examiners: mrs s bramdaw / mrs s naicker -...

27
PINETOWN DISTRICT MARKS : 150 TIME : 3 hours EXAMINERS: MRS S BRAMDAW / MRS S NAICKER MODERATOR: MRS F B ISMAIL Copyright reserved Please turn over INFORMATION TECHNOLOGY P2 GRADE 12 TRIAL EXAMINATION 2017 Date of examination: 6

Upload: dangngoc

Post on 10-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

PINETOWN DISTRICT

MARKS : 150 TIME : 3 hours

EXAMINERS: MRS S BRAMDAW / MRS S NAICKER

MODERATOR: MRS F B ISMAIL

This question paper consists of 20 with this cover page.INSTRUCTIONS AND INFORMATION

Copyright reserved Please turn over

INFORMATION TECHNOLOGY P2

GRADE 12

TRIAL EXAMINATION 2017

Date of examination: 6 September 2017

Page 2: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

1. This question paper consists of SIX sections:

SECTION A:

SECTION B:

SECTION C:

SECTION D:

SECTION E:

SECTION F:

Short Questions

System Technologies

Communication and Network Technologies

Data and Information Management

Solution Development

Integrated Scenario

(15)

(25)

(25)

(25)

(26)

(34)

2. Answer ALL the questions.

3. Read ALL the questions carefully.

4. The mark allocation generally gives an indication of the number of facts required in your answer.

5. Number the answers correctly according to the numbering system used in this question paper.

6. Write neatly and legibly.

7. Rule off after each question.

SECTION A : SHORT QUESTIONS

QUESTION 1Copyright reserved Please turn over

Page 3: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

1.1 Various options are provided as possible answers to the following questions. Write down 1.1.1 – 1.1.5 and next to it the LETTER of the correct alternative

1.1.1 Which ONE of the following is an example of system software?

A Media playerB GameC DriverD Web browser (1)

1.1.2 The name of an online digital currency

A BitDefenderB BitCoinC BitTorrentD BitMoney (1)

1.1.3 Which technique allows the processor of a computer system to run at a speed faster than the motherboard normally supports?

A PipeliningB CacheC Hyper threadingD Clock Multiplication (1)

1.1.4 An attack on a company’s network or website where the network is disabled and held to ransom is a…

A Semantic attackB Denial of service attackC Man in the middle attackD Backdoor attack (1)

1.1.5 Study the following algorithm/code and then answer the question on the next page:

Function findsum( num1,num2: integer) : integerVar sum : integer;Begin Result := num1 + num2;End ;Which ONE of the following are num1 and num2 examples of?

A Actual parametersB Formal parametersC Global variablesD Local variables (1)

Copyright reserved Please turn over

Page 4: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

[5]

1.2 Give ONE word/term for each of the following descriptions. Write only the word/ term next to the question number.

1.2.1 A design tool used by a software developer to determine the output of an algorithm. (1)

1.2.2 Software that compiles and executes one line of programming code at a time. (1)

1.2.3 Software that is stored on a ROM chip and used to control the basic operation of a device. (1)

1.2.4 A peer-to-peer protocol used to transfer and share large files across a network such as the Internet. (1)

1.2.5 A large group of low paid workers are hired to click on paid advertising links. (1)

1.2.6 Data that provides information about other data. (1)

1.2.7 The type of compression that sacrifices insignificant/redundant portions of the data. (1)

1.2.8 Software, such as flash players that extend the capabilities of a browser. (1)

1.2.9 A collection of programs that is designed to infiltrate a computer and gain the highest level of privileges to take control of an infected computer. (1)

1.2.10 The key field in a database table that links to the primary key in another database table in order to create a relationship between the two tables. (1)

[10]

SECTION A SUB-TOTAL: 15

SCENARIOYour high school wants to promote an entrepreneurial spirit and has suggested that the computer club be formed to provide computer services and advice to small businesses

in the area. A number of spare computers are to be used to get the venture up and running. The profits will be split on a 50-50 basis with the school. You and a group of

your classmates jump at the idea to earn some extra pocket money.

