grade 12 september 2015 computer applications technology … · c sky drive d dropbox (1) 2.5 a...
TRANSCRIPT
NATIONAL SENIOR CERTIFICATE
GRADE 12
SEPTEMBER 2015
COMPUTER APPLICATIONS TECHNOLOGY P2
MARKS: 150 TIME: 3 hours
This question paper consists of 14 pages.
*CATDM2*
2 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
INSTRUCTIONS AND INFORMATION 1. This question paper consists of:
SECTION A (25 marks) SECTION B (75 marks) SECTION C (50 marks)
2. Answer ALL the questions. 3. Number the answers correctly according to the numbering system used in this
question paper. 4. Start EACH question on a NEW page. 5. Do NOT write in the right-hand margin. 6. Leave a line between each sub-question. 7. In general, one mark is allocated per fact. A 2-mark question would therefore
require TWO facts, et cetera. 8. Write neatly and legibly.
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 3
Copyright reserved Please turn over
SECTION A QUESTION 1: MATCHING ITEMS Choose a term/concept from COLUMN B that matches the description in COLUMN A. Write only the letter (A–S) next to the question number (1.1–1.10) in the ANSWER BOOK, for example 1.11 T.
COLUMN A COLUMN B 1.1 A process of adding geographical identification
metadata to various media which consists of latitude and longitude coordinates
A Patches
1.2 The use of computer resources in an eco-friendly and efficient way to minimise negative impact on the environment
B Cookie
1.3 Software that enables a user to capture parts of what is seen on the screen
C Geotagging
1.4 A concept where workers bring their own mobile devices, such as smartphones, laptops and PDAs, to the workplace for use and connectivity
D Apps
1.5 Software designed to run on smartphones, tablet computers and other mobile devices
E Open source
1.6 A malicious practice of redirecting users to fake or unexpected websites when they enter a URL in their web browser
F Snipping tool
1.7 Small updates that fix errors in an application G Green Computing
1.8 A text file containing information on the user's preferences and choices regarding a specific website
H F1
1.9 Software freely available for use and where the source code can be altered/changed as needed
I Pharming
1.10 Keyboard key commonly used to obtain help in application programs
J GIS
K BYOD
L Phishing
M Shareware
N F3
O GPS
P Ergonomics
Q Paint
R Plug-in
S txt (10 x 1) [10]
4 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
QUESTION 2: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the questions. Choose the correct answer and write only the letter (A–D) next to the question number (2.1–2.10) in the ANSWER BOOK, for example 2.11 D. 2.1 Which ONE of the following types of files is likely to contain hyperlinks? A .bmp B .exe C .html D .avi (1) 2.2 Which ONE of the following chart types is most appropriate for displaying the
changes in temperature over a month in Johannesburg? A A pie chart B A line chart C A scatter chart D A bubble chart (1) 2.3 In a spreadsheet, the following values have been assigned to cells A1 – A3:
A1 = 3, A2 = 6 and A3 = 9. The following formula is typed into Cell A4: =SUM (A1:A3)/B1. What will appear in Cell A4?
A #NUM! B 0 C #DIV/0! D 18 (1) 2.4 Which ONE of the following is NOT an example of online storage? A Google Drive B OLX C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on
the hard disk of a computer is called … A disc cleanup. B defragmentation. C spooling. D compression. (1) 2.6 Which ONE of the following wireless communication technologies has the
shortest reach? A Wi-Fi B LTE C 3G D Bluetooth (1)
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 5
Copyright reserved Please turn over
2.7 Which ONE of the following refers to software that is designed to fix bugs and provide new features for existing software?
