physical moving parts when writing or reading on an SSD. ✓ | (1) | ||
(b) There is no time spent to move to the position where file is saved/can access it immediately. ✓ | (1) | |||
4.4 | 4.4.1 | Virtual memory is a portion of hard drive space which acts as memory (RAM). | (1) | 2 |
4.4.2 | Any ONE ✓
Programs too large to run from available RAM. | (1) | ||
4.5 | 4.5.1 | Any TWO ways of decreasing electricity usage: ✓✓
| (2) | |
4.5.2 | Any TWO benefits: ✓✓
NOTE: Do not award marks for repetition of the same concept or any reference to use of Internet. | (2) | ||
4.6 | 4.6.1 | Any TWO: ✓✓
| (2) | 4 |
4.6.2 | external drives ✓ | (1) | ||
4.6.3 | Disk fragmentation of hard drive occurs when: complete computer files are not saved in consecutive clusters (but scattered) on the hard drive. ✓ | (1) | ||
4.7 | 4.7.1 | Any THREE of: ✓✓✓
| (3) | 3 |
[25] |
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES
5.1 | 5.1.1 | https://www.vnunet.com/vnunet/news/phishing against banks hits | (1) | 3 |
5.1.2 | Phishing is Internet fraud where a fake email requests you to click on a link to a website that looks official ✓ so that you update account details and pin numbers and these are then used to draw money from your account. ✓ | (2) | ||
5.2 | 5.2.1 | Any TWO: ✓✓
| (2) | 5 |
5.2.2 | VPN is a network implemented via the Internet ✓ to enable the user to log onto a network from a remote location. ✓ | (2) | ||
5.2.3 | Any ONE ✓
| (1) | ||
5.3 | 5.3.1 |
| (2) | 6 |
5.3.2 | Any TWO ✓✓
| (2) | ||
5.3.3 | A protocol is a set of rules for communication between network devices. ✓ | (1) | ||
5.3.4 | FTP ✓ | (1) | ||
5.4 | A cellular network ✓ | (1) | 1 | |
[15] |
QUESTION 6: INFORMATION MANAGEMENT
6.1 | 6.1.1 | Any ONE closed question: ✓
| (1) | 4 |
6.1.2 | There are potentially many different responses (differently worded), that will first need to be grouped in order to be analysed/The question is not a closed question (which can be more easily analysed in a spreadsheet) ✓ | (1) | ||
6.3 | 6.1.3 | It is a ‘double question’/What if the respondent enjoys only one, or neither (or does not take one or both of these subjects)? ✓ | (1) | |
6.1.4 | Any ONE element: ✓
| (1) | ||
6.2 | Any ONE disadvantage: ✓
| (1) | 1 | |
6.3 | Additional data stored about a file (that describes a file and its contents). ✓ Any suitable example such as author, comments, bit depth (for images), etc. ✓ | (2) | 2 | |
6.4 | Any THREE ✓✓✓
Also accept: Correct format | (3) | 3 | |
[10] |
QUESTION 7: SOCIAL IMPLICATIONS
7.1 | 7.1.1 | Any ONE advantage: ✓
Any ONE disadvantage: ✓
| (2) | 2 |
7.2 | Any TWO ✓✓
| (2) | 2 | |
7.3 | No, ✓ licenses are normally issued ‘per computer’. ✓ OR Yes, ✓ if they purchased a site license. ✓ | (2) | 2 | |
7.4 | Any TWO ✓✓
| (2) | 2 | |
7.5 | 7.5.1 | The GPS coordinates of where the photograph was taken is added to the photograph’s metadata. ✓ | (1) | 2 |
7.5.2 | The inclusion of the GPS coordinates may alert poachers of where to find the whales. ✓ | (1) | ||
[10] |
QUESTION 8: SOLUTION DEVELOPMENT
8.1 | 8.1.1 | Any TWO design requirements to improve navigation ✓✓
| (2) | 4 |
8.1.2 | Identify any ONE as well as suggestion: ✓✓
| (2) | ||
8.2 | 8.2.1 | FIND ✓ | (1) | 2 |
8.2.2 | To be able to separate the name and surname using text functions / To check that a space has been added to distinguish between the name and surname. ✓