Copyright reserved Please turn over

Page 5: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

SECTION B : SYSTEM TECHNOLOGIES

QUESTION 2

One of your first tasks is to examine the specifications of devices on sale at a retail store in order to enable a local business owner to make an informed decision about devices he needs to purchase. The following advertisements appeared in a local newspaper during the month of July 2017.

Advert A Advert B Advert C

INTEL Pentium , 2.60 GHzAll-in-one Desktop PC19.5" HD LED Screen4 GB DDR3 RAM500 GB HDDDVD, Wi-Fi, BluetoothIncludes keyboard and mouse

R6 999

15.6" IdeaPad 100INTEL Core i5 Laptop, 2.7 GHz4 GB RAM1 TB HDDDVD Drive, Webcam, SD card reader

Ethernet/Wi-Fi/Bluetooth

R7 999

SAMSUNG10.1" Galaxy Tab A Tablet (Wi-Fi) BundleOcta Core 1.6 GHz3GB RAM16 GB StorageAndroid Includes MS Office 365 Personal

R 4 999

2.1 Advert A mentions an 'All-in-one' Desktop PC.

2.1.1 Explain what is meant by an 'All-in-one' Desktop PC. (2)

2.1.2 What is the primary advantage of a desktop being 'All-in-one' ?

2.1.3 An 'All-in-one' desktop and a laptop can be considered as conceptually similar to each other. However, the desktop mentioned in Advert A offers certain advantages over the laptop mentioned in Advert B.

Write down TWO such advantages.

(1)

(2)

Copyright reserved Please turn over

Page 6: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

2.2 Advert B specifies 2.7 GHz and 4 GB RAM.

2.2.1 What does the 2.7 GHz specification refer to? (1)

2.2.2 Why is RAM essential for a computer system? (2)

2.3 The operating system used by the tablet is Android.

"Android is the operating system that powers over 1 billion smart phones and tablets. Since these devices make our lives so sweet, each Android

version is named after a dessert" (Murali K. Menon)

2.3.1 Name TWO versions of Android. (2)

2.3.2 State ONE problem that can occur when upgrading the operating system on a mobile device. (1)

2.4 Improvements in technology have made it possible for mobile operating systems to support multitasking, multithreading and multiprocessing.

2.4.1 Which specification in the advertisements above is indicative of multi-processing? (1)

2.4.2 Define the term multi-tasking. (2)

2.4.3 Outline the main difference between multithreading and multiprocessing. (2)

2.5 Mobile devices make use of Solid State Drives (SSDs).

Provide any TWO reasons why solid-state drives are used for storage on mobile devices instead of hard disk drives. (2)

2.6 Computers become very slow and sometimes unresponsive when a number of applications are open at the same time, as there is a high level of continuous hard drive activity.

2.6.1 Which term is used for the problem described above? (1)

2.6.2 Describe how a computer manages to still open a number of applications despite having limited RAM. (2)

2.6.3 Write down TWO tips for preventing performance issues related to virtual (2)

Copyright reserved Please turn over

Page 7: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

memory.

2.7 Laptops can be equipped with finger print scanners.

2.7.1 State ONE advantage of using a fingerprint sensor on the laptop. (1)

2.7.2 List another example of a biometric device/system that can be used to uniquely identify individuals. (1)

SECTION B SUB -TOTAL : 25

Copyright reserved Please turn over

Page 8: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

SECTION C : COMMUNICATION AND NETWORK TECHNOLOGIES

QUESTION 3

Ten spare computers have been made available by the school for the computer club's business venture. To make transmission of data and files easier, the club has decided to connect the computers in a network.

3.1 Whilst setting up the network, some questions emerged :

3.1.1 Explain what a computer network is. (2)

3.1.2 The learners were advised that they need a router as it is an 'All-in-one' solution.

Describe THREE functions of a router that makes it an 'All-in-one' solution. (3)

3.2 A star topology is used to connect the computers.

3.2.1 Explain the term Topology with reference to a computer network. (1)

3.2.2 Discuss any TWO advantages of using a star topology. (2)

3.3 Wired media consists of physical cables that connect devices and allow them to communicate. All communication media have specific strengths and weaknesses.

