INFORMATION TECHNOLOGY P2
FEBRUARY/MARCH 2016
MEMORANDUM
NATIONAL SENIOR CERTIFICATE
GRADE 12
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1.1 Internet Service Provider ✓ (1)
1.1.2 Green computing ✓ (1)
1.1.3 Normalisation ✓ (1)
1.1.4 Firmware ✓ (1)
1.1.5 FTP – file transfer protocol ✓ (1)
1.1.6 Compiler ✓(1)
1.1.7 Artificial Intelligence ✓ (1)
1.1.8 System clock ✓ (1)
1.1.9 Push technology ✓(1)
1.1.10 Foreign/Secondary key ✓(1)
1.2.1B ✓(1)
1.2.2 D ✓(1)
1.2.3B ✓(1)
1.2.4D ✓ (1)
1.2.5A ✓(1)
TOTAL SECTION A: 15
SECTION B: SYSTEM TECHNOLOGIES
QUESTION 2
2.1
2.1.1 ROM – stores the BIOS which is needed to start up the computer ✓ (1)
2.1.2 RAM – all data and instructions have to be loaded in RAM before the CPU can work with them ✓ (1)
2.2 Any ONE advantage of a touch screen monitor: ✓
2.3 Any ONE disadvantage for using HDD in laptop: ✓
2.4
2.4.1 Any TWO memory management functions of operating system: ✓ ✓
The operating system:
2.4.2 Any TWO other functions of operating system (except memory management) ✓ ✓
2.5 Any ONE reason why new portable drives are preferred over CDs/DVDs: ✓
2.6 To be able to plug in a cable to allow the computer to connect to the network ✓(1)
2.7 Any ONE effect a separate graphics processor has on laptop: ✓
2.8
2.8.1 Send an (hardware) interrupt ✓ (1)
2.8.2 The operating system detects the device and automatically loads the drivers. ✓
OR
The device makes itself known to the operating system, which then automatically configures the device for use. (2)
2.9
2.9.1 Purpose of cache memory:
Concepts:
2.9.2 Disk caching: Concepts:
2.10
2.10.1 Utility software are programs/applications ✓ that perform routine maintenance and administration tasks in a computer system. ✓(2)
2.10.2 Defragmenter ✓(1)
2.11 Virtual memory:
Concepts:
TOTAL SECTION B: 24
SECTION C:
COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Provide users with access to files stored on it ✓ (1)
3.1.2(a) The physical layout/connection of the computers in a network. ✓ (1)
3.1.2(b) Any TWO ✓ ✓
3.1.2(c) Switch ✓ (1)
3.1.3 Any ONE ✓
The NIC:
3.1.4 (a) An IP address is a numerical address that uniquely identifies a computer on a network/Internet.(1)
(b) If two computers have the same IP address, a conflict will occur and the network operating system will be unable to connect those two computers to the network.(1)
3.2
3.2.1 Refers to the limited amount of data that can be downloaded per month using the ADSL line. ✓ (1)
3.2.2 Refers to the data transfer rate – the total amount of data that can be carried from one point to another in a given time period ✓ (1)
3.3
3.3.1 Low bandwidth with many users connected to one access point which results in poor access speed. ✓ (2)
3.3.2 Cost for data will be much more expensive ✓ (1)
3.4
3.4.1 Any TWO advantages of online storage: ✓ ✓
3.4.2 Data synchronisation ✓(1)
3.5
3.5.1 A set of rules for encoding and decoding for transmission across a network. ✓(1)
3.5.2
3.5.3 Any TWO ✓ ✓
3.6
3.6.1 Antivirus ✓ (1)
3.6.2 Firewall ✓ (1)
3.6.3 UPS ✓ (1)
3.6.4 Encryption ✓(1)
TOTAL SECTION C: 25
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1
4.1.1 Currency/Double ✓ (1)
4.1.2 Concepts: One department ✓ can have many types of items. ✓
Specific example: department D12(Afrikaans department) has desktop computers and printers (2)
4.1.3 (a) SELECT * FROM tblStockItems ORDER BY ItemName
✓SELECT *
✓FROM tblStockItems
✓ORDER BY ItemName (3)
4.1.3 (b) UPDATE tblStockItems SET ItemQuantity = ItemQuantity + 1, WHERE DepartmentID = 'D12' AND ItemName = 'Printer HP F370M '
✓UPDATE tblStockItems
✓SET ItemQuantity = ItemQuantity +1,
✓DepartmentID = 'D12 AND
✓ItemName = 'Printer HP F370M' (Or ItemID = 'C5') (4)