A Updates B Drivers C Virus definitions D Wizards (1) 2.8 Which ONE of the following refers to a type of website that allows users to
work together to create, add, delete or modify the content? A Webinar B Wiki C RSS feed D Podcast (1) 2.9 Which ONE of the following ports is the best choice to use to download videos
from a video camera to a PC? A PS2 B USB C Parallel D Firewire (1) 2.10 Which ONE of the following is NOT directly associated with spreadsheets? A Input Mask B Cell C Worksheet D Absolute cell addressing (1) [10] QUESTION 3: TRUE/FALSE ITEMS Indicate whether the following statements are TRUE or FALSE. Choose the answer and write 'true' or 'false' next to the question number (3.1–3.5) in the ANSWER BOOK. Correct the statement if it is FALSE. Change the underlined word(s) to make the statements TRUE. (You may not simply use the word 'NOT' to change the statement.) 3.1 A PDA is a smaller version of a tablet which also incorporates features found
on smartphones, such as voice calls and SMSs. (1) 3.2 Bandwidth provides always-on, high speed Internet connection and is ideal for
fast downloads of software, photos, videos and music. (1) 3.3 RSS is a web feed that automatically provides users with updated content. (1) 3.4 Grid computing refers to the sharing of resources such as programs and data
storage offered as a service over the Internet. (1) 3.5 A hotspot is a wireless network technology used for connecting computers to a
wireless network or to the Internet. (1) [5] TOTAL SECTION A: 25
6 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
SECTION B QUESTION 4: SYSTEMS TECHNOLOGIES 4.1 The School Management Team wishes to buy computers for the computer lab at
the hostel. 4.1.1 You suggest that they buy LED monitors. Motivate your answer. (2) 4.1.2 Some suggest that they also buy a graphics card.
What is the function of a graphics card? (1) 4.2 The School Management Team has to choose between buying cabled or
wireless keyboards and mice. Name TWO disadvantages of wireless devices. (2) 4.3 The Management Team wants to make use of biometric input to control access
to the computer laboratory. 4.3.1 What is biometric input? (1) 4.3.2 Name TWO methods of biometric input they could consider. (2) 4.3.3 Discuss TWO disadvantages of using biometric input for access control. (2) 4.4 Storage is a key factor when buying a computer. 4.4.1 State TWO ways (besides cloud storage) in which you could save hard
drive space on your computer. (2) 4.4.2 What is cloud storage? (1) 4.4.3 State TWO disadvantages of online storage. (2) 4.5 The Management Team is interested in exploring ways in which physically
challenged learners can have access to computers in the laboratory. 4.5.1 Explain how a speech recognition program can be used to assist
physically challenged (disabled) learners. (1) 4.5.2 Name any ONE hardware device that can be acquired to assist the
visually impaired (blind) learners in the hostel. (1) 4.6 In order for a computer to function it needs an operating system and application
software. 4.6.1 Name TWO functions of an operating system. (2) 4.6.2 Web-based applications are stored on and run from servers.
Name TWO advantages of web-based applications. (2)
4.6.3 Name TWO software related problems that could reduce the speed of a
computer. (2)
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 7
Copyright reserved Please turn over
4.7 Computers sometimes use virtual memory. Briefly explain what virtual memory is and how it influences the performance of the computer. (2)
[25] QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES 5.1 Name TWO advantages of connecting computers within a network. (2) 5.2 A file server is one of the basic components of a network.
Explain the function of a file server in a network. (1)
5.3 A computer shop offered your school the following package to connect to the
Internet using ADSL.
x 4 Mbps/512 kbps uncapped ADSL x 5 hours free Wi-Fi per month at more than 500 hotspots x 5 GB Cloud storage account
5.3.1 Explain what the term uncapped refers to in the specification. (1) 5.3.2 Why is video-conferencing an expensive method of communication if
you do not have an uncapped Internet connection? (1) 5.4 Distinguish between a “shaped” and an “unshaped” Internet connection. (2) 5.5 When computers are connected to the Internet, it increases the chances of
security problems e.g. pop-ups. 5.5.1 What is a pop-up? (1) 5.5.2 Why is it advisable to block pop-ups? (1) 5.6 All major banks offer online banking. 5.6.1 State TWO advantages of Internet banking compared to conventional
banking. (2) 5.6.2 Name ONE way in which banks can protect their clients when they use
online banking. (1) 5.7 Caching is one of the features that help us to use the Web more efficiently. 5.7.1 Briefly explain what caching is. (1) 5.7.2 Give TWO main reasons for using web cache. (2) [15]
8 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
QUESTION 6: INFORMATION MANAGEMENT 6.1 Data collection is an important part of information management. 6.1.1 Name TWO advantages of using online surveys to gather information. (2) 6.1.2 Name the application software that is best suited to process data
obtained from a survey. Motivate your answer. (2) 6.2 Not all information gathered is necessarily reliable.
