grade 12 september 2015 computer applications technology … · c sky drive d dropbox (1) 2.5 a...

25
NATIONAL SENIOR CERTIFICATE GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY P2 MARKS: 150 TIME: 3 hours This question paper consists of 14 pages. *CATDM2*

Upload: others

Post on 30-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

NATIONAL SENIOR CERTIFICATE

GRADE 12

SEPTEMBER 2015

COMPUTER APPLICATIONS TECHNOLOGY P2

MARKS: 150 TIME: 3 hours

This question paper consists of 14 pages.

*CATDM2*

Page 2: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

2 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

INSTRUCTIONS AND INFORMATION 1. This question paper consists of:

SECTION A (25 marks) SECTION B (75 marks) SECTION C (50 marks)

2. Answer ALL the questions. 3. Number the answers correctly according to the numbering system used in this

question paper. 4. Start EACH question on a NEW page. 5. Do NOT write in the right-hand margin. 6. Leave a line between each sub-question. 7. In general, one mark is allocated per fact. A 2-mark question would therefore

require TWO facts, et cetera. 8. Write neatly and legibly.

Page 3: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 3

Copyright reserved Please turn over

SECTION A QUESTION 1: MATCHING ITEMS Choose a term/concept from COLUMN B that matches the description in COLUMN A. Write only the letter (A–S) next to the question number (1.1–1.10) in the ANSWER BOOK, for example 1.11 T.

COLUMN A COLUMN B 1.1 A process of adding geographical identification

metadata to various media which consists of latitude and longitude coordinates

A Patches

1.2 The use of computer resources in an eco-friendly and efficient way to minimise negative impact on the environment

B Cookie

1.3 Software that enables a user to capture parts of what is seen on the screen

C Geotagging

1.4 A concept where workers bring their own mobile devices, such as smartphones, laptops and PDAs, to the workplace for use and connectivity

D Apps

1.5 Software designed to run on smartphones, tablet computers and other mobile devices

E Open source

1.6 A malicious practice of redirecting users to fake or unexpected websites when they enter a URL in their web browser

F Snipping tool

1.7 Small updates that fix errors in an application G Green Computing

1.8 A text file containing information on the user's preferences and choices regarding a specific website

H F1

1.9 Software freely available for use and where the source code can be altered/changed as needed

I Pharming

1.10 Keyboard key commonly used to obtain help in application programs

J GIS

K BYOD

L Phishing

M Shareware

N F3

O GPS

P Ergonomics

Q Paint

R Plug-in

S txt (10 x 1) [10]

Page 4: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

4 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

QUESTION 2: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the questions. Choose the correct answer and write only the letter (A–D) next to the question number (2.1–2.10) in the ANSWER BOOK, for example 2.11 D. 2.1 Which ONE of the following types of files is likely to contain hyperlinks? A .bmp B .exe C .html D .avi (1) 2.2 Which ONE of the following chart types is most appropriate for displaying the

changes in temperature over a month in Johannesburg? A A pie chart B A line chart C A scatter chart D A bubble chart (1) 2.3 In a spreadsheet, the following values have been assigned to cells A1 – A3:

A1 = 3, A2 = 6 and A3 = 9. The following formula is typed into Cell A4: =SUM (A1:A3)/B1. What will appear in Cell A4?

A #NUM! B 0 C #DIV/0! D 18 (1) 2.4 Which ONE of the following is NOT an example of online storage? A Google Drive B OLX C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on

the hard disk of a computer is called … A disc cleanup. B defragmentation. C spooling. D compression. (1) 2.6 Which ONE of the following wireless communication technologies has the

shortest reach? A Wi-Fi B LTE C 3G D Bluetooth (1)

Page 5: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 5

Copyright reserved Please turn over

2.7 Which ONE of the following refers to software that is designed to fix bugs and provide new features for existing software?

