INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NOVEMBER 2017
NATIONAL SENIOR CERTIFICATE
INSTRUCTIONS AND INFORMATION
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question number (1.1.1–1.1.5) in the ANSWER BOOK, for example 1.1.6 D.
1.1.1 Altering the sender's address and other parts of an e-mail header to appear as if the e-mail originated from a different source is called …
1.1.2 Which ONE of the following does NOT refer to an attribute of ROM?
1.1.3 The following are computer file management techniques:
Which combination of computer file management techniques is used when an image file is changed from bmp format into jpeg format using image software?
1.1.4 The communication standard most commonly used to connect cellphones to hands-free car kits is …
1.1.5 The following Delphi statements appear in code that has been executed:
sLine :='We love the Delphi programming language';
sAnswer := copy(sLine, pos('l', sLine), 4);
What will be the content of the sAnswer variable?
1.2 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question number (1.2.1–1.2.10) in the ANSWER BOOK.
1.2.1 An area typically found at airports and in coffee shops where wireless network connectivity is available to the public (1)
1.2.2 The ability to plug in or remove a device from a computer without switching off the computer (1)
1.2.3 Malware that spreads itself over networks, normally by mailing itself to all the contacts in a user's address book (1)
1.2.4 A network of computers that are remotely controlled by malware and then used by criminals to install and run software as they need it (1)
1.2.5 A web application that allows people to add and modify content on an online knowledge resource (1)
1.2.6 Hardware and/or software that monitors the traffic between a computer and the Internet for safeguarding against breaches in security (1)
1.2.7 The type of error that may occur in a database when a change in data necessitates the same data to be altered in multiple records in a table (1)
1.2.8 A technology used by devices to automatically download e-mail after receiving a notification from the mail server (1)
1.2.9 A set of programs designed to fraudulently use administrator rights to gain control of a computer to perform illegal activities (1)
1.2.10 An error condition that occurs when there are not enough bits available to represent an integer value accurately (1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
A school purchased a desktop computer with the specifications below for administrative purposes. Study the specifications and package details and answer the questions that follow.
Intel Axom X5-Z8350 Quad Core processor – 2 MB cache memory 10.1 LED touch screen 4 GB RAM 500 GB HDD Windows 10 24-month contract, 2 GB data price plan and an LTE Wi-Fi router Office 365 Home – one-year subscription for five PCs 10 GB of OneDrive storage space 4x USB 3.0 ports |
2.1 All computer systems have an operating system.
2.1.1 Identify the operating system installed on the computer system above. (1)
2.1.2 State THREE functions of an operating system in general. (3)
2.1.3 Operating systems support a variety of processing techniques.
Briefly explain EACH of the following processing techniques:
2.2 What does Quad Core refer to in the processor description in the computer system? (1)
2.3 Give TWO reasons why the amount of RAM in a computer is limited and is normally less than the amount of secondary storage space. (2)
2.4 The package includes a router.
2.4.1 What is the function of a router? (1)
2.4.2 What wireless communication technology is provided as part of the package? (1)
2.5 Explain why the use of a dedicated video card results in increased processing speed of a computer system. (2)
2.6 Why does cache memory improve the performance of the CPU in a computer system? (2)
2.7 When a device, such as a flash drive or a printer, is plugged into a USB port, a message is often displayed indicating it is a plug-and-play device.
2.7.1 Briefly explain the plug-and-play process. (2)
2.7.2 When a device such as a flash drive or a printer is used, how does it indicate that it requires the attention of the CPU? (1)
2.8 OneDrive is an example of an online storage service that allows the synchronisation of files.
What is the advantage of file synchronising services? (2)
2.9 Indexing of files can be applied by an operating system if instructed to do so.
Briefly explain what indexing of files means AND state the benefit of applying this feature. (2)
2.10 The school wants to buy a laptop computer or a tablet to provide mobile facilities when required.
2.10.1 Where is the operating system on a mobile device stored? (1)
2.10.2 State TWO factors to take into account when developing software for mobile devices. (2)
TOTAL SECTION B: 27
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
Network technologies are applied in many areas of everyday life.
3.1 Computers used for administrative tasks are normally connected in a network. An Ethernet LAN could be used for this purpose.