List TWO weaknesses that can occur when UTP cables are used. (2)

3.4 When a computer is connected to a network, it needs an IP address.

3.4.1 Explain what an IP address is. (1)

3.4.2 Explain what will happen if two computers on the network is assigned the same IP address.

(2)

Page 8 of 19

Page 9: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

3.5 A wireless access point has been installed in the computer lab so that the learners can access and share the school's ADSL connection.

3.5.1 List a possible problem when sharing an Internet access amongst many users.

(1)

3.5.2 VoIP will be used for video calls over the internet.

Briefly discuss TWO possible problems that could be experienced when using VoIP. (2)

3.6 It has been noticed that towards the end of the month, the internet connection is very slow.

Suggest a reason for why this could be happening. (1)

3.7 Sharing files online using a popular cloud storage facility has been recommended to learners.

3.7.1 Name at least TWO file sharing websites available for online storage. (2)

3.7.2 Shared folders with information usually have different permissions, depending on the user. List AND explain any TWO type of permissions that can be granted to a user of a shared folder. (4)

3.8 Learners browsing the internet for solutions to problems will interact with Web 3.0 technologies.

Describe the type of interaction for users using Web 3.0 technologies. (2)

SECTION C SUB-TOTAL : 25

Page 9 of 19

Page 10: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

SECTION D : DATA AND INFORMATION MANAGEMENT

QUESTION 4

4.1 The Grade12 IT learners have created a central database so that each department in the school can record their stock-on-hand during the annual stock take process. This will enable the learners to identify spare computers that can be utilised by the computer club as part of their business venture.

The following tables have been designed:

1

Example of data in the tables :

tblDepartment

Page 10 of 19

tblStockItemsKey Field Name

ItemID

ItemNameItemQuantityItemCostDepartmentID

tblDepartmentKey Field Name

DepartmentID

DepNameDepContactNameDepExtensionNum

Page 11: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

DepartmentID DepName DepContactName DepExtensionNum1 Languages Mrs M. Naicker X2012 Mathematics Mrs K. Chetty X2073 Technology Mr T. Govender X0074 Commerce Mr K. Sigamoney X101

The ItemQuantity field refers to the number of items for each item indicated in the ItemName field.

The ItemCost field refers to the cost of a single item.

4.1.1 Suggest a suitable data type for ItemCost. (1)

4.1.2 Using the data in the tables provided above, provide an example that explains the one-to-many relationship that exists between the tblDepartment and the tblStockItems tables. (2)

4.1.3 Write SQL statements for each of the following queries :

a) Display ALL details from the tblStockItems table sorted in alphabetical order by ItemName. (3)

Page 11 of 19

tblStockItemsItemID ItemName ItemQuantity ItemCost Department

IDA1 Intel Celeron

Desktop2 R 2500 1

B2 Intel i3 Laptop 4 R 6000 4C5 Samsung Laser

Printer2 R2000 1

D6 LG 253 Scanner 1 R1050 3B5 Lenovo i5 Laptop 1 R 6300 2C6 Desk jet Printer 2 R699 4

Page 12: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

b) A Samsung Laser printer of the Languages department was left off the stock list and must be included.

Change the existing number of printers for this specific department by updating the quantity. (4)

c) Display the department name and the total stock value for each department in a new field called TotalValue.

(6)

4.1.4 An incomplete SQL statement that displays a list of all the laptop computers and the number of laptop computers is given below.

SELECT ItemName, ItemQuantity FROM tblStockItems WHERE ___(a)___

Write only the missing code at (a) to complete the statement. (2)

4.2 In each of the following statements below, identify whether the statement is an example of data redundancy, data validation, data integrity, data verification.

4.2.1 The repetition of values across multiple rows in a table. (1)

4.2.2 A cell phone number is checked to see if it has the required 10 digits. (1)

4.2.3 An application captures the gender of a user. A person checks whether the entry actually is the correct gender of the user. (1)

4.2.4 Tables created for a database are normalised to eliminate anomalies. (1)

4.2.5 An Identity number is entered. The ID number is checked to ensure that it has only digits. (1)

4.3 While capturing data into a database table, a learner complained about an update anomaly that occurred.

Explain what an update anomaly is. (2)

SECTION D SUBTOTAL : 25

Page 12 of 19

Page 13: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

SECTION E : SOLUTION DEVELOPMENT

QUESTION 5

5.1 All clients using the services of the business are required to fill in a survey form.

The electronic form below was designed to help students get feedback from the businesses that they helped.

a) Critically comment on the design of the form and indicate TWO ways on which the design can be improved. (2)

b) Explain why the component used to capture the date is not suitable.

