INFORMATION TECHNOLOGY PAPER 2
GRADE 12
SENIOR CERTIFICATE EXAMINATIONS
MEMORANDUM
MAY/JUNE2017
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 D ✓ (1)
1.1.2 B ✓ (1)
1.1.3 D ✓ (1)
1.1.4 B ✓ (1)
1.1.5 D ✓ (1)
1.2
1.2.1 CAP/Data bundle ✓ (1)
1.2.2 Blog/Weblog✓(1)
1.2.3 Cracker/Hacker✓ (1)
1.2.4 DNS (Domain Name System) ✓ (1)
1.2.5 HTTPS/SSL ✓ (1)
1.2.6 Flashing ✓ the ROM (1)
1.2.7 Instant messaging (IM)✓(1)
1.2.8 MP3 (MPEG-1 Audio Layer 3)✓ (1)
1.2.9 Piggybacking✓ (1)
1.2.10 POST (Power-on-self-test)✓(1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1 Any TWO reasons for using thin clients: ✓✓
2.2
2.2.1 On the ROM chip ✓ (OR another type of ROM) (1)
2.2.2 Any TWO functions of BIOS: ✓✓
2.3
2.3.1 Multiprocessing ✓ (1)
2.3.2(a) The main aim is prevent a slower medium from slowing down the performance of the faster medium. ✓ (2)
2.3.2(b) Disk caching:
Every hard drive has built-in fast high speed memory (RAM) ✓ which is used to cache data read from/written to the hard drive and therefore speed up subsequent calls ✓ for the same code/data from the hard drive. (2)
2.3.3 Any ONE: (Naming) ✓ (explanation) ✓
2.4 Converts/translates/changes source code/high level language code ✓ into machine code✓that is understandable by the CPU.
NOTE:
To create the executable program copy (exe-file) is incorrect as it is not the common task. (2)
2.5 Any TWO aspects that need consideration: ✓✓
2.6
2.6.1 Any TWO ways of decreasing electricity usage: ✓✓
2.6.2 Any TWO benefits: ✓✓
NOTE:
Do not award marks for repetition of the same concept or any reference to use of Internet.(2)
2.7
2.7.1 Any TWO ✓✓
Effective backup program includes the following:
2.7.2 Disk fragmentation of hard drive occurs when: complete computer files are not saved in consecutive clusters on the hard drive. (1)
2.8 Any TWO ✓✓
TOTAL SECTION B: 25
SECTION C:
COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Any TWO ✓✓:
3.1.2 Router ✓
Also accept: Any type of modem (1)
3.1.3 Star ✓ (1)
3.2 Any TWO advantages using a client-server network: ✓✓
3.3
3.3.1 Any ONE reason for updated software: ✓
3.3.2 Any TWO responsibilities of system administrator: ✓✓
3.4
3.4.1 Password protection: to prevent unauthorized access/changes to the data ✓. (1)
3.4.2 Malware is: software that is specifically designed to install itself without the user's knowledge to negatively affect the computer system. ✓
NOTE - Do not accept examples. (2)
3.4.3 A firewall provides security by monitoring the communication and ports✓ to prevent unauthorised access ✓ through these ports and to the network.(2)
3.5
3.5.1 Cookie is a text file ✓ that is saved locally on the hard drive after visiting a web site, with configuration settings reflecting the user's preferences. ✓ (2)
3.5.2 A dynamic webpage are created by software running on the webserver each time they are accessed. ✓
When a dynamic web page is accessed by different users they will see different content. ✓ (2)
3.5.3 Cascading style sheet (CSS) contains the formats for how a particular object should be displayed in a Web browser ✓ and therefore the developer does not have to code separate web pages for individual user configurations/preferences✓ for example: different colour schemes (2)
3.5.4(a) Authenticate the identity of the person/organisation/website ✓ (1)
3.5.4(b) Any TWO ✓✓
TOTAL SECTION C: 23
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1 Oracle ✓ (1)
4.2 Any TWO✓✓
4.3
4.3.1 Record – collection of fields/1 row of data/particulars of an entity ✓ (1)
4.3.2 StartDate or EndDate ✓
Text must change to DateTime data type✓
NOTE: GuideTelNum cannot be changed (2)
4.3.3(a) Update anomaly:
If the telephone number of the tour guide Kajal Singh changes✓ the information must be changed in all the records where Kajal Singh is the tour guide. ✓
Concepts:
4.3.3(b) Split the table into more than one table ✓
Each table must have a primary key ✓
Create a 1 to many relationship between the tables ✓ (3)
4.3.4 All the records✓ from the table are deleted✓
NOTE: Do not accept the table is deleted (2)
4.4 The data is mirrored/duplicated ✓ in parallel sets of data so that if one set fails the other will be able to be used. ✓ (2)
4.5 Data mining - Software is used to identify trends/patterns ✓ in the vast amount of data ✓ (2)
4.6 A hacker types a SQL statement ✓ in a data field/query parameter instead of the required data. ✓ (2)
4.7
4.7.1 Any TWO of: ✓✓
4.7.2 Duplication ✓
Partitioning ✓ (2)
TOTAL SECTION D: 23
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1
5.1.1(a)
5.1.1(b) Any TWO ✓✓
5.1.2(a)
5.1.2(b) The accommodation can only be selected ✓ from the selection component’s list of acceptable values. (1)
5.2
5.2.1 Logical error – although the program runs when executed ✓ it produces incorrect results/output ✓ (2)
5.2.2(a)
5.2.2(b) A (between lines 6 and 7) (1)
5.2.3 2 For counter2 ← 1 to 2 ✓
3 total ← 0
4 For counter1 ←1 to 12 ✓
5 total ← total + arrVisitors [counter1,counter2]
NOTE: Ensure that indexes have not been swapped in line 5. (2)
5.2.4 temp ✓ arrVisitors[5,1] ✓
arrVisitors[5,1] ✓ arrVisitors[5,2] ✓
arrVisitors[5,2] ✓ temp ✓ (3)
5.3.
5.3.1 Object Oriented Programming ✓ (1)
5.3.2 It is used to instantiate an object ✓ (1)
5.3.3 The number of days can be calculated ✓ from the other fields/attributes. (1)
5.3.4 It is only available in the object class. ✓
Or
Not accessible from the driver class or from other classes (1)
5.3.5 To change the start date field/attribute ✓ in the object if the original starting date of the booking changed✓ (2)
5.3.6 A toString method is used to combine all the attributes of the object ✓ as a single string✓ (2)
TOTAL SECTION E: 26
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 Any ONE motivation for using mobile devices: ✓
6.1.2 Any TWO disadvantages using smartphones: ✓✓
6.1.3 Online syncing✓ service (1)
6.2 Any TWO methods of gaining access: ✓✓
6.3
6.3.1 Acceptable Use Policy ✓ (1)
6.3.2 Any TWO of the following:✓✓
6.3.3
6.4
6.4.1 Intranet is:
OR
The company documents are available through webpages/internet type of environment to the travel agents with access rights on the companies private network (2)
6.4.2 Log on to a VPN ✓ (1)
6.5
6.5.1 Any ONE of ✓
NIC allows the computer to connect to the network.
NIC controls the flow of data to the network (1)
6.5.2 The purpose of MAC address is to ensure that the network device has a unique address✓ (1)
6.6
6.6.1 Take a photo using a smartphone/digital camera ✓ (1)
6.6.2 Any TWO reasons for networking devices: ✓✓
6.6.3 Any ONE ✓
6.7
6.7.1 Any ONE ✓
6.7.2 Any TWO advantages of SaaS: ✓✓
6.7.3 The resources of powerful computers are shared among multiple users – virtual server ✓✓
OR
The resources of many computers are combined to create a super powerful service - to appear as if it is a single machine (2)
6.7.4 Any TWO disadvantages of cloud computing: ✓✓
6.8
6.8.1 Data is scrambled ✓ according to an specific algorithm ✓ (2)
6.8.2 Public key encryption method: Uses a Public key to encrypt ✓ data and a Private key (secret/hidden) to decrypt ✓ data. (2)
6.8.3 Any ONE disadvantage of using BitCoin: ✓
6.9
6.9.1 Peer-to-peer protocol ✓ to transfer and share large files ✓ across a network/Internet (2)
6.9.2 Any TWO benefits of using BitTorrents: ✓✓
6.10 Any TWO: ✓✓
TOTAL SECTION E:38
GRAND TOTAL:150