Give TWO reasons why a wiki cannot be considered as a reliable and authoritative source of information. (2)
6.3 What does the © symbol indicate? (1) 6.4 Name ONE popular style according to which your bibliography can be
formatted. (1) 6.5 One of the learners visited a website to gather information for an assignment.
Give TWO tips on how to check that information sourced from the Internet is in fact correct and reliable. (2)
[10] QUESTION 7: SOCIAL IMPLICATIONS 7.1 Phishing attempts are not limited to e-mail or the Internet. They are also sent
as messages to cellphones. 7.1.1 Explain what a phishing attempt is. (1) 7.1.2 State TWO ways in which you would recognise a phishing attempt. (2) 7.2 In general, the copying of software is illegal.
Name ONE instance, however, in which you are allowed to copy software. (1)
7.3 Define the following Internet attacks: 7.3.1 Sniffer attack (1) 7.3.2 DoS attack (1) 7.4 Explain how the following types of computer crime is committed: 7.4.1 Bandwidth theft (1) 7.4.2 Identity theft (1) 7.5 Although technology can benefit society in many ways, it can also be harmful
to society. Name TWO ways (other than criminal activities) in which technology can have a negative effect on society. (2)
[10]
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 9
Copyright reserved Please turn over
QUESTION 8: SOLUTION DEVELOPMENT 8.1 Rewrite the HTML code segment below to correct it:
<h1>Computer Applications Technology<h> (1)
8.2 Rewrite the error-free HTML code below to solve the problem that will occur
when it is executed in a browser. <body bgcolor=”black”> (1)
8.3 Study the extract from the spreadsheet below and answer the questions that
follow.
8.3.1 Suggest ONE way in which the names of the learners in Grade 12A can
be extracted without copying each name separately. (1) 8.3.2 The teacher needs to have the same information which appears in the
spreadsheet, in a database application. Which feature of an office package can he use to achieve this? (1)
8.3.3 Why is the SUMIF function not suitable for determining the number of
learners in the 12B class? (1) 8.3.4 Which spreadsheet feature could be used to show values in column D,
that are greater than 15, in a particular colour? (1) 8.4 One of the learners cannot open a file that he received as an attachment to an
e-mail. Name TWO ways in which he may be able to open the document. (2)
8.5 Name any ONE advantage of working with ‘Styles’ when creating a document in
Word. (1)
10 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
8.6 Some of the learners are puzzled when they have to wait a few minutes before their documents are printed. The concept of printer spooling is explained to them. Name ONE function that you can perform when opening the printer queue. (1)
8.7 One of the learners discovered that the word processing program has a feature
that automatically allows you to add captions to pictures, graphs or tables. Give TWO reasons, other than saving time, why it is better to use this feature than to do it manually. (2)
8.8 The teachers are inputting their marks (as percentages) into a database. It is
noticed that some teachers are entering marks that are higher than 100. 8.8.1 Explain how a validation rule could be used to ensure that teachers
enter only marks between 0 and 100 (including 0 and 100) in the database. Give the actual validation rule you would use as part of your answer. (2)
8.8.2 Which database feature could be used to ensure that teachers do not
leave a mark ‘blank’? (1) [15] TOTAL SECTION B: 75
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 11
Copyright reserved Please turn over
SECTION C SCENARIO The School Management Team in your school decided to set up a computer lab in one of the hostels. This lab will be used by learners staying in the hostels to do their assignments. This will entail doing research on the Internet, typing and printing their assignments. The aim is that they should be able to communicate with learners from other schools.
The Grade 12 CAT learners will be responsible for assisting learners working in the lab. QUESTION 9: INTEGRATED SCENARIO Study the following specifications for a desktop and a laptop computer and answer the questions that follow.
