GR 10 Term 3 and 4 Theory

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Western Cape Education Department

Directorate: Curriculum FET

INFORMATION
TECHNOLOGY
REVISION BOOKLET
TERM 3 & 4

Grade 10
This revision program is designed to assist you in revising the critical
content and skills that you have covered during the year. The purpose is to
prepare you to understand the key concepts and to provide you with an
opportunity to establish the required standard and the application of the
knowledge necessary to succeed in the examination.

The revision program covers the following topics:

SECTION A – MULTIPLE-CHOICE AND SHORT QUESTIONS ................................................... 2


SECTION B – SYSTEM TECHNOLOGIES ................................................................................. 6
SECTION C – COMMUNICATION AND NETWORK TECHNOLOGIES ...................................... 11
SECTION D – DATA AND INFORMATION MANAGEMENT .................................................. 15
SECTION E – PROGRAMMING AND SOLUTION DEVELOPMENT ......................................... 18
SECTION F – INTEGRATED SCENARIO................................................................................ 22

Hi, my name is IT_Bot10. I will be guiding you


through this revision booklet.
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION A – MULTIPLE-CHOICE AND SHORT QUESTIONS


Question 1

Multiple Choice Test Taking Tips


Tips on answering multiple choice questions:
• Read the question before you look at the answer.
• Come up with the answer in your head before looking at the possible answers, this
way the choices given on the test won't throw you off or trick you.
• Eliminate answers you know aren't right.
• Read all the choices before choosing your answer.
• If there is no guessing penalty, always take an educated guess and select an
answer.
• Don't keep on changing your answer, usually your first choice is the right one,
unless you misread the question.
• In "All of the above" and "None of the above" choices, if you are certain one of the
• statements is true don't choose "None of the above" or one of the statements are
false don't choose "All of the above".
• In a question with an "All of the above" choice, if you see that at least two correct
statements, then "All of the above" is probably the answer.
• A positive choice is more likely to be true than a negative one.
• Usually the correct answer is the choice with the most information.

1.1 Multiple-choice questions:


Various possible options are provided as answers to the following questions. Choose the
most correct answer and write only the letter (A – D) CLEARLY next to the question
number (1.1.1 – 1.1.5) on your ANSWER PAPER.
Example : 1.1.11 D
MAKE SURE THAT YOUR LETTERS ARE NOT WRITTEN AMBIGUOUSLY

1.1.1 Output Devices allow us to: (1)


A Get data into a computer

B Keep information to be accessed and used when needed.

C Keep instruction that the computer is currently working with.


D None of the above✓

1.1.2 Mpeg, asf, wmv, avi, mov, flv are examples of… (1)
A Audio Files
B Graphic Files
C Office Files
D Video Files✓

2
Information Technology revision booklet Grade 10 Term 3 and 4

1.1.3 The number of bytes in one binary kilobyte. (1)


A 1024✓
B 1001
C 1000
D 1026

1.1.4 Which of the following types of computer is generally the least ‘powerful’? (1)
A Smartphone✓
B Server
C Desktop
D Laptop

1.1.5 Which of the following does NOT represent the number 18? (1)
A 1216
B 100102
C A116✓
D 228

1.1.6 Which option is true about an operating system? (1)


A An operating system is a piece of hardware that runs the computer and all
its other components.
B An operating system is software that manages hardware, software
and other applications on a computing device. ✓
C An operating system is used to operate all the applications
D An operating system is software that can run your computer automatically
while you are not there.

1.1.7 Which of the following is not an Input device? (1)


A Game controller
B Keyboard
C Speaker ✓
D Microphone

1.1.8 What does POS stand for? (1)


A Point Of Sales ✓
B Point of System
C Play Online Settings
D Power Online Software

3
Information Technology revision booklet Grade 10 Term 3 and 4

1.1.9 Google Chrome is an example of a… (1)


A Word Processor
B Database
C Spreadsheet
D Web Browser ✓

1.1.10 Which is the largest decimal value that can be expressed by 5 bits? (1)
A 64
B 25
C 10
D 63✓

1.2 Short questions:


Give ONE word/term for each of the following descriptions. Write only the
word/term next to the question number (1.2.1 – 1.2.10) in the ANSWER BOOK.

