INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NATIONAL SENIOR CERTIFICATE EXAMINATIONS
MEMORANDUM
MAY/JUNE 2021
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 G ✓ (1)
1.1.2 I✓ (1)
1.1.3 A✓ (1)
1.1.4 N✓ (1)
1.1.5 E✓ (1)
1.1.6 L✓ (1)
1.1.7 H✓ (1)
1.1.8 K✓ (1)
1.1.9 J✓ (1)
1.1.10 C✓ (1)
1.2
1.2.1 SSD – solid state drive (1)
1.2.2 Driver (1)
1.2.3 Software as a service (Saas) (1)
1.2.4 Convergence (1)
1.2.5 Cookie (1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1 Point to point connections between components (not devices) are not shared/ are dedicated ✓
providing high data transfer speeds ✓ (2)
2.2
2.2.1 Quad-core✓ (1)
2.2.2 A task is separated into different threads ✓ that can be processed simultaneously✓ spread/executed on/by different cores. (2)
2.2.3 Any TWO of: ✓✓
2.3 A bus ✓ (1)
2.4 Discuss TWO characteristic of RAM (2 x ✓✓) of the following:
2.5 By using one computer✓developers can test their software on different operating systems / platforms. ✓ (2)
2.6
2.6.1 Firmware is used to control the basic operation of a device. ✓ (1)
2.6.2 On a ROM ✓chip (1)
2.7 The CMOS is the type of memory that stores the BIOS settings that can be changed, ✓while the BIOS contains the essential start-up instructions / does the POST on a computer. ✓ (2)
2.8 THREE concepts: ✓✓✓
Concepts:
2.9
2.9.1 8 bits ✓ (1)
2.9.2 Any TWO of ✓✓
2.9.3 Any ONE of ✓
TOTAL SECTION B: 25
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Ethernet ✓ (1)
3.1.2 Any TWO of✓✓
3.1.3A switch connects many computers ✓on the same network and has the ability to direct network traffic to the correct port / lessens network traffic✓(2)
3.2
3.2.1 The person/point from which a downloaded file is being shared✓ (1)
3.2.2 Internet: Any ONE✓
Intranet: Any ONE✓
3.3
3.3.1 VPN✓ (any explanation implying VPN) (1)
3.3.2 It is a loophole that is programmed into software✓ that is used to bypass the security ✓ controls in the network/computer/program. (2)
3.3.3 All changes/updates of the files will automatically be copied to✓ all the devices linked to online storage/folders✓ (2)
3.4
3.4.1 Customised: A search in which the results are customised by search engines (like Google) to match one's profile of interests and activities✓
Context aware: A search in which additional information (e.g. one's present physical location) is used as criteria to make search results more relevant.✓ (2)
3.4.2 Advertisers pay for sponsored links to appear✓even when not relevant to the search. ✓
OR
The user often sees sponsored links first on the results page and these links do not always take you to a relevant information/website. (2)
3.5
3.5.1 Any TWO of ✓✓
Javascript, Pearl, Ruby, ASP.net, Python, PHP, HTML-5 (not without 5) (2)
3.5.2 Retrieves information from a database on the web server using the profile of the user✓ for whom the web page is dynamically created on the server before downloaded to your browser. ✓
Concepts:
3.6 DSS analyses the information gathered and presents it in a summarised or graphical format suitable for making informed decisions.