9.1 The School Management Team has to decide whether to purchase desktop
computers or laptops. 9.1.1 Name TWO advantages of desktop computers. (2) 9.1.2 Name TWO disadvantages of laptop computers. (2) 9.1.3 Name TWO hardware components from the advertisements that play a
significant role in the overall performance of the computer. (2)
COMPUTER A
Intel Pentium Dual Core G2020 CPU
Intel H61 Motherboard Dual CoreG2020 2.9 GHz CPU
2GB DDR3 RAM 1TB SATA3 HDD
Intel 512 MB Graphics 24x DVD +/- Writer
Integrated 8 Channel Sound Wireless keyboard and mouse
COMPUTER B
HP 250 F7X46EA 15.6” Intel Core i3 Notebook
I3-3110m 2.4GHz CPU 15.6 HD LCD Screen
4GB RAM 500 GB HDD
Windows 8.1 Pro Integrated 3.2 MP Webcam 3 years Carry-In warranty
12 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
9.2 The desktop computer includes an optical drive. 9.2.1 Identify an optical drive in the first advertisement. (1) 9.2.2 Name the latest optical drive available today. (1) 9.2.3 Why is it better to buy a DVD-RW than a DVD-R disk? (1) 9.3 The Management Team needs to make a choice regarding software that is
needed for the lab. 9.3.1 Why would you recommend that they buy an office suite rather than
stand-alone applications? (2) 9.3.2 The Management Team does not understand how licencing of software
works. Advise them by briefly explaining to them what type of licence they should buy in order to use the software in the lab. Motivate your answer. (2)
9.4 Proprietary software is very expensive so, the Management Team decided to
investigate the use of free open source software. 9.4.1 Mention TWO advantages (other than costs) of using free open source
software. (2) 9.4.2 Mention ONE disadvantage of open source software. (1) 9.5 The Management Team also bought a new printer for the learners to print their
assignments. When the first learner wanted to print, a message appeared that said the printer driver could not be found.
9.5.1 Explain what a device driver is. (1) 9.5.2 Suggest TWO places where they could find the driver. (2) 9.6 During the process of installing the software an activation code was required. 9.6.1 What is an activation code? (1) 9.6.2 Name TWO reasons why developers of software use activation codes. (2) 9.6.3 When installing the software the learners were confronted with an
option of a typical, custom or full type of installation. Distinguish between a typical and custom installation. (2)
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 13
Copyright reserved Please turn over
9.7 After a go-green campaign launched by the land service club of the school, the learners decided to go-green in the computer lab as well.
9.7.1 State TWO ways in which the learners can reduce printing in order to
save paper. (2) 9.7.2 State TWO ways in which they can save on electricity. (2) 9.8 A parent of one of the learners donated an SSD for each computer in the lab. 9.8.1 Name TWO reasons why adding SSDs to the computers will benefit
the learners. (2) 9.8.2 Name TWO disadvantages of an SSD. (2) 9.9 After losing some of their work as a result of loadshedding, the learners soon
realise how important it is to back-up their folders. 9.9.1 Name TWO important practices that should be part of a back-up
policy. (2) 9.9.2 Which storage device is the most suitable for back-ups? (1) 9.10 One of the learners downloaded a bursary application form in pdf format. 9.10.1 Name TWO reasons why electronic documents are often distributed
in pdf format. (2) 9.10.2 What software package do you need to view a pdf file? (1)
14 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
9.11 The learners soon realise that viruses and malware are a big concern, especially in a network environment. It seems that even the anti-virus program that they installed 3 years ago is not effective anymore.
9.11.1 Explain to them why it is necessary to update your anti-virus program
regularly by explaining how this software works. (2) 9.11.2 One of the teachers feels that computers will not get affected by
viruses if they are not connected to the Internet. Do you agree? Motivate your answer. (2)
9.11.3 Name TWO tips on how to prevent computers from being infected by
viruses (other than the installing and updating of anti-virus software). (2) 9.11.4 After a scan, the antivirus program displays a message saying that a
virus was detected and quarantined. Explain what it means when a virus is quarantined. (1)
9.12 One of the advantages of having a computer lab at the hostel is that learners
can communicate easily with learners in other schools via social networking websites.