Short Answer Test Taking Tips

• Use flashcards, writing the key terms, dates and concepts on the front
and the definition, event, and explanations on the back.
• Read the question carefully and make sure that you answer everything
that it asks for.

1.2.1 The programming code used to develop a specific application. (1)


Source Code✓
1.2.2 Memory slots into this socket.
(1)
DIMM ✓
1.2.3 The sequence of folders that lead to the location of a specific file. (1)
Path✓
1.2.4 A network in which network resources are shared among the workstations (1)
peer to peer ✓
1.2.5 The process whereby a folder or file is manipulated so that the size is reduced. (1)
Compression✓
1.2.6 A file format created by Adobe Systems that represents documents in a manner
independent of application software, hardware and operating systems. (1)
pdf also accept (Portable Digital Format)✓
1.2.7 An electronic signal that interferes with normal network transmission. (1)
Electromagnetic Interference (EMI) ✓

4
Information Technology revision booklet Grade 10 Term 3 and 4

1.2.8 Step by step list that helps to solve a problem. (1)


Algorithm ✓
1.2.9 What is the effect called when TWO cables magnetic fields influences and
disturbs each other ? (1)
CrossTalk ✓
1.2.10 An error that occurs when the program is running. (1)
Runtime ✓
[20]

5
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION B – SYSTEM TECHNOLOGIES


Question 2 – Hardware and Software

Short Answer Test Taking Tips

• Try to anticipate questions that will be asked on the test and prepare for them.
Usually what your instructor emphasizes in class will be on the test.
• Try not to leave an answer blank. Show your work/write down your thoughts, even
if you don't get the exact answer, partial credit is usually awarded.
• If you don't know the answer, come back to it after you finish the rest of the test
and make an educated guess. Other parts of the test may give you clues to what
the answer may be.
• If you can think up of more than one answer for a question, ask the instructor
what to do.
• Read the question carefully and make sure that you answer everything that it asks
for.
• Some short answer questions have multiple parts.

2 Computers are assembled from a variety of parts to make functional working unit.
2.1 What is the name given to such a design? (1)
Modular design ✓

2.2 Give TWO reasons why the design you have mentioned in 2.1 is important. (2)
Allows for upgrade to take place
Allows for broken parts to be replaced easily

2.3 Next is an extract from a computer advert: Intel Core i5 – 9400 @ 2.9GHz
2.3.1 What component is being referred to in this extract? (1)

6
Information Technology revision booklet Grade 10 Term 3 and 4

CPU

• The Central Processing Unit (CPU) is responsible for processing general


instructions. Every application makes use of the CPU to collect, decode and
execute instructions as required by the application.

2.3.2 Which manufacturing company produces this type of component? (1)


Intel ✓
2.3.3 Name another company beside the one you have mentioned in 2.3.2 which makes this
type of component (1)
Any ONE: 
AMD, Qualcomm, Motorola, Samsung, IBM
2.4 Every component is connected to the main circuit board (Motherboard) of the computer
2.4.1 Give TWO functions of the motherboard on the computer (2)
Any TWO
• Allows component to communicate
• Provide connecting point/slots for components
• Provide power to various components of the computer

A computer’s motherboard is a large printed circuit board that physically connects all the
different components. On the motherboard, there are specific positions where the CPU,
GPU and RAM can be inserted. There are also connectors that allow you to connect a
power supply to a computer. Finally, the motherboard has several ports that allow you to
plug in devices, such as keyboards, speakers and monitors easily.

7
Information Technology revision booklet Grade 10 Term 3 and 4

2.5 Explain why the computer will not work if there is no RAM install. (1)
Any ONE
• Before any program can run or any data can be processed, it has to be loaded into
RAM first.
• RAM is working space for a computer
• It gives applications a place to store and access data on short-term basis
• every instruction/data the CPU is currently working on is loaded into RAM before
being processed and save back to RAM after processing

Random-access memory (or RAM), is physical hardware that temporarily saves data. It
serves as the computer’s ‘working’ memory. RAM provides space for your computer to
read and write data to be accessed by the CPU.
RAM is volatile, meaning that all data is lost once the electricity is disconnected or the
power is lost.