Suggest an alternative way to fix the problem. (2)

Page 13 of 19

Page 14: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

5.2 Various errors can occur while coding and executing a program

Study the code segment below.

Identify the following types of errors. State the line number and provide the corrected code.

a) Syntax (1)

b) Logical (2)

c) Data type mismatch (1)

5.3 The computer club uses an object class called Clients to store the Clients details.The Client class is declared with the following attributes and methods:

Client-ClientBusName-ClientName-DateVisited-Telephone

+getClientBusName():string+setTelephone(newTele)+createPwd() : string;+tostring() : string

5.3.1 What is the purpose of a constructor in object-orientated programming? (1)

Page 14 of 19

(1)Var(2)iNum : integer(3)begin(4) iNum := intToStr(Inputbox(‘Number Input’,’Enter a number

’,’’);(5) while (iNum <0) and (iNum>10) do(6) begin(7) showmessage((iNum)) ;(8) end; (9) end;

Page 15: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

5.3.2 Explain the difference between an accessor method and a mutator method. (2)

5.3.3 From the above class diagram, identify an example of an auxiliary method.

(1)

5.3.4 What is the purpose of a toString method? (1)

5.4 The algorithm below is used to develop unique employee numbers. Study the algorithm to answer the question that follows:

Begin Loop from 1 to 6 Randomly generate a digit and store in array digitsSum 0 Weight 9 Loop from 1 to 6 Begin Sum sum + arrDigits[loopcounter1] * weight Weight weight – 1; End

Rem abs(13 – (sum mod 9))

If rem < 10 then Test remElse begin Test int(rem / 10) + ( rem mod 10) end

code ’’loop from 1 to 6 code code + arrDigits[loopCounter]

code code +’ ‘+test;Using the following generated 6 numbers, trace through the above algorithm, determine the test digit and display the final code.arrDigits = 4, 3, 7, 4, 7, 1

arrDigits [loopcounter]

weight sum rem rem <10?

test Display code (5)

Page 15 of 19

Page 16: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

5.5 Educators have also asked the learners for help.

A one Dimensional array called arrNames has been declared to store the names of the learners. A two dimensional array called arrMarks has been declared to contain the test marks for the learners. The year mark is calculated by adding the term marks for each learner.

Names Term1 Term2 Term3 Term4 Year MarkJulie 56 51 62 58Andrew 64 72 75 77Mark 87 91 90 83Stevens 49 43 50 49

5.5.1 Explain why the names and marks cannot be stored in the same array. (1)

5.5.2 Write pseudo code to determine which learner will get the maths award this year. (7)

SECTION E SUB-TOTAL: 26

Page 16 of 19

Page 17: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

SECTION F : INTEGRATED SCENARIO

QUESTION 6

Now that the business venture has taken off smoothly, and a networked environment has been set up, there is a need to expand the business by connecting to the Internet. More devices will be able to access the network to make use of on-line services. Hence, the ten networked computers need to function at their peak at all times.

6.1 One of the older computers will not boot up. A grade 12 learner suggested that the BIOS be flashed.

6.1.1 List THREE functions of the BIOS. (3)

6.1.2 What does it mean to ‘flash’ the BIOS? (2)

6.2 Although Caching is an essential feature of all computer systems and is used in several areas, members of the computer club have realised that the meaning of the term is not always properly understood.