9.12.1 Name TWO popular social networking websites. (2) 9.12.2 One of the potential disadvantages of social networking websites, is
‘cloning’. What do you understand by the cloning of a user’s profile? (1)
9.12.3 Name TWO other disadvantages of social websites. (2) TOTAL SECTION C: 50 GRAND TOTAL: 150
NATIONAL SENIOR CERTIFICATE
GRADE 12
SEPTEMBER 2015
COMPUTER APPLICATIONS TECHNOLOGY P2 MEMORANDUM
MARKS: 150
This memorandum consists of 11 pages.
2 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
SECTION A QUESTION 1: MATCHING ITEMS QUESTION 2: MULTIPLE-CHOICE
QUESTIONS 1.1 C 9 (1) 2.1 C 9 (1) 1.2 G 9 (1) 2.2 B 9 (1) 1.3 F 9 (1) 2.3 C 9 (1) 1.4 K 9 (1) 2.4 B 9 (1) 1.5 D 9 (1) 2.5 A 9 (1) 1.6 I 9 (1) 2.6 A 9 (1) 1.7 A 9 (1) 2.7 A 9 (1) 1.8 B 9 (1) 2.8 B 9 (1) 1.9 E 9 (1) 2.9 D 9 (1) 1.10 H 9 (1) 2.10 A 9 (1)
[10] [10] QUESTION 3: MODIFIED TRUE OR FALSE 3.1 False Phablet 9 (1) 3.2 False Broadband 9 (1) 3.3 True 9 (1) 3.4 False Cloud computing 9 (1) 3.5 True 9 (1) [5] TOTAL SECTION A: 25
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 3
Copyright reserved Please turn over
SECTION B QUESTION 4: SYSTEMS TECHNOLOGIES
4.1 4.1.1 x Takes up less desk space. x Uses less electricity. x Good image quality / high resolution. x Available in larger sizes. x Additional ports. x High contrast ratio. (99 Any 2) 2
3 4.1.2 Graphics cards allow computers to produce graphics and
images more quickly. 9 1 4.2 x Require batteries.
x More expensive. x Can easily be removed / stolen. x Signal strength can be affected by electrical sources (interference).
(99 Any 2) 2 4.3 4.3.1 Biometric input is a process that allows a unique biological
feature of a person to be used as a password or in access control. 9 1
5
4.3.2 x Voice recognition x Fingerprint recognition x Iris recognition x Retina scanning x Signature verification (99 Any 2) 2
4.3.3 x Voice recognition devices will not work if you have flu or cold that affects your voice.
x Diabetes may affect your eyes and result in inaccurate iris scanning.
x Cuts or burns to your fingers, hands or face may result in identification process not working.
x Biometric devices are expensive. (99 Any 2) 2 4.4 4.4.1 x Save on external storage.
x Zip / compress large files. x Change pictures to jpeg files. x Delete unwanted files. x Delete duplicate files. x Uninstall unwanted programmes. (99 Any 2) 2
4.4.2 Cloud storage is storage space on another server which you
access through the Internet. 9 1 4.4.3 x The amount of space that is provided for free is usually small.
x To get extra space you have to buy it at a monthly or yearly fee.
x People that you share files with might delete your files by accident.
x You need Internet access. (99 Any 2) 2 5
4 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
4.5 4.5.1 x Learners who cannot use their hands properly can use the speech recognition program to convert speech to text.
x Visually impaired learners can use speech recognition to give commands to the computer, etc.