3.1.1 Name ONE type of cable that is commonly used in an Ethernet network. (1)
3.1.2 Which topology allows every computer to be connected with its own cable to a switch? (1)
3.1.3 Which network protocol would be used to:
3.2 What is the benefit of using a virtual private network (VPN)? (2)
3.3 When an Internet transaction is done, data can be captured without the user's knowledge or consent.
3.3.1 What is this type of data capturing called? (1)
3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured. (2)
3.3.3 The captured data is often used for user profiling purposes.
What is user profiling mostly used for? (1)
3.4 An essential part of making websites interactive is to include programming code to be executed.
Name THREE types of code a website can implement to provide interactivity. (3)
3.5 A warning about the use of cookies is displayed when connecting to a website.
3.5.1 What is a cookie? (2)
3.5.2 What is the effect of deleting cookies for the user? (1)
3.6 VoIP can be used to make telephone calls over the Internet.
State TWO disadvantages of using VoIP. (2)
3.7 Most mobile devices include a GPS.
What is the purpose of a GPS? (1)
3.8 Digital rights management (DRM) is a controversial topic in the IT industry.
3.8.1 Explain what DRM software is. (2)
3.8.2 Name ONE area of application of DRM software. (1)
TOTAL SECTION C: 22
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1 The supervisor of the maintenance team at the school needs assistance with a database for the employees. The two tables below were created to save the information of the employees and the maintenance jobs that had been assigned to them.
tblEmployees | tblJobCards |
ID EmployeeName EmployeeSurname Gender Age | JobCardNumber DateStarted DateCompleted NumDaysTaken Description |
4.1.1 In the tblEmployees table the ID field is intended to save the identity number of the employee, for example 0210255017084.
Give ONE reason why it would be incorrect for this field to be an integer data type. (1)
4.1.2 The JobCardNumber field is selected as the primary key in the tblJobCards table.
Explain why none of the other fields in this table would be a suitable primary key. (1)
4.1.3 The NumDaysTaken field indicates how many days it took to complete the job. It has been suggested that the NumDaysTaken field in the tblJobCards table should be removed because it is unnecessary.
Motivate this suggestion. (1)
4.1.4 The manager wants to view a list of jobs that have been assigned to a specific employee. A relationship must be created between the two tables to be able to generate the list.
A field must be added to one of the tables for a relationship to be created.
Indicate the name of:
4.2 Information must always be verifiable.
What does verifying information entail? (1)
4.3 The gender of an employee was entered in an edit box. The format of the input data (gender) was not specified, which resulted in the following input data being entered by different users:
Male; M; Female; F; m; female
Explain how the programmer can ensure, by using code, that only valid data items ('M' or 'F') will be available for use in the rest of the program.
NOTE: Validity must be ensured using code; NOT with the use of any specific GUI components. (2)
4.4 Each year the teachers order cleaning equipment for their classrooms.
The tblEquipment table contains all the orders for cleaning equipment placed by teachers for the past two years.
The structures of the tblEquipment table and the tblClassroom table are shown below.
Structure of tblEquipment:
Field name | Data type | Size |
OrderNum | Text | 4 |
Description | Text | 50 |
OrderDate | Date/Time | Short date in the format yyyy/mm/dd |
RoomNumber | Number | Value between 1 and 50 (inclusive) |
Delivered | Boolean | true/false |
Structure of tblClassroom:
Field name | Data type | Size |
RoomNumber | Number | Value between 1 and 50 (inclusive) |
Teacher | Text | 25 |
Examples of the records of the two tables above are shown below.
Table: tblEquipment
Table: tblClassroom
Write SQL statements to perform EACH of the following tasks:
4.4.1 Display the OrderNum, Description and OrderDate of all orders that were placed in 2016 and not delivered yet. (4)
4.4.2 All the brooms that were ordered have been delivered.
Change the content of the tblEquipment table to indicate that there are no outstanding deliveries for brooms. (3)
4.4.3 Display the names of the teachers who placed orders AND the total number of orders placed by each teacher. Store the calculated value in a new field called numOrders. (5)
TOTAL SECTION D: 20
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1 Procedures and functions are used to enhance modularity in programs.
5.1.1 State TWO advantages of modular programming. (2)
5.1.2 Distinguish between a private function and a public function. (2)
5.2 The variables x, y and z have been initialised as follows:
x := false;
y := 4;
z := 4;
Determine the result of the Boolean variable, bAnswer, in EACH of the following statements:
5.2.1 bAnswer := y = z; (1)
5.2.2 If (NOT (x)) AND (y <> 4) then
bAnswer := true
else
bAnswer := false; (2)
5.3 A palindrome is a word that reads the same forwards and backwards, for example noon.
Complete the missing block of the pseudocode below to construct the word that was entered in reverse format in the reverseWord variable to determine whether the word is a palindrome, or not. (4)
5.4 The diagram below uses a 5 x 5 two-dimensional array called arrLightBulbs to store the total number of light bulbs that has been replaced in each block of the school building (A, B, C, D, E) on each day of the week for the past year.
arrLightBulbs is declared as follows:
arrLightBulbs : array[1..5, 1..5] of integer;
NOTE: The labels are NOT part of the content of the array.