| (1) | ||
8.3 | Any TWO of: ✓✓
[For the first two bullet points, the correct replacement must be specified (e.g. cannot simply say ‘incorrect function’ or ‘incorrect operator’.] | (2) | 2 | |
8.4 | 8.4.1 | A ✓ * ✓ [Also accept a* and Like "A*"] | (2) | 4 |
8.4.2 | Short Text ✓ [Also accept Text (Access 2010)] | (1) | ||
8.4.3 | Is Null ✓ | (1) | ||
8.5 | Mistake: the file was saved with a TXT extension. ✓ How to fix: change the file extension to HTML. ✓ | (2) | 2 | |
8.6 | The closing tag for italic formatting was not inserted after the word ‘malware’. ✓ [Also accept correct code < i >malware< / i > , but this is not required for the mark] | (1) | 1 | |
[15] |
TOTAL SECTION B: 75
SECTION C
QUESTION 9: INTEGRATED SCENARIO
9.1 | 9.1.1 | Any ONE ✓
| (1) | 1 |
9.2 | 9.2.1 | Any TWO of: ✓✓
| (2) | 3 |
9.2.2 | RFID (Radio Frequency Identification) ✓ | (1) | ||
9.3 | 9.3.1 | Each operating system uses different architectures and has different ways of interfacing with software ✓ so a different 'version' has to be written for each OS platform. ✓ | (2) | 5 |
9.3.2 | An example would be if a game was installed using Windows 7 ✓ it must still work if the operating system was updated to Windows 8 or Windows 10. ✓ | (2) | ||
9.3.3 | Control panel, mouse ✓ | (1) | ||
9.4 | 9.4.1 | A plug-in is software that adds a specific feature/functionality to an existing software./Special program that is needed to allow the user to view special effects (usually multi-media effects).✓ | (1) | 2 |
9.4.2 | If this device supports plug-ins, a program from the web can be used to play embedded audio and video files without the need for a dedicated media player. ✓ | (1) | ||
9.5 | Any TWO ✓✓
| (2) | 2 | |
9.6 | 9.6.1 | Global positioning system ✓ | (1) | 3 |
9.6.2 |
| (2) | ||
9.7 | Any TWO ✓✓
| (2) | 2 | |
9.8 | Digital divide ✓ | (1) | 3 | |
9.9 | 9.9.1 | Internet of Things: Many devices are connected to the Internet ✓ and can be controlled through the Internet/without human to device interaction/ communicate with each other. ✓ | (2) | |
9.9.2 | Any TWO ✓✓
| (2) | 2 | |
9.9.3 | When searching for information on the Internet, there are many results making it difficult to get to exact information for the request/Too much information. ✓
| (1) | 1 | |
[25] |
QUESTION 10
10.1 | Any TWO ✓✓
| (2) | 2 | |
10.2 | 10.2.1 | Any ONE ✓
Accept: any other acceptable task. | (1) | 4 |
10.2.2 | Any TWO ✓✓
| (2) | ||
10.2.3 | Any ONE ✓
Accept: any other valid reason. | (1) | ||
10.3 | 10.3.1 | Any ONE ✓ (1 mark for impact) ✓ (1 mark for explanation)
Accept any other negative influence on the business. | (2) | 4 |
10.3.2 | A website is made unavailable ✓ by many computers requesting data from the site at the same time. ✓ OR Servers become overloaded due to many requests. | (2) | ||
10.4 | Any TWO ✓✓
| (2) | 2 | |
10.5 | 10.5.1 | A public area where Internet access ✓ is available through a wireless/free/not password protected ✓ Internet connection. | (2) | 3 |
10.5.2 | Any ONE ✓
Also accept: | (1) | ||
10.6 | 10.6.1 | Any THREE ✓✓✓
Any other relevant answer. | (3) | 5 |
10.6.2 | Any TWO ✓✓
| (2) | ||
10.7 | 10.7.1 | Field size ✓ | (1) | 5 |
10.7.2 | Default value ✓ | (1) | ||
10.7.3 | Validation rule ✓ | (1) | ||
10.7.4 | Input mask ✓ | (1) | ||
10.7.5 | Required field ✓ | (1) | ||
[25] |
TOTAL SECTION C:50
GRAND TOTAL:150