A Updates B Drivers C Virus definitions D Wizards (1) 2.8 Which ONE of the following refers to a type of website that allows users to

work together to create, add, delete or modify the content? A Webinar B Wiki C RSS feed D Podcast (1) 2.9 Which ONE of the following ports is the best choice to use to download videos

from a video camera to a PC? A PS2 B USB C Parallel D Firewire (1) 2.10 Which ONE of the following is NOT directly associated with spreadsheets? A Input Mask B Cell C Worksheet D Absolute cell addressing (1) [10] QUESTION 3: TRUE/FALSE ITEMS Indicate whether the following statements are TRUE or FALSE. Choose the answer and write 'true' or 'false' next to the question number (3.1–3.5) in the ANSWER BOOK. Correct the statement if it is FALSE. Change the underlined word(s) to make the statements TRUE. (You may not simply use the word 'NOT' to change the statement.) 3.1 A PDA is a smaller version of a tablet which also incorporates features found

on smartphones, such as voice calls and SMSs. (1) 3.2 Bandwidth provides always-on, high speed Internet connection and is ideal for

fast downloads of software, photos, videos and music. (1) 3.3 RSS is a web feed that automatically provides users with updated content. (1) 3.4 Grid computing refers to the sharing of resources such as programs and data

storage offered as a service over the Internet. (1) 3.5 A hotspot is a wireless network technology used for connecting computers to a

wireless network or to the Internet. (1) [5] TOTAL SECTION A: 25

Page 6: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

6 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

SECTION B QUESTION 4: SYSTEMS TECHNOLOGIES 4.1 The School Management Team wishes to buy computers for the computer lab at

the hostel. 4.1.1 You suggest that they buy LED monitors. Motivate your answer. (2) 4.1.2 Some suggest that they also buy a graphics card.

What is the function of a graphics card? (1) 4.2 The School Management Team has to choose between buying cabled or

wireless keyboards and mice. Name TWO disadvantages of wireless devices. (2) 4.3 The Management Team wants to make use of biometric input to control access

to the computer laboratory. 4.3.1 What is biometric input? (1) 4.3.2 Name TWO methods of biometric input they could consider. (2) 4.3.3 Discuss TWO disadvantages of using biometric input for access control. (2) 4.4 Storage is a key factor when buying a computer. 4.4.1 State TWO ways (besides cloud storage) in which you could save hard

drive space on your computer. (2) 4.4.2 What is cloud storage? (1) 4.4.3 State TWO disadvantages of online storage. (2) 4.5 The Management Team is interested in exploring ways in which physically

challenged learners can have access to computers in the laboratory. 4.5.1 Explain how a speech recognition program can be used to assist

physically challenged (disabled) learners. (1) 4.5.2 Name any ONE hardware device that can be acquired to assist the

visually impaired (blind) learners in the hostel. (1) 4.6 In order for a computer to function it needs an operating system and application

software. 4.6.1 Name TWO functions of an operating system. (2) 4.6.2 Web-based applications are stored on and run from servers.

Name TWO advantages of web-based applications. (2)

4.6.3 Name TWO software related problems that could reduce the speed of a

computer. (2)

Page 7: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 7

Copyright reserved Please turn over

4.7 Computers sometimes use virtual memory. Briefly explain what virtual memory is and how it influences the performance of the computer. (2)

[25] QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES 5.1 Name TWO advantages of connecting computers within a network. (2) 5.2 A file server is one of the basic components of a network.

Explain the function of a file server in a network. (1)

5.3 A computer shop offered your school the following package to connect to the

Internet using ADSL.

x 4 Mbps/512 kbps uncapped ADSL x 5 hours free Wi-Fi per month at more than 500 hotspots x 5 GB Cloud storage account

5.3.1 Explain what the term uncapped refers to in the specification. (1) 5.3.2 Why is video-conferencing an expensive method of communication if

you do not have an uncapped Internet connection? (1) 5.4 Distinguish between a “shaped” and an “unshaped” Internet connection. (2) 5.5 When computers are connected to the Internet, it increases the chances of

security problems e.g. pop-ups. 5.5.1 What is a pop-up? (1) 5.5.2 Why is it advisable to block pop-ups? (1) 5.6 All major banks offer online banking. 5.6.1 State TWO advantages of Internet banking compared to conventional

banking. (2) 5.6.2 Name ONE way in which banks can protect their clients when they use

online banking. (1) 5.7 Caching is one of the features that help us to use the Web more efficiently. 5.7.1 Briefly explain what caching is. (1) 5.7.2 Give TWO main reasons for using web cache. (2) [15]

Page 8: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

8 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

QUESTION 6: INFORMATION MANAGEMENT 6.1 Data collection is an important part of information management. 6.1.1 Name TWO advantages of using online surveys to gather information. (2) 6.1.2 Name the application software that is best suited to process data

obtained from a survey. Motivate your answer. (2) 6.2 Not all information gathered is necessarily reliable.