2.6 Compare Memory and Storage by giving TWO characteristics of each (4)
 Any TWO sets
Memory Storage
is fast is slow
temporary/volatile permanent/non-volatile
More expensive per GB Less expensive per GB
Smaller maximum capacity Larger maximum capacity

When comparing memory and storage, we first need to identify the role of the
components. The computer’s main memory is the RAM. You can think of RAM as a
workspace or workbench the computer uses to get work done. When you double-click on
an app, or open a document, or do almost anything on your computer, RAM gets used to
store the code of the app and the data while the processor (CPU) is working on it. The
storage unit i.e. HDD, SSD or Flash drive, by contrast, is the cupboard or storage shelf
you might use to permanently store your tools, apps, data and completed work. So, when
the task is complete and you click save in the app, the resulting output is stored
permanently on the storage unit.

8
Information Technology revision booklet Grade 10 Term 3 and 4

2.7 Describe THREE functions of an operating system. (3)


 Any THREE
• Provide interface the interface allows us to interact with the computer and with
programs on the computer.
• Process and task management manage CPU and how it runs programs
• Disk Management both how the data is organized on the storage device and how or
when program access the storage device.
• Memory management allocates memory to each task/program
• Input/output management control input and output devices

THE STAND-ALONE OPERATING SYSTEM


These operating systems function entirely independently from a network on a computer or
mobile device. This ensures that the tasks of an operating system can be performed on
the device.
THE NETWORK OPERATING SYSTEM
Network or server operating systems are operating systems designed to help computers
work together on a network, rather than used in a stand-alone mode. For example, a large
company may have a server running the Windows Server operating system in the
organisation. A computer can connect to the same network to gain access to its
information, resources, etc. Examples include: Windows Server, Red Hat Enterprise,
Ubuntu Server, and UNIX.
THE EMBEDDED OPERATING SYSTEM
The embedded operating system is designed for a specific purpose e.g. Smart TVs that
connect to the internet, a video camera (Wi-Fi) that can stream live footage and the GPS
system that is installed in most mobile devices.

2.8 System software also includes Utility programs.


Give ONE example of a type of Utility program. (1)
Anti-virus software to prevent your computer from being affected by computer
virus or any valid answer

A utility program is system software that helps users to analyse, configure, monitor, or
help maintain their computers. Most operating systems include a set of basic utilities for
users, and additional utilities that could be downloaded if needed. Examples of utilities
include:

• back-up software that helps a user create back-up copies of the files on their
computer
• a device manager that helps a user install new hardware such as a mouse, USB,
etc.

9
Information Technology revision booklet Grade 10 Term 3 and 4

2.9 After plugging your scanner to the computer, you get a notification that a ‘driver’ needs
to be installed before using this device. Define a driver. (1)
A driver is software that allows an operating system to communicate with and control a
hardware device.

A device driver is software that contains a set of instructions that command a computer’s
operating system on how to communicate with the hardware so that it can function
properly. Device drivers allow communication between the operating system and all the
devices, such as the mouse, keyboard, printer, etc.
Also see plug and play.

2.10 After sometimes, software installed on your computer pop messages stating that updates
are available. Why is it important to run these updates and give examples (2)
 Any TWO
• Programs need to be updated to add new features
• to fix ‘bugs’
• to deal with new threats in the case of anti-virus

[20]

10
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION C – COMMUNICATION AND NETWORK TECHNOLOGIES


Question 3
Your friend currently employs four people, each of whom has a laptop, an iPad, or
a desktop computer. She is now thinking about setting up a network in the shop.
You must investigate ways to network these devices and include an Internet
connection.
3.1 She has asked you if it will really be advantageous for her to install a network. (3)
Give THREE reasons why she should go ahead.
 Any THREE
• Fast, efficient communication
• Sharing of hardware resources
• Centralisation of data
• Transfer of files
• Leisure
• Increased control and security
• Flexible access

Advantages to connecting to a network:


• allows people to share resources and expensive devices.
• connects individuals to friends, family and colleagues who are located in a
different region, province or even country.
• Increases opportunities for self-improvement by providing access to
knowledge and information.