x Visually impaired learners can use speech recognition to convert speech into text, etc. (9 Any 1) 1
2
4.5.2 x Braille keyboards / braille ‘display’ x Magnification devices x Large-key keyboards x Braille printers (9 Any 1) 1
4.6 4.6.1 x Provides the user with an interface to work with computer / hardware
x Responsible for allocating hardware resources. x Coordinates all activities of the system. x Provides basic security functions. x Provides access to storage. x Controls boot-up process x Manages the programs running in memory, etc. (99 Any 2) 2
6
4.6.2 x Do not need to install software. 9 x Applications do not take up your hard disk space. 9 x Users do not need to update software on individual
computers as it is done from the server. 9 x Independent of any operating system. 9 x Users can access their applications and data from any
computer connected to the Internet. 9 x Most of these applications are free. 9 (99 Any 2) 2
4.6.3 x Too many background programmes. x Computer may be infected by malware/virus. x Too many programs open at the same time. x Software updates being automatically downloaded. x Defective application (99 Any 2) 2
4.7 x Virtual memory is a feature of the OS by which hard disk space can be used as extra memory when RAM is insufficient to load or run programs. 9
x It will slow down the performance of the computer. 9 2 2 [25]
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 5
Copyright reserved Please turn over
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES 5.1 5.1.1 x Files can be accessed from any computer in the network.
x Files can be transferred without the use of portable devices. x Software can be shared by many users. x Hardware such as printers can be shared by many users. x Increased security – user access to network can be controlled
from a single point. x A single Internet connection can be shared by many users. x All programs can be installed and updated from a single
location. x From teaching point of view, you can get software which
allows you to broadcast to all computers in the classroom. x Internet access can also be controlled. x Facilitating communication (99 Any 2) 2 2
5.2 A file server is a powerful computer that can be used to provide resources and services to all the computers linked together in a network. 9 1 1
5.3 5.3.1 Uncapped means that there is no limit on the amount of data that can be downloaded or uploaded. 9 1
2 5.3.2 Video conferencing takes up a lot of cap (data bundles) because
it makes use of video technology. 9 1 5.4 Shaped connection: priority is given to e-mails, web browsing, Internet
banking and "normal" downloads via a web browser’. 9 Unshaped connection: treat all protocols the same. 9 2 2
5.5 5.5.1 Pop-up are windows usually of advertisements that appear automatically without your permission when you are on Internet. 9 1
2 5.5.2 They may relate to spyware infection on the computer. 9 1 5.6 5.6.1 x Do not have to stand in queues/saves time.
x Do not have to carry large amounts of money around. x Have access whenever you are on-line/24/7. x Safer as you do not have to go to the bank. x Can keep track of your accounts. x Cuts down on travelling/transport costs. x Usually cheaper bank charges, etc. (99 Any 2) 2
3
5.6.2 x Use of once-off/per session passwords sent to specified cellphone numbers.
x Automatically logging off after a fixed time period x Passwords/Pin numbers x SMS notification of transactions. x Secure protocols such as SSL. x On-screen keypads for entering pin numbers, etc. (9 Any 1) 1
6 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
5.7 5.7.1 Caching is memory that stores frequently used data, instructions or webpages so that they display more quickly when they are opened again.�9 1
3 5.7.2 x Reduces bandwidth usage 9
x Allow previous visited pages or data used to load quicker.�9 2 [15] QUESTION 6: INFORMATION MANAGEMENT 6.1 6.1.1 x Faster than collecting by manual means.
x Cheaper – you can save on research costs. x More accurate as responses go directly into the system. x Quick to analyse. x Easier for researchers to manipulate data. x More honest responses. x More flexible as the order of the questions can easily be
changed. (99 Any 2) 2
4
6.1.2 x Spreadsheet can be used to do calculations/create graphs. x Database to extract information via queries.
(99 Any 1 combination: application + motivation) 2 6.2 x Anyone can make changes to the content.
x Authority not established. x Content is not always verified. x Content is not always formally edited. (99 Any 2) 2 2
6.3 The item has copyright. 9� 1 1 6.4 x APA 9
x Harvard 1 1 6.5 x Check the information against more than one source and cross-
reference them to see whether the information can be substantiated. x Check the bibliography or other references where you can access
other sources that support the information. x What is possibly missing from the source? x Check that the information is free of errors – sources that have
spelling and grammar mistakes might be inaccurate in other ways as well.
x Check whether the source ties in with what you already know. x How often has the information been used? (99 Any 2) 2 2
[10]
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 7
Copyright reserved Please turn over
QUESTION 7: SOCIAL IMPLICATIONS 7.1 7.1.1 Phishing refers to attempts of people to con users into revealing
personal and confidential details such as PIN numbers and passwords by posing as a legitimate organisation. 9 1
3
7.1.2 x There may be spelling errors in the message. x The e-mail may be sent from a web address other than the
expected one. x The message would ask you to follow a link and then to enter
sensitive information. x Will ask to confirm confidential details such as passwords, etc. x Inspect the properties of any links.