6.2.1 Explain what the general purpose of caching is. (2)

6.2.2 Explain how caching increases the speed of the processor. (2)

6.3 Ateesh, a grade 10 learner, has approached the computer club for advice about the iPhone 7, which was launched in September 2016. He is very much interested in purchasing one. He has come across the following specifications :

Page 17 of 19

Page 18: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

PLATFORM OS iOS 10.0.1, upgradable to iOS 10.3.3

Chipset Apple A10 Fusion

CPU Quad-core 2.34 GHz (2x Hurricane + 2x Zephyr)

GPU PowerVR Series7XT Plus (six-core graphics)

MEMORYCard slot No

Internal 32/128/256 GB, GB, 2 GB RAM

COMMS WLAN Wi-Fi 802.11 a/b/g/n/ac, dual-band, hotspot

Bluetooth 4.2, A2DP, LE

GPS Yes, with A-GPS, GLONASS

NFC Yes (Apple Pay only)

Radio No

USB 2.0, reversible connector

BATTERY   Non-removable Li-Ion 1960 mAh battery (7.45 Wh)

Talk time Up to 14 h (3G)

Music play Up to 40 h

6.3.1 Which operating system does the iPhone 7 use? (1)

6.3.2 Write down any TWO functions of an operating system. (2)

6.3.3 All Smartphone’s are convergent devices.

Explain what the term convergent means when referring to a Smartphone. (2)

6.3.4 The CPU is specified as being Quad-core. What does this mean? (1)

6.3.5 What does the acronym NFC stand for? (1)

Page 18 of 19

Page 19: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

6.4 Ateesh became very perturbed when he logged on to the Internet and read one of his news feeds.

Teen Hacker Says He Jailbroke The iPhone 7 in Just 24 Hours!A well-known 19-year-old jailbreaker claimed the first-ever public iPhone 7 jailbreak. The iPhone 7 is, in Apple's own words, "the best, most advanced iPhone ever." It is not, however, impossible to hack. The 19-year-old hacker, who's known online as qwertyoruiop but whose real name is Luca Todesco, took advantage of a series of bugs he found and exploited—and all it took him, he said, was just 24 hours. The jailbreak appears to be the very first one achieved on an iPhone 7. Todesco showed off his successful jailbreak on Twitter on Wednesday, just five days after the release of the iPhone 7, and barely a week after the release of iOS10. Todesco might not share his technique until Apple patches it!https://motherboard.vice.com/en_us/article/9a3ne5/iphone-7-jailbreak

6.4.1 Explain what the term 'Jailbreaking' means in the above context. (2)

6.4.2 Would you classify Luca Todesco as a white hat or black hat hacker? Motivate your answer. (2)

6.4.3 Provide ONE way to help Ateesh identify whether the information on this web page is reliable and authentic. (1)

6.4.4 "Todesco might not share his technique until Apple patches it!"

With reference to the above quote, Explain what a 'patch' is. (2)

6.4.5 After reading this article Ateesh described Lucas Todesco as a 'Script Kiddie'

Would he be correct in his assumption? Motivate your answer. (2)

6.5 Ateesh's dad received an e-mail from his bank explaining that a large sum of money has been debited from his account and he needs to click on the link in the email to update his personal information (including his card number and PIN). The e-mail also states that his account will be suspended if he does not update his personal information.

6.5.1 Advise Ateesh’s dad on how he should respond to this email. (2)

6.5.2 What are the consequences of him complying with the instructions of this email? (2)

Page 19 of 19

Page 20: EXAMINERS: MRS S BRAMDAW / MRS S NAICKER - …stanmoresecondary.co.za/wp-content/uploads/2017/10/...  · Web viewBDenial of service attack. ... Write only the word/ term next to

Information Technology/P2 TRIAL 2017

6.6 Amazing technologies arrive in our lives and on the market almost every day. And it will not stop in the coming years... Virtual Reality, Augmented Reality, Smart algorithms analysing wearable data, exciting medical technologies like the Da-Vinci Surgical System , to name but a few.

Surgical robots have the potential to change how surgeons will operate in the future. The industry is about to boom: by 2020, surgical robotics sales are expected to almost double to $6.4 billion http://medicalfuturist.com/the-most-exciting-medical-technologies-of-2017/

Outline ONE advantage and ONE disadvantage (excluding the cost) of using surgical robots to perform surgery in medical facilities. (2)

6.7 The administration and accounting side of many of businesses run on cloud applications.

6.7.1 Name ONE disadvantage of cloud storage. (1)

6.7.2 'Cloud computing can be beneficial for green solutions in terms of hardware.'

Name TWO ways in which cloud computing benefits green computing in terms of hardware. (2)

SECTION F SUBTOTAL: 34

GRAND TOTAL 150

Page 20 of 19