Disadvantages to connecting to a network:


• can expose you to online crimes such as, identity and credit card theft; and
scams such as, email phishing.
• can expose you to cyberbullying and abuse (especially on social media
platforms).
• can be addictive and waste large amounts of time.

11
Information Technology revision booklet Grade 10 Term 3 and 4

3.2.1 In this scenario which type of networking would you choose (peer-to-peer or (1)
client-to-server)?
peer-to-peer 

CLIENT-SERVER AND PEER-TO-PEER NETWORKS
A network architecture refers to the differences in the way that the network is built. The
two types of network architectures are peer-to-peer and client-server networks.
CLIENT-SERVER NETWORKS
A server is used to manage a client-server network, where computers (nodes) connect to
the server. It ensures that authorised users have access to certain resources when
logging on to a network. In a school, one would have the following:
● Many nodes, your PCs, connected via cables to the server.

PEER-TO-PEER NETWORKS
In a peer-to-peer network, each computer (node) on the network connects directly to the
network AND to the other nodes. However, each computer has its own security. This
means that the computer’s settings determine who is authorised to access the resources.
Peers on this network are visible to each other and can share files and resources with
each other.
In a peer-to-peer network, data flows between peers and most home networks are
organised as peer-to-peer networks. This means that if your computer connects to your
home network, it will have the same role and permissions as your mother’s notebook and
your father’s smartphone. None of these devices organise the network nor do they need to
be connected for the network to work correctly. Instead, each computer can connect and
disconnect from the network automatically.

3.2.2 Support your answer in 3.2.1 by giving TWO reasons for your choice. (2)
 Any TWO
• Network resources are shared amongst the computers
• Home or very small network
• Printers, Internet access and files can be shared
3.3 You decided to connect all the computers/devices to the Internet using an ADSL
line.
3.3.1 What does the acronym ADSL stand for? (1)
Asymmetric digital subscriber line 

12
Information Technology revision booklet Grade 10 Term 3 and 4

3.3.2 What device would you need to connect the ADSL line? (1)
Modem / Router 

3.3.3 You will also need an ISP.


a) What does ISP stand for? (1)
Internet Service Provider 
b) Describe what the purpose of an ISP is. (1)
Provides access to the internet 
3.4 When computers are connected to a network or the internet, the necessary
protocols should be available.
3.4.1 Using your own words, what is meant by the term protocol? (1)
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. 

3.4.2 What are the following protocols used for?


a. HTTPS (1)
site is secure 
b. FTP (1)
File Transfer Protocol  / to download large files
c. SMTP (1)
Simple Mail Transfer Protocol  / to send emails.
3.5 UTP or fibre optic cabling can be used to setup a network.
3.5.1 Expand the acronym UTP. (1)

13
Information Technology revision booklet Grade 10 Term 3 and 4

Unshielded Twisted Pair 


OVERVIEW OF DIFFERENT COMMUNICATION MEDIA

WIRED NETWORK

A wired network is a network that uses a physical media to transfer data between two or
more nodes. The transmission media for wired networks are:

• Unshielded Twisted Pair (UTP) and


• Fibre optic cables.

WIRELESS NETWORKS
A wireless network is a network that uses non-physical components to transfer data
between two or more nodes. Local area networks are often wireless LANs (WLANs).
Transmission media include:

• radio waves (wireless network)


• infrared signals (wireless network).

3.5.2 Attenuation is considered a weakness in communication media.


a) What do you understand by attenuation? (1)
Attenuation is the loss of signal strength in networking cables or connections. 
b) What are the practical implications of this weakness when using UTP to connect (1)
computers?
UTP is susceptible to attenuation therefore the maximum cable length that can be used
without having to boost the signal is 100m. 
3.5.3 The company choses to make use of UTP, instead of fibre optic, to connect the (2)
computers and laptops to the network.
Give THREE possible reasons (not attenuation) why this decision was made.
Cheaper than fibre
Easier to work with/ can bend
3.6 With what type of signal does data travel through fibre optic? (1)
Light
[20]

14
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION D – DATA AND INFORMATION MANAGEMENT


Question 4
4.1 How many bits are there in a single byte? (1)
8

BITS AND BYTES
You can combine several bits (0s and 1s). If you combine 8 bits
together, it is called a ‘‘byte’’. A byte can represent any number between
0 (represented in bits as 00000000) and 255 (represented in bits as
11111111).