Give TWO reasons why a wiki cannot be considered as a reliable and authoritative source of information. (2)

6.3 What does the © symbol indicate? (1) 6.4 Name ONE popular style according to which your bibliography can be

formatted. (1) 6.5 One of the learners visited a website to gather information for an assignment.

Give TWO tips on how to check that information sourced from the Internet is in fact correct and reliable. (2)

[10] QUESTION 7: SOCIAL IMPLICATIONS 7.1 Phishing attempts are not limited to e-mail or the Internet. They are also sent

as messages to cellphones. 7.1.1 Explain what a phishing attempt is. (1) 7.1.2 State TWO ways in which you would recognise a phishing attempt. (2) 7.2 In general, the copying of software is illegal.

Name ONE instance, however, in which you are allowed to copy software. (1)

7.3 Define the following Internet attacks: 7.3.1 Sniffer attack (1) 7.3.2 DoS attack (1) 7.4 Explain how the following types of computer crime is committed: 7.4.1 Bandwidth theft (1) 7.4.2 Identity theft (1) 7.5 Although technology can benefit society in many ways, it can also be harmful

to society. Name TWO ways (other than criminal activities) in which technology can have a negative effect on society. (2)

[10]

Page 9: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 9

Copyright reserved Please turn over

QUESTION 8: SOLUTION DEVELOPMENT 8.1 Rewrite the HTML code segment below to correct it:

<h1>Computer Applications Technology<h> (1)

8.2 Rewrite the error-free HTML code below to solve the problem that will occur

when it is executed in a browser. <body bgcolor=”black”> (1)

8.3 Study the extract from the spreadsheet below and answer the questions that

follow.

8.3.1 Suggest ONE way in which the names of the learners in Grade 12A can

be extracted without copying each name separately. (1) 8.3.2 The teacher needs to have the same information which appears in the

spreadsheet, in a database application. Which feature of an office package can he use to achieve this? (1)

8.3.3 Why is the SUMIF function not suitable for determining the number of

learners in the 12B class? (1) 8.3.4 Which spreadsheet feature could be used to show values in column D,

that are greater than 15, in a particular colour? (1) 8.4 One of the learners cannot open a file that he received as an attachment to an

e-mail. Name TWO ways in which he may be able to open the document. (2)

8.5 Name any ONE advantage of working with ‘Styles’ when creating a document in

Word. (1)

Page 10: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

10 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

8.6 Some of the learners are puzzled when they have to wait a few minutes before their documents are printed. The concept of printer spooling is explained to them. Name ONE function that you can perform when opening the printer queue. (1)

8.7 One of the learners discovered that the word processing program has a feature

that automatically allows you to add captions to pictures, graphs or tables. Give TWO reasons, other than saving time, why it is better to use this feature than to do it manually. (2)

8.8 The teachers are inputting their marks (as percentages) into a database. It is

noticed that some teachers are entering marks that are higher than 100. 8.8.1 Explain how a validation rule could be used to ensure that teachers

enter only marks between 0 and 100 (including 0 and 100) in the database. Give the actual validation rule you would use as part of your answer. (2)

8.8.2 Which database feature could be used to ensure that teachers do not

leave a mark ‘blank’? (1) [15] TOTAL SECTION B: 75

Page 11: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 11

Copyright reserved Please turn over

SECTION C SCENARIO The School Management Team in your school decided to set up a computer lab in one of the hostels. This lab will be used by learners staying in the hostels to do their assignments. This will entail doing research on the Internet, typing and printing their assignments. The aim is that they should be able to communicate with learners from other schools.

The Grade 12 CAT learners will be responsible for assisting learners working in the lab. QUESTION 9: INTEGRATED SCENARIO Study the following specifications for a desktop and a laptop computer and answer the questions that follow.

