INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NOVEMBER 2017
MEMORANDUM
NATIONAL SENIOR CERTIFICATE
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 A✓ (1)
1.1.2 D ✓ (1)
1.1.3 A ✓ (1)
1.1.4 C✓ (1)
1.1.5 B ✓ (1)
1.2
1.2.1 Hotspot ✓ (1)
1.2.2 Hot swappable/pluggable ✓ (1)
1.2.3 Computer worm ✓ (1)
1.2.4 Botnet/Bots/Zombie PC's ✓ (1)
1.2.5 Wiki ✓ (1)
1.2.6 Firewall ✓ (1)
1.2.7 (Update/delete) anomaly ✓ or redundancy (1)
1.2.8 Push ✓ technology/notification (1)
1.2.9 Rootkit ✓ (1)
1.2.10 Overflow ✓ (1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1
2.1.1 Windows ✓ (1)
2.1.2 Any THREE functions of an operating system: ✓✓✓
2.1.3 (a) Multitask processing:
The computer appears to run multiple programs ✓ at the same time/simultaneously by sharing processing time of the CPU ✓ between processes/tasks
Concepts:
2.1.3 (b) Multithreading:
When a single program is broken up into independent parts/threads that run at the same time ✓
Concepts:
2.2 4/multiple processor cores ✓ on one CPU chip (1)
2.3 Any TWO ✓✓
2.4
2.4.1 Any ONE ✓
2.4.2 LTE/Wi-Fi ✓ (1)
2.5 A graphics card generates images ✓ faster using the GPU (graphics processor unit).
The use of a separate video card will allow the CPU to focus on carrying out program instructions ✓ thus reducing the load on the CPU.
Concepts:
2.6 Cache memory is high speed memory that stores data and instructions ✓ most likely to be needed next by the CPU, preventing the CPU from having to load it from the slower RAM ✓
Concepts: Any TWO
2.7
2.7.1 The operating system detects the new device ✓and installs the drivers automatically ✓
OR
The flash drive makes itself known to the operating system and then the operating system configures the drivers for use
Concepts:
2.7.2 By sending a hardware interrupt signal (IRQ)✓ (1)
2.8 Allows the user to access the latest version of the files ✓ on different devices. ✓
OR
Changes in files are automatically updated between devices
NOTE:
Do not accept: add or access from anywhere/online/backup (2)
2.9 Indexing the files means that the operating system has an index that includes the text inside the files as well as the file names. ✓
It allows you to search for words or phrases that you can remember that might be inside the document instead of just for a file name. ✓
Concepts:
2.10
2.10.1 Any ONE ✓
2.10.2 Any TWO ✓✓
TOTAL SECTION B: 27
SECTION C:
COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Any ONE ✓
Also accept: co-axial cables (1)
3.1.2 Star ✓ (1)
3.1.3 (a)TCP/IP (IPv4/IPv6) /Internet protocol ✓ (1)
3.1.3 (b) http/https ✓ (1)
3.2 The user can log on over a public network ✓ like the Internet with the same, if not better, benefits of privacy and security ✓ of a LAN.
Concepts:
3.3
3.3.1 Invisible ✓ data capturing (1)
3.3.2 Any ONE real life example of data capturing ✓and explanation ✓
Or any other valid example that leaves an electronic trail
NOTE:
Do not accept any indication of theft of personal information (2)
3.3.3 Purpose of targeted marketing/supplied information. ✓ (1)
3.4 Any THREE: ✓✓✓
Or any acceptable verifiable scripting language (3)
3.5
3.5.1 Cookie:
A text file ✓ stored on your local computer that is used to save user settings/preferences ✓ for a website (2)
3.5.2 Any ONE effect of deleting a cookie: ✓
3.6 Any TWO disadvantages of using VoIP: ✓
3.7 Any ONE ✓
Or any other acceptable positioning example (1)
3.8
3.8.1 DRM (Digital Rights Management) refers to any software which uses some form of encryption ✓ and manages access ✓ to the content of electronic media
Concepts:
3.8.2 Any ONE area of application of DRM software ✓
TOTAL SECTION C: 22
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1
4.1.1 Any ONE reason why ID field may not be integer data type: ✓
4.1.2 Any ONE reason why no other field can be the primary key:✓
4.1.3 Since the DateStarted and DateCompleted fields are available ✓, the NumDaysTaken field can be calculated (1)
4.1.4(a) ID ✓ (1)
4.1.4(b) tblJobCards ✓ (1)