4.2 List any THREE variable data types. (3)


 Any THREE
Boolean, String, Char, Integer, Real

NAME DESCRIPTION REPRESENTATION EXAMPLE


Boolean values can be
TRUE or FALSE
A data type that can only be represented by a single bit of
Boolean 1 or 0
TRUE or FALSE. data that is either ON or
YES or NO
OFF.
Any integer up to 255 can be
1 or
An integer is any positive or represented by one byte of
Integer 82355 or
negative whole number. data. Larger integers require
–59
more bytes of data.
A float refers to any number To represent floats require 82.355 or 0.55 or
Float
with a decimal value. multiple bytes of data. –10.02
A char is a data type that can
store a single character. This Each char requires one byte
Char ‘A’ or 5 or ‘!’ or ‘@’
includes letters, numbers, and (8 bits) of data.
symbols.
A string refers to several
characters, letters, or
numbers. Strings are always
surrounded by quotation marks ‘Tel: 082 111 2222’
Each character in a string
to show where they begin and ‘Hello, World!’
String requires one byte of data.
end. ‘Maria Maseko’
NB: if numbers are
represented as a string, you
cannot use them in your
calculations.

4.3 Differentiate between data and information. (2)


Data is unprocessed facts (usually unorganized). 
Information is processed data. (useful) 

In order to communicate data and instructions, data such as numbers, letters, characters,
special symbols, sounds/phonics, and images are converted into computer-readable form
(binary). Once the processing of this data is complete, it is then converted into a format
that people can understand. The processed data becomes meaningful information. The
information becomes knowledge when it is understood and used by people for different
purposes.

15
Information Technology revision booklet Grade 10 Term 3 and 4

4.4 Write the following number in FC16 in decimal notation. Show all your work. (3)
FC16 = 15*161 + 12*160 
= 240 + 12
= 25210 
4.5 Write the following decimal number in binary notation. 2510 (3)
25/2 = 12 rem 1
12/2 = 6 rem 0
6/2 = 3 rem 0
3/2 = 1 rem 1 
½ = 0 rem 1

11012 

In unit 2.2 of the DBE textbook, page 24, they have a step-by-step
description of how to convert between different number types.

4.6 .jpg, .png and .gif are extensions of which category of files? (1)
Images/Pictures 

Unit 2.5, page 47, discusses the
common file types and extensions

4.7 C:\Documents\IT_2021\PAT_Phase_1.docx
4.7.1 In reference to the above file path what is the:
a) The name of the file (1)
PAT_Phase_1.docx 
b) Which application would you use to open the file (1)
Microsoft Word 
4.8 Give TWO guidelines to developing a good file naming convention. (2)

16
Information Technology revision booklet Grade 10 Term 3 and 4

 Any TWO
• Keep file names short but meaningful.
• Include useful information such as the name of the project or
document you are working on.
• Include the version number (e.g., V1 or -v1) and the date if there
is more than one version.
• Dates should always be in the format yyyy-mm-dd so that the _
les will be organised in date order.

GUIDELINES TO DEVELOP GOOD FILE NAMING CONVENTIONS

• Keep file names short but meaningful.


• Include useful information such as the name of the project or
document you are working on.
• Include the version number (e.g. V1 or -v1) and the date if there is
more than one version.
• Dates should always be in the format yyyy-mm-dd so that the files
will beorganised in date order.

THINGS TO AVOID WITH FILE NAMING CONVENTIONS

• Symbol characters such as ‘\ / < > | ‘ ? [ ] ; = + & $ a b’


• Abbreviations that are not easy to understand
• Non- specific words such as ‘draft, current or document.’