9.1 The School Management Team has to decide whether to purchase desktop

computers or laptops. 9.1.1 Name TWO advantages of desktop computers. (2) 9.1.2 Name TWO disadvantages of laptop computers. (2) 9.1.3 Name TWO hardware components from the advertisements that play a

significant role in the overall performance of the computer. (2)

COMPUTER A

Intel Pentium Dual Core G2020 CPU

Intel H61 Motherboard Dual CoreG2020 2.9 GHz CPU

2GB DDR3 RAM 1TB SATA3 HDD

Intel 512 MB Graphics 24x DVD +/- Writer

Integrated 8 Channel Sound Wireless keyboard and mouse

COMPUTER B

HP 250 F7X46EA 15.6” Intel Core i3 Notebook

I3-3110m 2.4GHz CPU 15.6 HD LCD Screen

4GB RAM 500 GB HDD

Windows 8.1 Pro Integrated 3.2 MP Webcam 3 years Carry-In warranty

Page 12: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

12 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

9.2 The desktop computer includes an optical drive. 9.2.1 Identify an optical drive in the first advertisement. (1) 9.2.2 Name the latest optical drive available today. (1) 9.2.3 Why is it better to buy a DVD-RW than a DVD-R disk? (1) 9.3 The Management Team needs to make a choice regarding software that is

needed for the lab. 9.3.1 Why would you recommend that they buy an office suite rather than

stand-alone applications? (2) 9.3.2 The Management Team does not understand how licencing of software

works. Advise them by briefly explaining to them what type of licence they should buy in order to use the software in the lab. Motivate your answer. (2)

9.4 Proprietary software is very expensive so, the Management Team decided to

investigate the use of free open source software. 9.4.1 Mention TWO advantages (other than costs) of using free open source

software. (2) 9.4.2 Mention ONE disadvantage of open source software. (1) 9.5 The Management Team also bought a new printer for the learners to print their

assignments. When the first learner wanted to print, a message appeared that said the printer driver could not be found.

9.5.1 Explain what a device driver is. (1) 9.5.2 Suggest TWO places where they could find the driver. (2) 9.6 During the process of installing the software an activation code was required. 9.6.1 What is an activation code? (1) 9.6.2 Name TWO reasons why developers of software use activation codes. (2) 9.6.3 When installing the software the learners were confronted with an

option of a typical, custom or full type of installation. Distinguish between a typical and custom installation. (2)

Page 13: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 13

Copyright reserved Please turn over

9.7 After a go-green campaign launched by the land service club of the school, the learners decided to go-green in the computer lab as well.

9.7.1 State TWO ways in which the learners can reduce printing in order to

save paper. (2) 9.7.2 State TWO ways in which they can save on electricity. (2) 9.8 A parent of one of the learners donated an SSD for each computer in the lab. 9.8.1 Name TWO reasons why adding SSDs to the computers will benefit

the learners. (2) 9.8.2 Name TWO disadvantages of an SSD. (2) 9.9 After losing some of their work as a result of loadshedding, the learners soon

realise how important it is to back-up their folders. 9.9.1 Name TWO important practices that should be part of a back-up

policy. (2) 9.9.2 Which storage device is the most suitable for back-ups? (1) 9.10 One of the learners downloaded a bursary application form in pdf format. 9.10.1 Name TWO reasons why electronic documents are often distributed

in pdf format. (2) 9.10.2 What software package do you need to view a pdf file? (1)

Page 14: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

14 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

9.11 The learners soon realise that viruses and malware are a big concern, especially in a network environment. It seems that even the anti-virus program that they installed 3 years ago is not effective anymore.

9.11.1 Explain to them why it is necessary to update your anti-virus program

regularly by explaining how this software works. (2) 9.11.2 One of the teachers feels that computers will not get affected by

viruses if they are not connected to the Internet. Do you agree? Motivate your answer. (2)

9.11.3 Name TWO tips on how to prevent computers from being infected by

viruses (other than the installing and updating of anti-virus software). (2) 9.11.4 After a scan, the antivirus program displays a message saying that a

virus was detected and quarantined. Explain what it means when a virus is quarantined. (1)

9.12 One of the advantages of having a computer lab at the hostel is that learners

can communicate easily with learners in other schools via social networking websites.