(99 Any 2) 2 7.2 x When making a backup.
x When it is free software. (9 Any 1) 1 1 7.3 7.3.1 Sniffer attack is a process in which a small program or device
reads data packets being sent to someone over a network. 9 1
2 7.3.2 DoS is denial of service which means a process where a network or computer is receiving huge amounts of useless data. 9 1
7.4 7.4.1 The process in which criminals use a person’s Internet connection to connect to the Internet without his or her permission. 9 1
2 7.4.2 Identity theft is the process which a criminal uses the identity of a person dishonestly. 9 1
7.5 x It can reduce the personal and social interaction between people. x People may become less physically active which could lead to obesity
and ill-health. x The overuse of technology may cause physical harm to people, e.g.
RSI. x Technology processes may result in unwanted by-products that pollute
the environment. x E-waste can harm the physical environment x People can use Internet for harmful research. (99 Any 2) 2 2
[10]
8 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
QUESTION 8: SOLUTION DEVELOPMENT 8.1 <h1>Computer Applications Technology</h1>9 1 1 8.2 <body bgcolor=”blue’>
(any colour except ‘black’ can be accepted) 1 1 8.3 8.3.1 Sort or filter according to class. 9 1
4
8.3.2 Import from (Get external data) 9 1 8.3.3 Because SUMIF ADDS together and a function to COUNT is
needed to determine the number of learners in 12B. 9 1 8.3.4 Conditional formatting 9 1 8.4 x Save in an earlier/lower version.
x Open on a PC that has the correct software installed. x Download and install a patch. x Try opening in another program e.g. Open Office. (99 Any 2) 2 2
8.5 x Consistency; everything looks the same. x Easier/faster/convenient to format. x Automatic Table Of Content, etc. (9 Any 1) 1 1
8.6 x Cancel print jobs. x Restart a print job. x Pause a print job. x Change the order in which print jobs are handled. (9 Any 1) 1 1
8.7 x Captions are always consistently positioned. x The format of the captions is always consistent. x Captions will update when any relevant change is made in
document. x Will show in any table of figures/graphs/tables. x Captions are automatically numbered consecutively. (99 Any 2) 2 2
8.8 8.8.1 A validation rule can be added to specific field that restricts values of more than 100. 9 Validation rule: >=0 and <=100 9 2
3 8.8.2 Required property 9 1 [15] TOTAL SECTION B: 75
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 9
Copyright reserved Please turn over
QUESTION 9: INTEGRATED SCENARIO 9.1 9.1.1 x Cheaper than laptop equivalents.
x Less likely to be damaged by being dropped or knocked over. x Less likely to be stolen. x Cheaper to repair and upgrade, etc. (99 Any 2) 2
6
9.1.2 x More expensive than desktop equivalents. x Can easily be damaged by being dropped or knocked over. x Expensive to insure as they are often stolen. x Only run for 2 to 4 hours without needing access to power. x Expensive to repair and upgrade, etc. (99 Any 2) 2
9.1.3 x RAM
x CPU x HDD (99 Any 2) 2
9.2 9.2.1 DVD writer 9 1
3
9.2.2 Blue ray drive 9 1
9.2.3 DVD-R disks are used once. 9 DVD-RW disks can be erased and new data be added. 9 1
9.3 9.3.1 x Can integrate between the different applications. x Interface is standardised across the different applications. x Functions are standardised across the programs. x Cost – cheaper to purchase an office suite. x Easier to manage updates. (99 Any 2) 2
4
9.3.2 Site licence 9– software can be installed in a number of computers, as long as the computers are owned by the same company. 9 2
9.4 9.4.1 x Has no copyright restrictions. x Has no restriction as to the number of computers it can be
used on. x Source code is available for free and may be edited. x May be distributed in a changed form, subject to the original
licence agreement terms. (99Any 2) 2
3
9.4.2 x Open-source software is not supported in all geographical areas.