4.9 You have created a folder with all your previous work to share with a classmate.
However, it is too large to send as is.
4.9.1 Which file type you will make use of to send the contents via email? (1)
Compressed file type. (zip/rar) 

COMPRESSION AND DECOMPRESSION


• File compression is a process that makes use of advanced
algorithms and mathematical formulae to decrease the amount of
disc space used by big files.
• Decompressing a file is a method used to extract the compressed
file back to its original form and size using the same algorithms or
mathematical formulae.

4.9.2 Explain TWO reasons why the file type you mentioned in 4.9.1 is the most efficient (2)
choice.
The contents will be smaller. 
It will be easier to send one compressed file than several small files.  After
decompressing the files, you will still have access to everything you have
created.
[20]

17
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION E – PROGRAMMING AND SOLUTION DEVELOPMENT


Question 5 – Algorithms and Planning
5.1 Determine the answer of each of the following:

5.1.1 15 DIV 4 (1)

3✓

5.1.2 21 MOD 5 (1)

1✓

5.1.3 FloatToStrF( 18.7844 , ffCurrency, 10,2) (2)

R ✓ 18.78 ✓

5.1.4 (2 + 30) * 2 + 20 * 20 (2)

464 ✓✓

5.2 Have a look at the following FOR-loop:


Line Code
1 Counter := 1;
2 Total := 20;
3 Sum := 3;
4 For i := A to B Do
5 Begin
6 Sum := Sum + A;
7 Total := Total * B;
8 Counter := Counter + 1;
9 End;
Given values for A := 3 and B := 5

5.2.1 How many times will the loop be executed? (1)

3✓

18
Information Technology revision booklet Grade 10 Term 3 and 4

5.2.2 What will the value of SUM be, once the loop has stopped? (2)

15✓✓

5.2.3 If the statement in line number 3 is left out of the code, how will it influence variable
“SUM”? (2)

No value assigned to SUM ✓


“0” will be used in calculation if SUM is a global/private variable ✓
OR unknown number can be used as RAM was not cleared.

5.2.4 What is the type of statements in line number 1, 2 and 3 called? (1)

Assignment / initialization ✓

So how can you make sure your algorithm does what it is supposed to do? Let’s
look at some of the steps you can follow to make sure that you are able to create
high quality algorithms:

• Understanding the problem: The first step in creating an algorithm is


to understand what problem the algorithm should solve. If you don’t
know this, you can easily create an awesome algorithm, but it will solve
the wrong problem.
• Defining the desired solution or output: Defining what your solution or
output is, will depend on the problem you are trying to solve. In other
words, defining your desired output is closely linked to understanding
what the problem is. You may need an exact answer, or you may simply
need a close enough estimate. Defining the desired output could
therefore have a significant effect on the time it takes to solve the
problem.
• Defining the inputs: The third step is to define what information you will
need for the algorithm to work. This information can be entered by a
user or obtained from a different source, such as an existing file.
• Designing a set of steps to complete the task: The fourth step is to
design a set of steps that will use your inputs to complete the task.
These steps need to be specific and detailed enough that they will
always give you the correct answer.
• Testing the algorithm: Every algorithm should be tested, and not just
using the situations or data you are most likely to come across. One
technique for testing an algorithm is to create a trace table.
• Updating the algorithm: If your tests reveal any problems with the
algorithm, you should change the steps to fix the problem. Once
changed, the new algorithm should be tested to ensure it works as
expected.

19
Information Technology revision booklet Grade 10 Term 3 and 4

5.3 The following Delphi application was created to compare a number added by a user and
a random number. Both the user and random numbers should be between 1 and 10.
Study the source code:
Line Code
1 procedure TForm1.btnCompareClick(Sender:Tobject)
2 var
3 iUserValue, iRandomValue: int
4 Begin
5 //Input
6 iUserValue := edtNumber;
7 randomize;
8 iRandomValue =random(10);
9 //Output
10 if iUserValue = iRandomValue then
11 Begin
12 lblAnswer.Caption:= ‘Correct Guess’;
13 end
14 else
15 Begin
16 lblAnswer.Caption:= ‘Incorrect, Random value
17 was:’ +#9 + iRandomValue;
18 end;

