Information Technology P2 Nov 2021 Eng
Information Technology P2 Nov 2021 Eng
Information Technology P2 Nov 2021 Eng
Visit us @ www.saexampapers.co.za
NATIONAL
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
NOVEMBER 2021
MARKS: 150
TIME: 3 hours
5. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
1.1 Various options are provided as possible answers to the following questions.
Choose the answer and write only the letter (A–D) next to the question
numbers (1.1.1 to 1.1.5) in the ANSWER BOOK, e.g. 1.1.6 D.
A Integer
B Real
C Boolean
D Char (1)
A 9
B 10
C 11
D Nothing will be displayed (1)
1.2 Choose a term from COLUMN B that matches the description in COLUMN A.
Write only the letter (A–T) next to the question numbers (1.2.1 to 1.2.10) in
the ANSWER BOOK, e.g. 1.2.11 U.
COLUMN A COLUMN B
1.2.1 Used to help detect errors in A social engineering
manually entered data, such as
bank account numbers B CMOS
TOTAL SECTION A: 15
QUESTION 2
2.1 Journalists are issued with laptops when they start working at a magazine
publishing company. The company only uses free open-source software
(FOSS).
2.1.1 Explain the concept open source in the context of FOSS. (2)
2.1.2 Give ONE example of a free operating system the company could
install on a laptop. (1)
2.2.1 Users of laptops equipped with HDDs are advised to defragment the
HDD regularly.
2.2.3 Explain why an SSD accesses the data faster than an HDD. (2)
2.3 The journalists can access their data remotely using virtualisation or Software
as a Service (SaaS).
(a) Except for remote data access, state TWO benefits of using
SaaS. (2)
2.4 The company takes precautionary measures to protect the magazine's data.
2.5 Power outages and power surges are often experienced in rural areas where
journalists work.
2.5.1 What device can be used to ensure that journalists are not affected
by unexpected power outages? (1)
2.5.2 If the USB ports of a laptop are damaged due to a power surge,
how could a user get his/her peripheral devices to connect to the
laptop? (1)
2.6 The journalists use their laptops for word processing, research and to upload
articles to the company's electronic database only.
2.6.3 The processing speed of the computers at head office is very low.
Explain why installing more RAM could improve a computer's
performance. (2)
TOTAL SECTION B: 25
QUESTION 3
The magazine publishing company has branches all around the world that operates on
a large scale.
3.2 It was decided that a network with a star topology will be installed in their
building at head office.
3.3 It was suggested that VoIP technology be utilised by the company when
communicating with clients.
3.3.1 Give TWO reasons why a company would benefit from using
VoIP technology. (2)
3.3.2 Besides the device you are using, state ONE other requirement
needed to make a phone call using VoIP software. (1)
3.4 Journalists need to use the internet to do research for their articles.
(b) Why can a web browser not be used on its own when
searching for information? (1)
3.5 The company needs to renew their contract with their internet service
provider (ISP). For this purpose, they need to evaluate the range and
bandwidth provided by their current ISP, as well as other practices that their
ISP implements that could affect internet access, such as shaping and
throttling.
3.6.2 How would you identify a website that is encrypted with a secure
connection? (1)
3.7 Using the internet presents dangers such as being subjected to hacking and
computer worms.
3.7.3 Briefly explain how a firewall can protect a network from being
hacked. (2)
3.7.4 Give the term used to describe a person that is hired by a company
to hack into the company's network to test their level of security. (1)
TOTAL SECTION C: 30
QUESTION 4
SCENARIO
A media company is responsible for managing the publishing of a wide variety of local
and international magazines. An MS Access database is used to manage the
distribution of magazines published by several publishers.
Table: tblPublishers
Table: tblMagazines
4.1.2 Name and explain ONE anomaly that can occur in an operational
database if the database is not normalised. (2)
4.2 Identify THREE fields in the table tblMagazines that require more suitable
data types.