9.12.1 Name TWO popular social networking websites. (2) 9.12.2 One of the potential disadvantages of social networking websites, is

‘cloning’. What do you understand by the cloning of a user’s profile? (1)

9.12.3 Name TWO other disadvantages of social websites. (2) TOTAL SECTION C: 50 GRAND TOTAL: 150

Page 15: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

NATIONAL SENIOR CERTIFICATE

GRADE 12

SEPTEMBER 2015

COMPUTER APPLICATIONS TECHNOLOGY P2 MEMORANDUM

MARKS: 150

This memorandum consists of 11 pages.

Page 16: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

2 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

SECTION A QUESTION 1: MATCHING ITEMS QUESTION 2: MULTIPLE-CHOICE

QUESTIONS 1.1 C 9 (1) 2.1 C 9 (1) 1.2 G 9 (1) 2.2 B 9 (1) 1.3 F 9 (1) 2.3 C 9 (1) 1.4 K 9 (1) 2.4 B 9 (1) 1.5 D 9 (1) 2.5 A 9 (1) 1.6 I 9 (1) 2.6 A 9 (1) 1.7 A 9 (1) 2.7 A 9 (1) 1.8 B 9 (1) 2.8 B 9 (1) 1.9 E 9 (1) 2.9 D 9 (1) 1.10 H 9 (1) 2.10 A 9 (1)

[10] [10] QUESTION 3: MODIFIED TRUE OR FALSE 3.1 False Phablet 9 (1) 3.2 False Broadband 9 (1) 3.3 True 9 (1) 3.4 False Cloud computing 9 (1) 3.5 True 9 (1) [5] TOTAL SECTION A: 25

Page 17: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 3

Copyright reserved Please turn over

SECTION B QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 4.1.1 x Takes up less desk space. x Uses less electricity. x Good image quality / high resolution. x Available in larger sizes. x Additional ports. x High contrast ratio. (99 Any 2) 2

3 4.1.2 Graphics cards allow computers to produce graphics and

images more quickly. 9 1 4.2 x Require batteries.

x More expensive. x Can easily be removed / stolen. x Signal strength can be affected by electrical sources (interference).

(99 Any 2) 2 4.3 4.3.1 Biometric input is a process that allows a unique biological

feature of a person to be used as a password or in access control. 9 1

5

4.3.2 x Voice recognition x Fingerprint recognition x Iris recognition x Retina scanning x Signature verification (99 Any 2) 2

4.3.3 x Voice recognition devices will not work if you have flu or cold that affects your voice.

x Diabetes may affect your eyes and result in inaccurate iris scanning.

x Cuts or burns to your fingers, hands or face may result in identification process not working.

x Biometric devices are expensive. (99 Any 2) 2 4.4 4.4.1 x Save on external storage.

x Zip / compress large files. x Change pictures to jpeg files. x Delete unwanted files. x Delete duplicate files. x Uninstall unwanted programmes. (99 Any 2) 2

4.4.2 Cloud storage is storage space on another server which you

access through the Internet. 9 1 4.4.3 x The amount of space that is provided for free is usually small.

x To get extra space you have to buy it at a monthly or yearly fee.

x People that you share files with might delete your files by accident.

x You need Internet access. (99 Any 2) 2 5

Page 18: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

4 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

4.5 4.5.1 x Learners who cannot use their hands properly can use the speech recognition program to convert speech to text.

x Visually impaired learners can use speech recognition to give commands to the computer, etc.

x Visually impaired learners can use speech recognition to convert speech into text, etc. (9 Any 1) 1

2

4.5.2 x Braille keyboards / braille ‘display’ x Magnification devices x Large-key keyboards x Braille printers (9 Any 1) 1

4.6 4.6.1 x Provides the user with an interface to work with computer / hardware

x Responsible for allocating hardware resources. x Coordinates all activities of the system. x Provides basic security functions. x Provides access to storage. x Controls boot-up process x Manages the programs running in memory, etc. (99 Any 2) 2