5.3.1 Fix the mistake that appears in line 3. (1)

Int suppose to be Integer ✓

5.3.2 Rewrite line 6 to ensure that iUserValue will receive a correct value and store it in
memory. (2)

iUserValue := strToInt(edtNumber.Text);
.Text ✓ added
strToInt( … ) ✓ added

5.3.3 What possible random numbers will be generated in line 8? (2)

0✓ to 9✓

20
Information Technology revision booklet Grade 10 Term 3 and 4

5.3.4 Rewrite the RANDOM function in line 8 to ensure that random values between 1 and 10
will be generated. (2)

=randomRange(1,11) OR
=random(10+1+1)+1 OR
=random(10)+1
Bottom Value = 1 ✓ AND Top value = 10 ✓

The RANDOM function has two different syntaxes:

• the RANDOM function without argument will generate a random decimal


number from 0 to less than 1
• In the RANDOM(Number) syntax the argument is type integer. It generates
a random number from 0 to Number-1, that is, if the argument is 6, then it
will generate a number from 0 to 5
To generate a number within a particular range a to b, we use the formula :
Random(b-a+1)+a. For example, to generate a random number in the range
10 to 100, the statement Random(100–10+1)+10

5.3.5 What is the purpose of the #9 in line 17? (1)

Add a TAB✓ space

[20]

21
Information Technology revision booklet Grade 10 Term 3 and 4

SECTION F – INTEGRATED SCENARIO


Question 6
Your school is interested in launching a computer game design and development society.
They have asked you to give them advice on setting up the computers for the society. The
society will use the Unity game engine as a development tool and will write code in C#.
They will use Blender for creating 3D models to use in their games.

The computers will be networked.

6.1. Blender is an example of Open Source Software.

Open source software has a source code that is available to the public or
anyone that wants to use it. It also allows the user to change or modify the
code itself if need be. You can also distribute this type of software to anyone
and for any purpose.

Examples: Linux kernel, Gimp, Firefox, Chromium and LibreOffice

It is free and you do not need to pay for using it, which saves you money.
Since the source is available to anyone, the public can collaborate and fix
bugs.
Collaborators can improve the performance or even add features of good
quality and well-designed software.

Open software might not be as user-friendly especially to unskilled users. It is


often difficult to find proper technical support or find drivers for some devices.

The software can expose your computer to viruses and other cyber-attacks.

6.1.1 What is Open Source Software? (1)


Software made available with a license that allows you to access and modify
the source code✔.
6.1.2 Give TWO advantages of using Open Source Software. (2)
Advantages (Any TWO✔✔):
• No/low cost (usually free)
• Access to the source code
• Can adapt/modify the software to suit your needs
• Access to a community of users/support
6.1.3 Give TWO disadvantages of using Open Source Software. (2)
Disadvantages (Any TWO✔✔):
• May be glitches in the software with nobody to hold accountable
• Risk of poor support
• Higher skill set needed to utilize the software to its full potential
• Potential to download an unofficial, malicious version of the software

22
Information Technology revision booklet Grade 10 Term 3 and 4

6.2 The society will be using the computers for 3D modelling and graphics applications. What
type of computers will they need to purchase: Netbooks, Laptops, Desktops, or Servers?
Give a reason for your answer. (2)
They will need desktops✔ as 3D modelling/graphics applications will require
a GPU and a powerful machine. Laptops will not typically be powerful
enough for this purpose.✔
OR
Student’s valid reason.

You can find a table explaining the different types of computers on page
12 of the DBE text book.

6.3 The school would like to connect these new computers to their LAN. Which networking
device will be required in order to connect them? (1)
Switch ✔
6.4 Using a computer for extended periods of time can lead to health issues.

HEALTH ISSUES
While it is probably not bad for your health to use a computer for a few minutes every day,
spending hours in front of the computer every day can be bad for your health. The most
common health problems associated with regular computer use include:

• Back and neck pain: sitting hunched forward or lying back in your chair can cause
both back pain and neck pain.
• Hand or arm pain: this is caused by the overuse of a mouse and keyboard.
• Eyestrain: by focusing your eyes for hours on the screen.
• Obesity: inactivity sitting behind the computer for extended periods of time.
• Computer stress: being anxious or nervous when a computer malfunctions or
does not perform optimally as expected.

