GR 11 IT Theory November 2017 - MEMO
GR 11 IT Theory November 2017 - MEMO
GR 11 IT Theory November 2017 - MEMO
Terminology 20
Hardware 12
Software 18
Networking 22
eCommunication 19
Social Implications 14
Software Development 45
TOTAL 150
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
Email protocol where mails are not deleted from server – available for many devices
Factor by which a component multiplies the system clock to get its own speed
Software sent to a user that denies access to a service for a sum of many – e.g. encrypts files
or attacks a web site
2 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
Processing in a remote web browser such as a calculator – does not need to connect with he
server
Scenario
The Gift Box Project collects and distributes gifts at Christmas time to underprivileged
children throughout South Africa and Namibia. The organisation makes efficient use of
technology to ensure that the gifts that are pledged are collected and reach the intended
recipients timeously.
The drop off points are manned by volunteers who require a laptop and internet access.
Each drop off point is supplied with a handheld scanner.
2.1 For volunteers who need advice on acquiring a device, the organization
provides the following recommended specifications for an entry level
laptop.
2.1 The CPU has a Quad-Core processor. Explain the term quad core. (1)
The processor has 4 individual cores
2.2 The laptop is advertised as having 4GB of RAM (Primary memory) and a
500 GB HDD (Secondary memory).
2.2.1 Briefly explain the purpose of primary memory. (2)
Primary memory holds data and programs currently being
used
2.2.2 Explain why it is necessary to have so much more secondary (2)
memory compared to primary memory?
Secondary memory holds all data and storage whether they are
being used or not.
.
2.3 In a review on the laptop the reviewer states: (2)
3 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
Give ONE advantage and ONE disadvantage to replacing the HDD with a
SSD.
2.5 The laptop does NOT have a LAN Ethernet point. (2)
Explain the impact of this on the user.
Will not be able to connect to a LAN via a cable. Will need to rely on
WLAN
2.6 Explain what HDMI is used for. (1)
Digital interface connecting Digital and Audio in a single cable – Link to
DVD player
4 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
3.1. List TWO functions the operating system must achieve for process (2)
1 management.
Ensure process gets CPU time
Ensure process gets other resources it needs
Ensure CPU is being used efficiently
3.1.2 Explain what virtual memory is and how it is used. (2)
Area on HDD allocated to OS to use as overflow area for RAM.
Pages are swapped between RAM and VM when extra space in
memory is required.
3.2 The BIOS is still required in a computer system today. Motivate the need
for the BIOS by stating two important tasks that it performs.
3.2.1 Many students confuse BIOS with CMOS. Define BIOS (2)
BIOS
• Performs hardware test at start up
• Loads the OS at startup
• It is essential for starting up the computer
3.2.2 Explain how CMOS and BIOS are used during the Power On (2)
Self Test (POST).
BIOS uses data from CMOS to run the tests to check the installed
devices.
3.3.2 Name two mobile operating systems they would need to (2)
support.
Android
iOS
3.4 The app may be developed using C++ or Java.
5 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
The Gift Box Project have a small head-office in Cape Town with printers, PCs and tablets.
They employ 4 permanent staff, however need flexibility for extra staff who assist over the busy
period from September.
4.1 Give two different examples why connecting the computers in a (2)
network would be of benefit to the project.
4.2.1 Give two advantages of having a file server in the network. (2)
Can centralise data storage
Centralise/ control users and privileges
Backups can be performed centrally
4.2.2 The server is more “powerful” than the other computers on the (2)
network.Give TWO hardware specifications or factors that
determine how ‘powerful’ a computer is.
Size of memory
Speed and performance of CPU
Amount of storage space
6 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
4.3.2 State one advantage of using UTP cables other than cost. (1)
Easy to install, don’t need expertise to install
4.3.3 What device is needed to connect UTP cabled devices to the (1)
server in a star topology?
switch
4.5 Why is it advisable for the company to have a firewall installed? (2)
Briefly describe TWO reasons.
It prevents unauthorised access to the NW and servers from outside
the company.
Communication from SW inside the company to external sources is
monitored / restricted.
7 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
They have and ADSL line and have chosen their ISP.
4.6.1 What device would be required to connect the LAN to the (1)
internet?
Router
4.7 The company’s database was planned and created by a consultant. (4)
The consultant has explained that the data base security is
guaranteed as the server has RAID disks and the database is backed
up daily.