4.2 Any ONE explanation of verifying information: ✓
4.3
Also accept: code/algorithm. (2)
4.4
4.4.1 SELECT OrderNum, Description, OrderDate ✓
FROM tblEquipment ✓
WHERE Delivered = false ✓
AND year(OrderDate) = 2016 ✓
Alternative statements:
NOTE:
AND should be marked with the second condition (4)
4.4.2 UPDATE tblEquipment ✓
SET Delivered = true ✓
WHERE Description = "Broom" ✓
Alternative:
WHERE Description like "Broom%" (3)
4.4.3 SELECT Teacher, ✓
count(*) as numOrders ✓
FROM tblClassroom, tblEquipment ✓
WHERE
tblClassroom.RoomNumber = tblEquipment.RoomNumber ✓
GROUP BY Teacher ✓
OR
SELECT Teacher, count(*) as numOrders FROM tblClassroom INNER JOIN tblEquipment ON tblClassroom.RoomNumber = tblEquipment.RoomNumber GROUP BY Teacher
NOTE:
TOTAL SECTION D: 20
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1
5.1.1 Any TWO advantages of modular programming: ✓✓
5.1.2 A private function is only accessible from within ✓ the class / unit /form
A public function is accessible from outside ✓ the class/project /form (2)
5.2
5.2.1 True (1)
5.2.2 False ✓✓ (2)
5.3 Loop from 1 to length of word ✓
reverseWord (✓ addition) ✓ word[loop] ✓ + reverseWord; (✓ order)
OR
Loop from length of word down to 1
reverseWord ✓ reverseWord + word[loop]
Concepts:
5.4
5.4.1 iSum := iSum ✓+ arrLightBulbs ✓ [loop ✓, loop ✓];
Also accept:
4 marks - iSum := iSum + arrLightBulbs[r, r];
3 marks – if any other letter is use for both index values
e.g. iSum := iSum + arrLightBulbs[x,x]
If hard coded – max 2 marks (4)
5.4.2(a) Syntax ✓ (1)
5.4.2(b) Logical ✓ (1)
5.4.2(c) Syntax ✓ (1)
5.4.3 Reset: (any ONE) ✓
Rewrite: (any ONE) ✓
Do not accept: Writing to file (2)
5.5
5.5.1(a) Any ONE: ✓
Do not accept:
5.5.1(b) Incorrect order of arguments/parameters ✓ (1)
5.5.1(c) Any ONE ✓
5.5.2(a) Mutator ✓
Also accept: Auxiliary (1)
5.5.2(b) Auxiliary ✓ (1)
TOTAL SECTION E: 25
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1 Any TWO ✓✓
Do not accept:
6.2
6.2.1(a) Biometrics:
The use of personal characteristics ✓ to authenticate the identity of a person
Also accept: Use parts of the body for access control (1)
6.2.1(b) Any ONE suitable example of biometrics in this scenario: ✓
6.2.2 Any TWO ✓✓
6.3
6.3.1 Virtual memory:
Hard drive space/storage ✓ reserved by the operating system to be used as RAM/memory ✓
Also accept for 2 marks: Hard drive space to be used when the RAM is full (2)
6.3.2 Operating system ✓ (1)
6.3.3 Any ONE way to limit the use of virtual memory:✓
6.4 Lossless – no data is lost ✓
Lossy – some insignificant data is lost (2)
6.5
6.5.1 Protocol:
A set of rules ✓ for transmission of data across a network/encoding and decoding data for transmission. ✓ (2)
6.5.2 (Sending) e-mail ✓ (1)
6.6
6.6.1 Distributed database:
Parts of a database ✓ are spread over multiple servers in different locations ✓
Concepts:
6.6.2 Any TWO advantages of distributed database: ✓✓
6.7
6.7.1 Any ONE : Web 1.0: ✓✓
6.7.2(a) The Semantic Web:
Has the ability to interpret information ✓ like humans and provide useful content tailored to user needs/personalization. ✓ (2)
6.7.2(b) The Internet of Things ✓ (1)
6.8
6.8.1 Online seminar ✓ (1)
6.8.2 Any ONE ✓
OR any other acceptable answer (1)
6.9
6.9.1 SaaS: Software as a Service ✓ (1)
6.9.2 Any ONE - Cloud applications: ✓✓
Concepts: Any TWO
6.9.3 Any TWO disadvantages associated with using online services:✓✓
6.10 RSS is a web or news feed/automatic ✓provision to users of updated content✓ and/or notifications of new content from websites (2)
6.11
6.11.1 Any TWO responsible uses of social networking sites ✓✓
OR any suitable answer (2)
6.11.2 Any TWO reasons why cybercrime is prevalent: ✓✓
6.11.3 Piggybacking ✓ (1)
6.12
6.12.1 A machine that have a certain amount of autonomous flight capabilities, while still being controlled by a human.
OR any similar explanation
Accept: control of flying object (1)
6.12.2 Any TWO benefits of 3D printing ✓✓
OR any other acceptable answers (2)
TOTAL SECTION E:41
GRAND TOTAL: 150