x Some people may not understand the technical help offered on the Internet.
x No-one to hold responsible. x Various versions of the same software. x Resistance to change/comfortable with what they know. x Not as widely used. x No guarantee of quality. x One can generally only get open source software from
Internet. (9Any 1) 1 9.5 9.5.1 Device driver – software that enables devices to work and
communicate with your computer. 9 1 9.5.2 x On the disk that came with printer.
x Supplied as part of driver database in the operating system. x Download driver from the Internet. (99 Any 2) 2 3
10 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)
Copyright reserved Please turn over
9.6 9.6.1 An activation code – Is a series of numbers characters/letters that gives access to the key/code that unlocks the security or the protection of a program. 9 1
5
9.6.2 x To ensure that the program is loaded only on the number of computers specified on the license.
x Reduce piracy/certify that program is an original copy/increase security.
x To link the copy of the software to you. x To register you as user to enable help and online support.
(99 Any 2) 2 9.6.3 A custom installation allows more experienced users to choose
the components of the program that must be installed. 9 A typical installation contains the options and components of the software that most people want. 9 2
9.7 9.7.1 x Use print preview before printing. x Print on both sides of the paper. x Change document formatting, for example, smaller font
size/reduce margin size. x Print two or more pages to one sheet. x Communicate/Save electronically. (99 Any 2) 2
4 9.7.2 x By switching off computers when not in use. 9
x Use energy saving devices e.g. LED screens. 9 2 9.8 9.8.1 x They are much faster than normal hard drives.
x They cannot be damaged easily/No moving parts/Durable. x Energy-efficient x They run quieter than traditional hard drives. (99 Any 2) 2
4 9.8.2 They are expensive. 9
Smaller capacity than traditional hard drives. 9 2 9.9 9.9.1 x Use software that updates your data automatically.
x Backup data only, not programs (have CD or Internet to retrieve these).
x Use external storage medium (external hard drive). x Keep backup in other location in case of theft, fire. x Do maintenance of data to have no unnecessary duplicates. x Archive large files not used often. x Check that backup works by opening backed up files once in
a while. (99 Any 2) 2 9.9.2 x External hard drive
x DVD x Flash drives x Blue ray disks x CD (9 Any 1) 1 3
(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 11
Copyright reserved Please turn over
9.10 9.10.1 x You do not need the program in which the document was created to open it.
x The program required to read these documents is free/widely available.
x Users cannot easily make changes to the document. (99 Any 2) 2
3 9.10.2 Adobe Reader 9 1 9.11 9.11.1 An anti-virus program is a database with unique virus
definitions. The anti-virus software detects the virus by comparing it to its database of definitions. 9 If the database is not updated, new virus definitions are not available to detect new viruses. 9 2
7
9.11.2 No. 9 Viruses can install themselves on systems via any portable storage media. 9 2
9.11.3 x Disable ‘auto run’ features for flash drives. x Scan all portable storage media before using them. x Avoid downloading/using pirated software. x Scan attachments when/before opening them. x Do not open attachments from unknown sources x Do not interact with/click on pop-ups that appear on the
screen. (99 Any 2) 2
9.11.4 The virus is moved into an area where it cannot cause harm. 9 1
9.12 9.12.1 x Facebook x Twitter x Linkedln x MySpace x Second Life, etc. (99 Any 2) 2
4
9.12.2 Create a duplicate user’s name and profile picture from their existing account. 9 1
9.12.3 x You have to have access to the Internet to be able to communicate.
x Increased risk of identity theft, etc. x Many people have false information on their profiles. x Increased risk of loss in productivity of employees/learners x Quantity of communication at the expense of quality of
communication. 1 TOTAL SECTION C: 50
GRAND TOTAL: 150