Explain the difference between RAID and backups and how they work
together to ensure that the data is secure.
RAID – configuration of multiple disks that protects data from
hardware failure as data is shred between the disks.
Backup – makes a copy of the data.
If all hard drives crash /fire data can be recovered from backup
5.1 The Gift Box Project website is an important interface for the company.
8 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
5.2 It is the responsibility of the Gift Box Project to protect the data of all (2)
users who register on their website.
Name and describe two measures the Gift Project can take to ensure
that the users’ data is safe.
5.3 As the Gift Project rely on the generosity of the public they feel they may
be susceptible to phishing and spoofing scams.
9 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
5.3.2 What is the best measure the Gift Box Company can take to (2)
protect their users from these scams.
Education – warnings on website and communications sent to
the users.
5.4 The database designer would like to make use of cookies on the
website.
5.4.2 Describe how The Gift project could make use of cookies. (2)
Use it to store info / preferences for the user so that when they
revisit the site can display their preferences.
10 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
6.1 All staff at Gift Box Project need to sign an Acceptable User Policy (4)
(AUP).
Describe TWO clauses that the Gift Box Project may include in their
Acceptable User Policy.
6.2 The Gift Box Project would like to employ an IT person. They are
confused about the skills sets required for the following IT jobs.
● Programmer
● Database analysts
● Web designer
● Project manager
6.2.1 Which type of person would you recommend would be of most (1)
use to The Gift Box Project?
Any are valid
6.2.2 Describe three core skills for the person you have chosen in (3)
6.2.1?
Match to answer in 6.2.1
6.2.3 Explain how this person would be able to add value to the Gift (2)
Box Project?
Reasonable description
Applied to the scenario
6.3 One of the effects of Digitilisation on the workplace is mobile offices.
11 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
Child
- firstName : String
- age : int
- gender : char
- centreNo : int
+ Child (inFirstName: String, inAge :int, inGender :char, inCentreNo :
int)
+ setAge (inAge:int)
+ getCentreNo() : int
+ toString (): String
12 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
7.2 There are four different method types in the class above. Constructors, (8)
mutators, accessors and toString.
For each method type explain the purpose and give an example in the
Child class. Complete the table below. Reproduce this table in your
answer book.
7.3 Write the Java Method header for this method : (2)
+ setAge (inAge:int)
13 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
7.5 The database has a table with the information for each centre.
7.5.1 Using the data above determine the result of the following (4)
query?
SELECT CentreLocation, count(*) AS NumberOfCentres
FROM tblCentre
GROUP BY CentreLocation
HAVING count(*) < 2;
CentreLocation NumberOfCentres
Limpopo 1
Header correct
Correct values returned
7.6 One of the field that users’ enter when they are registering is the email (5)
address.
14 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
<username>@<domain>.co.za
Write down 3 rules to validate the email address. For each rule, write down
the corresponding algorithm in pseudocode. The first row of the table
contains an example.
.
Rule Algorithm - Pseudocode
Example if email = null
Email address cannot be a then errorMessage ← “Email is
null string empty”
endif
One mark for the rule and one mark for the correct algoithm
15 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
7.7.1 Create an algorithm to search for a given integer stored in the (7)
array. You need to identify and display the position of the
matching element.
Display -1 if the element is not found.
Prompt the user for the number to search for.
16 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
7.7.3 Name another search algorithm you could have used. (1)
Search all
7.8 Study the algorithm below that supposedly calculates and displays the
average age.
The algorithm reads the ages from the keyboard as test data.
ageArr is an array with a maximum of 5 values to store the ages.
For testing purposes only 5 values are being used.
ageArr
Use the given algorithm and the following test data to populate (2)
ageArr in your answer book.
Test data : 8,6,9,5,6
17 of 18
AM INFORMATION TECHNOLOGY P1 NOVEMBER 2017
6 9 5 6 0
7.8.2 The array has been incorrectly populated because of an error (2)
occurring between lines 3 and 9.
Explain how the algorithm must be changed in order to correct
the error.
change input age at line 4 to age declaration age =0
OR
Remove line 4
7.8.3 Assuming that the error has been corrected and that the array (2)
has been populated with the following values:
ageArr
8 6 9 5 6
18 of 18