Frequent use of a computer keyboard can increase the risk of:

• Repetitive strain injury (RSI): a general term used to describe the pain felt in
muscles, nerves and tendons caused by repetitive movement and overuse.
• Carpal tunnel syndrome (CTS): a condition that causes numbness, tingling and
other symptoms in the hand and arm.

6.4.1 Name AND describe a common injury that can be caused by extended computer use. (2)
RSI (Repetitive Strain Injury)✔: RSI affects tendons mainly in the
hands/wrist/arms and is caused by repetitive actions✔.
OR
CTS (Carpal Tunnel Syndrome)✔: inflammation of tendons in the wrist✔,
causing pressure on the nerves in the wrist, resulting in pain and weakness.
OR
Tendonitis✔: inflammation of tendons✔.

23
Information Technology revision booklet Grade 10 Term 3 and 4

6.4.2 Explain fully what is Ergonomics? (2)


Ergonomics is the study of the human body✔ so that we can design
products to better fit the way that we actually function✔.

ERGONOMICS
Ergonomics is the study or science of how humans interact with man-made objects and
then creating products to increase productivity, reduce discomfort and reduce injuries. In
our modern environment these products include, keyboards, a mouse, computer desks
and chairs.

Key ergonomic guidelines for safe computer usage include:

• Sit up straight with your back perpendicular to the ground.


• Your forearms should be at the same height as your mouse and keyboard.
• Your feet should be placed firmly on the ground or on a footrest.
• The back of your chair, height of your chair and height of your armrest should be
adjusted to support your body in this position.
• Your monitor should be positioned at eye level and roughly 50 cm away from you.
You may need to place something under your monitor to increase its height.
• Your monitor should be tilted to reduce glare.
• You should stand-up and take regular breaks while using the computer.

6.4.3 List THREE ways in which one can avoid injury whilst using a computer. (3)
Any THREE ✔✔✔
- Sit correctly, don’t sit or slouch.
- Adjust the height of your seat/table so that you are comfortable.
- Make sure there is adequate lighting and ventilation.
- Ensure the mouse & keyboard are at the same level and that they are
close to each other.
- Make sure that the monitor is position at the correct level so that you
do not need to strain your neck and shoulders to view it.
- Look away from the monitor every +-20min and focus on something
far away to help prevent eye strain.
- Take regular breaks, don’t use the computer for more than an hour at
a time.
- Student’s own reason.
6.5 The society has not indicated that they will be installing any antivirus software on the
computers.

TYPES OF THREATS
Not all types of computer threats work in the same way or have the same goals.
The table below lists some of the most common threats in the world today, as well
as the best way to avoid them.
You can find the complete list of threats on page 148 and 149 of the DBE
textbook.

24
Information Technology revision booklet Grade 10 Term 3 and 4

6.5.1 Why is it important that the society should install antivirus software on the computers? (2)
To prevent any of the computers being infected by malware✔, as well as
preventing the spread of any such malware on the network✔.
OR
Student’s valid reason.
6.5.2 Suggest an antivirus software that the society can use. (1)
Any ONE ✔:
• Norton Antivirus
• AVG
• Avast
• Bit Defender
• Kaspersky
• McAfee
• ESET Security
• etc.
6.5.3 There are several different types of malware.
Name AND describe ONE type of malware. (2)
Any TWO of (1 ✔ for name, 1 ✔ for description):
- Virus: Software loaded onto the computer without the knowledge or
consent of the owner, designed to disrupt the normal functioning of
the machine.
- Worm: able to distribute itself over a network, usually via email
without a person having run an infected program. Worms replicate
themselves many times over, causing the computer to run slowly and
possibly crash.
- Trojan: A destructive program disguised as a useful application.
- Spyware: Software that attempts to monitor and track the use of a
computer. E.g. keyloggers.
- Adware: Software that downloads and bombards you with adverts
and pop-ups whenever you are connected to the internet.
[20]

GRAND TOTAL 120

Good luck with the rest of the exam preparation!

…IT_Bot10 Signing off…

25

You might also like