6

4.6.2 x Do not need to install software. 9 x Applications do not take up your hard disk space. 9 x Users do not need to update software on individual

computers as it is done from the server. 9 x Independent of any operating system. 9 x Users can access their applications and data from any

computer connected to the Internet. 9 x Most of these applications are free. 9 (99 Any 2) 2

4.6.3 x Too many background programmes. x Computer may be infected by malware/virus. x Too many programs open at the same time. x Software updates being automatically downloaded. x Defective application (99 Any 2) 2

4.7 x Virtual memory is a feature of the OS by which hard disk space can be used as extra memory when RAM is insufficient to load or run programs. 9

x It will slow down the performance of the computer. 9 2 2 [25]

Page 19: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 5

Copyright reserved Please turn over

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES 5.1 5.1.1 x Files can be accessed from any computer in the network.

x Files can be transferred without the use of portable devices. x Software can be shared by many users. x Hardware such as printers can be shared by many users. x Increased security – user access to network can be controlled

from a single point. x A single Internet connection can be shared by many users. x All programs can be installed and updated from a single

location. x From teaching point of view, you can get software which

allows you to broadcast to all computers in the classroom. x Internet access can also be controlled. x Facilitating communication (99 Any 2) 2 2

5.2 A file server is a powerful computer that can be used to provide resources and services to all the computers linked together in a network. 9 1 1

5.3 5.3.1 Uncapped means that there is no limit on the amount of data that can be downloaded or uploaded. 9 1

2 5.3.2 Video conferencing takes up a lot of cap (data bundles) because

it makes use of video technology. 9 1 5.4 Shaped connection: priority is given to e-mails, web browsing, Internet

banking and "normal" downloads via a web browser’. 9 Unshaped connection: treat all protocols the same. 9 2 2

5.5 5.5.1 Pop-up are windows usually of advertisements that appear automatically without your permission when you are on Internet. 9 1

2 5.5.2 They may relate to spyware infection on the computer. 9 1 5.6 5.6.1 x Do not have to stand in queues/saves time.

x Do not have to carry large amounts of money around. x Have access whenever you are on-line/24/7. x Safer as you do not have to go to the bank. x Can keep track of your accounts. x Cuts down on travelling/transport costs. x Usually cheaper bank charges, etc. (99 Any 2) 2

3

5.6.2 x Use of once-off/per session passwords sent to specified cellphone numbers.

x Automatically logging off after a fixed time period x Passwords/Pin numbers x SMS notification of transactions. x Secure protocols such as SSL. x On-screen keypads for entering pin numbers, etc. (9 Any 1) 1

Page 20: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

6 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

5.7 5.7.1 Caching is memory that stores frequently used data, instructions or webpages so that they display more quickly when they are opened again.�9 1

3 5.7.2 x Reduces bandwidth usage 9

x Allow previous visited pages or data used to load quicker.�9 2 [15] QUESTION 6: INFORMATION MANAGEMENT 6.1 6.1.1 x Faster than collecting by manual means.

x Cheaper – you can save on research costs. x More accurate as responses go directly into the system. x Quick to analyse. x Easier for researchers to manipulate data. x More honest responses. x More flexible as the order of the questions can easily be

changed. (99 Any 2) 2

4

6.1.2 x Spreadsheet can be used to do calculations/create graphs. x Database to extract information via queries.

(99 Any 1 combination: application + motivation) 2 6.2 x Anyone can make changes to the content.

x Authority not established. x Content is not always verified. x Content is not always formally edited. (99 Any 2) 2 2

6.3 The item has copyright. 9� 1 1 6.4 x APA 9

x Harvard 1 1 6.5 x Check the information against more than one source and cross-

reference them to see whether the information can be substantiated. x Check the bibliography or other references where you can access

other sources that support the information. x What is possibly missing from the source? x Check that the information is free of errors – sources that have

spelling and grammar mistakes might be inaccurate in other ways as well.

x Check whether the source ties in with what you already know. x How often has the information been used? (99 Any 2) 2 2

[10]

Page 21: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 7

Copyright reserved Please turn over

QUESTION 7: SOCIAL IMPLICATIONS 7.1 7.1.1 Phishing refers to attempts of people to con users into revealing

personal and confidential details such as PIN numbers and passwords by posing as a legitimate organisation. 9 1

3

7.1.2 x There may be spelling errors in the message. x The e-mail may be sent from a web address other than the

expected one. x The message would ask you to follow a link and then to enter

sensitive information. x Will ask to confirm confidential details such as passwords, etc. x Inspect the properties of any links.