Any TWO of the following concepts:✓✓
3.7 The quality of information - can be questionable as anybody can create/edit the information.✓
OR
The bias of editors - any editor can select/edit the information to promote his/her point of view. (1)
TOTAL SECTION C: 24
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1
4.1.1 To uniquely identify a record in a table. ✓ (1)
4.1.2 There can be more than one store in the mall that opened on the same day. ✓ (1)
4.1.3 StoreID/StoreNumber. ✓ (1)
4.2
4.2.1 Normalisation is the process of efficiently designing a database ensuring data integrity✓ and eliminating data redundancy.✓ OR Designing a database to prevent anomalies and data redundancy. (2)
4.2.2 NumYearsOpened can be calculated✓using the DateOpened field.✓ (2)
4.3 Any TWO of ✓✓
4.4
4.4.1 Any ONE of:✓
Has
Employs
Also accept any other sensible action verb that describes the relationship. (1)
4.4.2 B One to many ✓ (1)
4.5
4.5.1 False✓ (1)
4.5.2 True ✓ (1)
4.5.3 True ✓ (1)
4.5.4 True ✓ (1)
4.5.5 True ✓ (1)
4.6 Any TWO of ✓✓
4.7 Any ONE of✓
4.8 Any TWO of✓✓
4.9 Any TWO✓✓
4.10.1 Online data collection is where data is processed immediately✓/in real time after it has been captured or collected.✓
OR
Data is captured/recorded and saved directly/immediately onto a system (2)
4.10.2 Any ONE example ✓ with the benefit/use of data ✓
Possible answers:
TOTAL SECTION D: 27
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1
5.1.1 Any ONE of ✓
5.1.2 Any ONE of ✓
5.2
5.2.1 Any ONE of ✓
5.2.2
5.3
5.3.1 Any ONE of ✓
iRandom := random(31) + 10;
iRandom := randomrange(10,41); (1)
5.3.2
5.4
5.4.1 Integer✓ (1)
5.4.2 Real/ Double ✓// the compiler will reject integer because of the sqrt (1)
5.5
5.5.1 Accessor method returns the current value of an attribute of an object✓
Mutator method returns no value but changes the current value of an attribute of an object.✓ (2)
5.5.2
5.5.3 setContactNumber✓ (1)
5.6 sLine ← iTerm1 + ' ' + iTerm2 ✓
loop ✓ I from 1 to iNumTerms – 2 ✓
start loop
iTerm3 ← iTerm1 + iTerm2 ✓
sLine ← sLine + iTerm3 + ' ' ✓
iTerm1 ← iTerm2✓
iTerm2 ← iTerm3 ✓
end loop
Display sLine ✓
(8)
TOTAL SECTION E: 25
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 Micro waves / Radio waves ✓ (1)
6.1.2 Any TWO of ✓✓
6.2
6.2.1 Mobile device ✓
OR accept a suitable example such as Smart phone/tablet/smart watch (1)
6.2.2 The trend that mobile devices increasingly use apps ✓ to access web-sites directly rather than via a browser.✓
OR
The web is the backend and the app is the front end. (2)
6.2.3 Any ONE for two marks✓✓
Designing your program to ensure the continuing function of a piece of software under unforeseen circumstances.
OR
When a programmer anticipates problems and writes code to deal with them. (2)
6.2.4 Any TWO of ✓✓
6.3
6.3.1 HTTPS / SSL✓ (1)
6.3.2
6.4
6.4.1 Computer-processing where the physical location of people and objects are determined ✓and used during processing.✓ (2)
6.4.2 Any ONE of✓
6.5
6.5.1 A white hat hacker does not cause damage ✓ they just prove skills/ test security/not committing a crime
A black hat hacker hacks to cause damage ✓or steal data or commit a crime. (2)
6.5.2 The servers become overloaded, unresponsive, and effectively unavailable for everyone. ✓ (1)
6.5.3 Any TWO of ✓✓
6.6 A fixed physical address that has a reception desk and meeting room ✓which is used as a shared space by people who otherwise work from a mobile office. (2)
6.7
6.7.1 Telecommuting ✓ (1)
6.7.2 List the device ✓ (example filtered microphone / ear phones)
Motivation ✓ (example to block out background - sound / block out other conversations) (2)
6.7.3 Any ONE of ✓
6.7.4 Any ONE of ✓
6.8
6.8.1 While Virtual Reality immerses you into a virtual world and blocks out the real word✓ / Computer based,
Augmented Reality refers to overlaying computer-generated images on top of real-time images ✓ / Combines real world images with computer generated images. (2)
6.8.2 Any ONE of ✓
6.8.3 Any TWO of ✓✓
TOTAL SECTION F:34
GRAND TOTAL:150