4.1.3 (c) SELECT DepName, Sum( ItemQuantity * ItemCost) AS TotalValue FROM tblStockItems, tblDepartment
WHERE tblStockItems. DepartmentID= tblDepartment. DepartmentID GROUP BY DepName
✓SELECT DepName,
✓Sum(ItemQuantity * ItemCost)
✓AS TotalValue
✓FROM tblStockItems, tblDepartment ✓WHERE
tblStockItems.DepartmentID = tblDepartment.DepartmentID
✓GROUP BY DepName (6)
4.1.4 SELECT ItemName, ItemQuantity FROM tblStockItems
WHERE ItemName LIKE ✓ %Laptop% (2)
4.2
4.2.1 Database management system (1)
4.2.2 Any TWO ✓ ✓
4.3
4.3.1 Any TWO ✓ ✓
4.3.2
4.3.3
Dependant transactions are grouped ✓ and the complete transaction is only processed if all individual transactions were successful ✓ (2)
TOTAL SECTION D: 27
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1 Loop row from 1 to 4 ✓
Loop col from 1 to 4 ✓
arrStock[row,5 ✓] ← arrStock[row,5] ✓ + arrStock[row,col]
OR
Loop row from 0 to 3 ✓
Loop col from 0 to 3 ✓
arrStock[row,4 ✓] ←arrStock[row,4] ✓ + arrStock[row,col]
OR
Loop row 1 → 4✓
total ← 0 ✓
Loop col 1 →4
total ← total + arrStock[row,col] ✓
arrStock[row,5] ← total ✓ (5)
5.2
5.2.1(a) Syntax ✓ (1)
5.2.1(b) Logical ✓(1)
5.2.1(c) Runtime ✓(1)
5.2.2
Any TWO ✓✓
5.3
5.3.1 Open the text file StockDetails for reading
Counter ← 0
Loop until the end of the StockDetails text file
Read one line of text ✓
Test if the line contains the word Tablet ✓
Increment Counter ✓
Copy text up to ‘;’ and store in room number array✓
Copy text after #; and store in quantity array✓
End loop
Close text file ✓ (6)
5.3.2 The path was incorrectly specified ✓
OR
The text file was not available in the working folder (1)
5.4 JAVA solution
number of values | j | loop counter | k | j modulus 2 = 0? | arrNumbers [loop counter] | |
4 | 1 | 0 | 1 | 5 | ✓ | |
No | ✓ | |||||
2 | 1 | 4 | 8 | ✓ | ||
Yes | 2 | ✓ | ||||
3 | 2 | 9 | 13 | ✓ | ||
No | ✓ | |||||
4 | 3 | 16 | 20 | ✓ | ||
Yes | 4 | ✓ | ||||
5 | ✓ |
DELPHI solution
number of values | j | loop counter | k | j modulus 2 = 0? | arrNumbers [loop counter] | |
4 | 1 | 0 | 1 | 5 | ✓ | |
No | ✓ | |||||
2 | 1 | 4 | 8 | ✓ | ||
Yes | 2 | ✓ | ||||
3 | 2 | 9 | 13 | ✓ | ||
No | ✓ | |||||
4 | 3 | 16 | 20 | ✓ | ||
Yes | 4 | ✓ | ||||
5 | ✓ |
(8)
TOTAL SECTION E: 25
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 Any TWO ✓✓
6.1.2(a) To decrease the size of the video file for faster file transfer ✓ and to reduce the amount of storage space needed ✓ (2)
6.1.2(b) Losing some of the insignificant detail of the file ✓(1)
6.1.3(a) An audit trail is a record showing tracked information✓ (1)
6.1.3(b) Any TWO ✓✓
6.2
6.2.1 Encryption is when data is converted into an unreadable format ✓ by using a set of rules ✓or an algorithm. (2)
6.2.2 Public key is used to encrypt a message ✓ and the private key is used to decrypt the message ✓
The private key is retained by one site while the public key is passed across the network to the party who wants to establish a secure connection ✓ (3)
6.3
6.3.1 VPN ✓
Remote desktop ✓( 2)
6.3.2 An intranet is a private network that offers restricted access to members of an organisation; this can be used for the school staff members.✓
An extranet is used when users from outside an organisation like the security company are allowed access to information using passwords and user names. ✓ (2)
6.4 Any TWO ✓✓
6.5
6.5.1 RFID uses radio waves ✓ to identify objects/tags over a distance ✓(2)
6.5.2 Any TWO ✓✓
6.6
6.6.1 Radio wave connection ✓ that is able to transfer data over short distances ✓ (2)
6.6.2 Any ONE ✓
6.7
6.7.1 A service available on the Internet ✓ (1)
6.7.2 Do not provide the service yourself ✓ but pay someone else to do it. ✓(2)
6.7.3 Any TWO ✓✓
6.7.4 Virtualisation ✓(1)
6.7.5 Database administrator
Any TWO ✓✓
TOTAL SECTION E: 34
GRAND TOTAL: 150