(99 Any 2) 2 7.2 x When making a backup.

x When it is free software. (9 Any 1) 1 1 7.3 7.3.1 Sniffer attack is a process in which a small program or device

reads data packets being sent to someone over a network. 9 1

2 7.3.2 DoS is denial of service which means a process where a network or computer is receiving huge amounts of useless data. 9 1

7.4 7.4.1 The process in which criminals use a person’s Internet connection to connect to the Internet without his or her permission. 9 1

2 7.4.2 Identity theft is the process which a criminal uses the identity of a person dishonestly. 9 1

7.5 x It can reduce the personal and social interaction between people. x People may become less physically active which could lead to obesity

and ill-health. x The overuse of technology may cause physical harm to people, e.g.

RSI. x Technology processes may result in unwanted by-products that pollute

the environment. x E-waste can harm the physical environment x People can use Internet for harmful research. (99 Any 2) 2 2

[10]

Page 22: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

8 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

QUESTION 8: SOLUTION DEVELOPMENT 8.1 <h1>Computer Applications Technology</h1>9 1 1 8.2 <body bgcolor=”blue’>

(any colour except ‘black’ can be accepted) 1 1 8.3 8.3.1 Sort or filter according to class. 9 1

4

8.3.2 Import from (Get external data) 9 1 8.3.3 Because SUMIF ADDS together and a function to COUNT is

needed to determine the number of learners in 12B. 9 1 8.3.4 Conditional formatting 9 1 8.4 x Save in an earlier/lower version.

x Open on a PC that has the correct software installed. x Download and install a patch. x Try opening in another program e.g. Open Office. (99 Any 2) 2 2

8.5 x Consistency; everything looks the same. x Easier/faster/convenient to format. x Automatic Table Of Content, etc. (9 Any 1) 1 1

8.6 x Cancel print jobs. x Restart a print job. x Pause a print job. x Change the order in which print jobs are handled. (9 Any 1) 1 1

8.7 x Captions are always consistently positioned. x The format of the captions is always consistent. x Captions will update when any relevant change is made in

document. x Will show in any table of figures/graphs/tables. x Captions are automatically numbered consecutively. (99 Any 2) 2 2

8.8 8.8.1 A validation rule can be added to specific field that restricts values of more than 100. 9 Validation rule: >=0 and <=100 9 2

3 8.8.2 Required property 9 1 [15] TOTAL SECTION B: 75

Page 23: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 9

Copyright reserved Please turn over

QUESTION 9: INTEGRATED SCENARIO 9.1 9.1.1 x Cheaper than laptop equivalents.

x Less likely to be damaged by being dropped or knocked over. x Less likely to be stolen. x Cheaper to repair and upgrade, etc. (99 Any 2) 2

6

9.1.2 x More expensive than desktop equivalents. x Can easily be damaged by being dropped or knocked over. x Expensive to insure as they are often stolen. x Only run for 2 to 4 hours without needing access to power. x Expensive to repair and upgrade, etc. (99 Any 2) 2

9.1.3 x RAM

x CPU x HDD (99 Any 2) 2

9.2 9.2.1 DVD writer 9 1

3

9.2.2 Blue ray drive 9 1

9.2.3 DVD-R disks are used once. 9 DVD-RW disks can be erased and new data be added. 9 1

9.3 9.3.1 x Can integrate between the different applications. x Interface is standardised across the different applications. x Functions are standardised across the programs. x Cost – cheaper to purchase an office suite. x Easier to manage updates. (99 Any 2) 2

4

9.3.2 Site licence 9– software can be installed in a number of computers, as long as the computers are owned by the same company. 9 2

9.4 9.4.1 x Has no copyright restrictions. x Has no restriction as to the number of computers it can be

used on. x Source code is available for free and may be edited. x May be distributed in a changed form, subject to the original

licence agreement terms. (99Any 2) 2

3

9.4.2 x Open-source software is not supported in all geographical areas.