Suggest a more suitable field name and data type for EACH field that you
identified. (3)
4.4.2 Apart from normalisation, state ONE other way to ensure data
integrity in a database. (1)
4.5 State TWO ways in which the company can benefit from the use of a
database management system. (2)
4.6 Human error results in many issues when entering information into a
database.
How does data warehousing affect the size and speed of a database? (2)
TOTAL SECTION D: 20
QUESTION 5
5.1 Indicate whether the following statements are TRUE or FALSE. Write only
'true' or 'false' next to the question numbers (5.1.1 to 5.1.3) in the ANSWER
BOOK.
5.1.1 An array can only store elements of the same data type. (1)
5.1.2 The index value for the first element in a Delphi array is always one. (1)
5.1.3 The value 23 will be displayed in the rich edit component when the
following code is executed:
var
arrNumbers : array[1..5] of Integer = (4,2,3,1,8);
iValue : Integer;
begin
iValue := arrNumbers[2]+ arrNumbers[3];
redOutput.Lines.Add(intToStr(iValue));
end; (1)
5.2 The following algorithm written in pseudocode has been provided to enter
integer values into variable A and B, swap the contents of the two variables
and display the values:
Input A
Input B
A B
B A
Display A
Display B
5.2.1 What will be displayed if the value of 5 is entered into variable A and
the value of 6 is entered into variable B? (2)
5.2.2 Rewrite the algorithm so that the content of the variables will be
swapped correctly. (3)
5.3 A group of friends gathers once a week to have dinner at a local restaurant.
They throw a six-sided dice three times to decide what type of meal they will
have.
If the number of the first throw is larger than the number of the second
throw, they will eat chicken, or else
If the number of the third throw is less than the number of the first throw,
they will eat fish, or else
They will eat burgers.
The following incomplete Delphi solution is provided for the scenario above:
var
iFirst, iSecond, iThird : Integer;
sMeal : string;
begin
iFirst := Inputbox('Enter value of first throw', '', '');
iSecond := Inputbox('Enter value of second throw', '', '');
iThird := Inputbox('Enter value of third throw', '', '');
showMessage(sMeal);
end.
5.3.1 Explain why a syntax error will be displayed when the provided part
of the program is executed. (1)
5.3.2 Complete the missing part for the program provided, to assign the
correct type of meal to the sMeal variable according to the rules in
the scenario above.
(2)
5.4 The following UML (unified modelling language) class diagram represents a
magazine object.
Magazine
- fMagazineID:Integer
- fTitle:string
- fPublisher:string
- fDatePublished:TDate
- fNumCopies:Integer
calculateCost()
setNumCopies()
5.4.3 Give an example of a mutator method in the given class diagram. (1)
TOTAL SECTION E: 20
QUESTION 6
A magazine company needs to stay up to date with the latest trends in technology in
order to deliver a relevant service to their customers.
6.1 The company has an online version of their magazine hosted on a website.
Users can interact with videos and dynamic content which can be customised
for each user. Local and server-side scripting, CSS and SQL are used on the
website.
6.1.4 As magazine readers are from different countries, they can access
the website conveniently from any location.
6.2 The company regularly upgrades some of its devices and disposes of
devices that are no longer in use.
6.3 Office automation has not been very popular amongst many workers in the
magazine industry.
6.5 The development of mobile technologies and devices promoted the use of
social media and microblogging sites.
6.5.2 The excessive use of social media can impact negatively on the
health of users.
6.6 IoT is one of the technologies that is investigated by the company to be used
more effectively in future
6.6.2 State TWO ways in which IoT devices connect to the internet. (2)
6.7.2 Give ONE example where distributed computing could be used. (1)
6.11 The following shared folder with permissions has been created:
6.11.1 State TWO tasks that can be performed with files in the folder with
Read permissions. (2)
6.11.2 Who would usually be allocated the 'Full control' permission? (1)
TOTAL SECTION F: 40
GRAND TOTAL: 150
Copyright reserved