5.4.1 The values in the array indicated in the diagram (left diagonal area) must be added to find a total value.
Example of correct solution:
iSum := 0; iRows:= 5; iColumns := 5; for r := 1 to iRows do for c := 1 to iColumns do if r = c then iSum := iSum + arrLightBulbs[r,c]; |
Copy and complete line 4 of the following alternative solution that uses a single loop to achieve the same result:
1 iSum := 0; 2 iRows := 5; 3 for loop := 1 to iRows do 4 iSum := ... |
(4)
5.4.2 Some of the mistakes that were made while coding are listed below.
Indicate in EACH case the type of error (syntax/runtime/logical) that occurred as a result of the incorrect statement.
5.4.3 Code must be added to save the data in a text file.
Distinguish between the file handling tasks performed by the Reset statement and the Rewrite statement. (2)
5.5 A software program has been designed to use the class TSchool, as shown in the UML diagram below.
TSchool |
-fSchoolName -fNumberLearners -fNumberTeachers |
+constructor create(SchoolName:String; Learners:Integer) |
5.5.1 As part of the testing phase, attempts were made to instantiate objSchool objects using incorrect statements.
Identify AND briefly explain the error(s) in EACH statement below.
5.5.2 Methods have to be added to the TSchool class.
Choose the appropriate method type from the list of available method types (Accessor, Mutator, Auxiliary, Constructor) to perform EACH of the following tasks:
TOTAL SECTION E: 25
SECTION F: INTEGRATED SCENARIO
QUESTION 6
Your school is launching a major drive to embrace the digital era. The expansion of their network, linked with increased Internet availability, has made it possible for them to better utilise new technologies and ICT. Apart from all the benefits, the increased use of computers and online services pose challenges in terms of providing improved hardware and educating users. |
6.1 Name TWO IT-related jobs that will be created when setting up and expanding the network. (2)
6.2 Access to the server room must be controlled.
6.2.1 The administrative staff members use biometrics to gain access to the server room.
6.2.2 It has been suggested that the other staff members use RFID cards to gain access to the server room.
State TWO disadvantages of using RFID cards for this application. (2)
6.3 Learners complain that their computers become very slow quickly when they open more applications. It has been suggested that they may be using too much virtual memory.
6.3.1 What is virtual memory? (2)
6.3.2 Which software implements and manages virtual memory in a computer system? (1)
6.3.3 How can the use of virtual memory be limited? (1)
6.4 File compression techniques can be used to reduce the size of files.
Distinguish between the results when a file is compressed using lossless compression and lossy compression. (2)
6.5 Some of the teachers requested that the SMT protocol settings be provided to them.
6.5.1 Explain what a protocol is. (2)
6.5.2 What is the SMT protocol used for? (1)
6.6 The school uses a school management system that uses a distributed database system.
6.6.1 What is a distributed database? (2)
6.6.2 State TWO advantages of using a distributed database. (2)
6.7 The development of the Web from version 1.0 into various other versions has greatly improved the value of the Web.
6.7.1 Briefly describe the main feature of Web 1.0. (2)
6.7.2 Web 3.0 is often referred to as the Semantic Web
6.8 While searching for instructional videos on the Internet, a staff member saw a link to a webinar on education.
6.8.1 What is a webinar? (1)
6.8.2 State ONE way in which the staff member may benefit from signing up for the webinar. (1)
6.9 A logical effect of the improvements at the school has been an increase in the use of cloud computing and SaaS.
6.9.1 What does the acronym SaaS stand for? (1)
6.9.2 Cloud computing includes cloud software services, such as Office365.
Explain how cloud applications work in general. (2)
6.9.3 State TWO disadvantages of using online software services. (2)
6.10 Teachers can subscribe to websites that publish educational articles. These websites also provide RSS (really simple syndication) services.
Explain what an RSS service is. (2)
6.11 Parents/Custodians are concerned about learners' exposure to social networking sites and cybercrime.
6.11.1 Suggest TWO ways of using social networking sites responsibly. (2)
6.11.2 Give TWO reasons why cybercrime is prevalent. (2)
6.11.3 A general crime people commit is using unsecured Wi-Fi Internet connections without permission.
What term is used to describe this crime? (1)
6.12 The IT learners are considering constructing a drone as part of an awareness drive for new technology. A 3D printer will be used to print the parts of the drone.
6.12.1 What is a drone? (1)
6.12.2 State TWO possible benefits of using a 3D printer for printing the parts of the drone. (2)
TOTAL SECTION F:41
GRAND TOTAL:150