x Some people may not understand the technical help offered on the Internet.

x No-one to hold responsible. x Various versions of the same software. x Resistance to change/comfortable with what they know. x Not as widely used. x No guarantee of quality. x One can generally only get open source software from

Internet. (9Any 1) 1 9.5 9.5.1 Device driver – software that enables devices to work and

communicate with your computer. 9 1 9.5.2 x On the disk that came with printer.

x Supplied as part of driver database in the operating system. x Download driver from the Internet. (99 Any 2) 2 3

Page 24: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

10 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/SEPTEMBER 2015)

Copyright reserved Please turn over

9.6 9.6.1 An activation code – Is a series of numbers characters/letters that gives access to the key/code that unlocks the security or the protection of a program. 9 1

5

9.6.2 x To ensure that the program is loaded only on the number of computers specified on the license.

x Reduce piracy/certify that program is an original copy/increase security.

x To link the copy of the software to you. x To register you as user to enable help and online support.

(99 Any 2) 2 9.6.3 A custom installation allows more experienced users to choose

the components of the program that must be installed. 9 A typical installation contains the options and components of the software that most people want. 9 2

9.7 9.7.1 x Use print preview before printing. x Print on both sides of the paper. x Change document formatting, for example, smaller font

size/reduce margin size. x Print two or more pages to one sheet. x Communicate/Save electronically. (99 Any 2) 2

4 9.7.2 x By switching off computers when not in use. 9

x Use energy saving devices e.g. LED screens. 9 2 9.8 9.8.1 x They are much faster than normal hard drives.

x They cannot be damaged easily/No moving parts/Durable. x Energy-efficient x They run quieter than traditional hard drives. (99 Any 2) 2

4 9.8.2 They are expensive. 9

Smaller capacity than traditional hard drives. 9 2 9.9 9.9.1 x Use software that updates your data automatically.

x Backup data only, not programs (have CD or Internet to retrieve these).

x Use external storage medium (external hard drive). x Keep backup in other location in case of theft, fire. x Do maintenance of data to have no unnecessary duplicates. x Archive large files not used often. x Check that backup works by opening backed up files once in

a while. (99 Any 2) 2 9.9.2 x External hard drive

x DVD x Flash drives x Blue ray disks x CD (9 Any 1) 1 3

Page 25: GRADE 12 SEPTEMBER 2015 COMPUTER APPLICATIONS TECHNOLOGY … · C Sky Drive D Dropbox (1) 2.5 A process whereby one can speed up disk access by rearranging the files on ... Name TWO

(EC/SEPTEMBER 2015) COMPUTER APPLICATIONS TECHNOLOGY P2 11

Copyright reserved Please turn over

9.10 9.10.1 x You do not need the program in which the document was created to open it.

x The program required to read these documents is free/widely available.

x Users cannot easily make changes to the document. (99 Any 2) 2

3 9.10.2 Adobe Reader 9 1 9.11 9.11.1 An anti-virus program is a database with unique virus

definitions. The anti-virus software detects the virus by comparing it to its database of definitions. 9 If the database is not updated, new virus definitions are not available to detect new viruses. 9 2

7

9.11.2 No. 9 Viruses can install themselves on systems via any portable storage media. 9 2

9.11.3 x Disable ‘auto run’ features for flash drives. x Scan all portable storage media before using them. x Avoid downloading/using pirated software. x Scan attachments when/before opening them. x Do not open attachments from unknown sources x Do not interact with/click on pop-ups that appear on the

screen. (99 Any 2) 2

9.11.4 The virus is moved into an area where it cannot cause harm. 9 1

9.12 9.12.1 x Facebook x Twitter x Linkedln x MySpace x Second Life, etc. (99 Any 2) 2

4

9.12.2 Create a duplicate user’s name and profile picture from their existing account. 9 1

9.12.3 x You have to have access to the Internet to be able to communicate.

x Increased risk of identity theft, etc. x Many people have false information on their profiles. x Increased risk of loss in productivity of employees/learners x Quantity of communication at the expense of quality of

communication. 1 TOTAL SECTION C: 50

GRAND TOTAL: 150