GR 10 Term 3 and 4 Theory
GR 10 Term 3 and 4 Theory
GR 10 Term 3 and 4 Theory
INFORMATION
TECHNOLOGY
REVISION BOOKLET
TERM 3 & 4
Grade 10
This revision program is designed to assist you in revising the critical
content and skills that you have covered during the year. The purpose is to
prepare you to understand the key concepts and to provide you with an
opportunity to establish the required standard and the application of the
knowledge necessary to succeed in the examination.
1.1.2 Mpeg, asf, wmv, avi, mov, flv are examples of… (1)
A Audio Files
B Graphic Files
C Office Files
D Video Files✓
2
Information Technology revision booklet Grade 10 Term 3 and 4
1.1.4 Which of the following types of computer is generally the least ‘powerful’? (1)
A Smartphone✓
B Server
C Desktop
D Laptop
1.1.5 Which of the following does NOT represent the number 18? (1)
A 1216
B 100102
C A116✓
D 228
3
Information Technology revision booklet Grade 10 Term 3 and 4
1.1.10 Which is the largest decimal value that can be expressed by 5 bits? (1)
A 64
B 25
C 10
D 63✓
• Use flashcards, writing the key terms, dates and concepts on the front
and the definition, event, and explanations on the back.
• Read the question carefully and make sure that you answer everything
that it asks for.
4
Information Technology revision booklet Grade 10 Term 3 and 4
5
Information Technology revision booklet Grade 10 Term 3 and 4
• Try to anticipate questions that will be asked on the test and prepare for them.
Usually what your instructor emphasizes in class will be on the test.
• Try not to leave an answer blank. Show your work/write down your thoughts, even
if you don't get the exact answer, partial credit is usually awarded.
• If you don't know the answer, come back to it after you finish the rest of the test
and make an educated guess. Other parts of the test may give you clues to what
the answer may be.
• If you can think up of more than one answer for a question, ask the instructor
what to do.
• Read the question carefully and make sure that you answer everything that it asks
for.
• Some short answer questions have multiple parts.
2 Computers are assembled from a variety of parts to make functional working unit.
2.1 What is the name given to such a design? (1)
Modular design ✓
2.2 Give TWO reasons why the design you have mentioned in 2.1 is important. (2)
Allows for upgrade to take place
Allows for broken parts to be replaced easily
2.3 Next is an extract from a computer advert: Intel Core i5 – 9400 @ 2.9GHz
2.3.1 What component is being referred to in this extract? (1)
6
Information Technology revision booklet Grade 10 Term 3 and 4
CPU
A computer’s motherboard is a large printed circuit board that physically connects all the
different components. On the motherboard, there are specific positions where the CPU,
GPU and RAM can be inserted. There are also connectors that allow you to connect a
power supply to a computer. Finally, the motherboard has several ports that allow you to
plug in devices, such as keyboards, speakers and monitors easily.
7
Information Technology revision booklet Grade 10 Term 3 and 4
2.5 Explain why the computer will not work if there is no RAM install. (1)
Any ONE
• Before any program can run or any data can be processed, it has to be loaded into
RAM first.
• RAM is working space for a computer
• It gives applications a place to store and access data on short-term basis
• every instruction/data the CPU is currently working on is loaded into RAM before
being processed and save back to RAM after processing
Random-access memory (or RAM), is physical hardware that temporarily saves data. It
serves as the computer’s ‘working’ memory. RAM provides space for your computer to
read and write data to be accessed by the CPU.
RAM is volatile, meaning that all data is lost once the electricity is disconnected or the
power is lost.
2.6 Compare Memory and Storage by giving TWO characteristics of each (4)
Any TWO sets
Memory Storage
is fast is slow
temporary/volatile permanent/non-volatile
More expensive per GB Less expensive per GB
Smaller maximum capacity Larger maximum capacity
When comparing memory and storage, we first need to identify the role of the
components. The computer’s main memory is the RAM. You can think of RAM as a
workspace or workbench the computer uses to get work done. When you double-click on
an app, or open a document, or do almost anything on your computer, RAM gets used to
store the code of the app and the data while the processor (CPU) is working on it. The
storage unit i.e. HDD, SSD or Flash drive, by contrast, is the cupboard or storage shelf
you might use to permanently store your tools, apps, data and completed work. So, when
the task is complete and you click save in the app, the resulting output is stored
permanently on the storage unit.
8
Information Technology revision booklet Grade 10 Term 3 and 4
A utility program is system software that helps users to analyse, configure, monitor, or
help maintain their computers. Most operating systems include a set of basic utilities for
users, and additional utilities that could be downloaded if needed. Examples of utilities
include:
• back-up software that helps a user create back-up copies of the files on their
computer
• a device manager that helps a user install new hardware such as a mouse, USB,
etc.
9
Information Technology revision booklet Grade 10 Term 3 and 4
2.9 After plugging your scanner to the computer, you get a notification that a ‘driver’ needs
to be installed before using this device. Define a driver. (1)
A driver is software that allows an operating system to communicate with and control a
hardware device.
A device driver is software that contains a set of instructions that command a computer’s
operating system on how to communicate with the hardware so that it can function
properly. Device drivers allow communication between the operating system and all the
devices, such as the mouse, keyboard, printer, etc.
Also see plug and play.
2.10 After sometimes, software installed on your computer pop messages stating that updates
are available. Why is it important to run these updates and give examples (2)
Any TWO
• Programs need to be updated to add new features
• to fix ‘bugs’
• to deal with new threats in the case of anti-virus
[20]
10
Information Technology revision booklet Grade 10 Term 3 and 4
11
Information Technology revision booklet Grade 10 Term 3 and 4
3.2.1 In this scenario which type of networking would you choose (peer-to-peer or (1)
client-to-server)?
peer-to-peer
CLIENT-SERVER AND PEER-TO-PEER NETWORKS
A network architecture refers to the differences in the way that the network is built. The
two types of network architectures are peer-to-peer and client-server networks.
CLIENT-SERVER NETWORKS
A server is used to manage a client-server network, where computers (nodes) connect to
the server. It ensures that authorised users have access to certain resources when
logging on to a network. In a school, one would have the following:
● Many nodes, your PCs, connected via cables to the server.
PEER-TO-PEER NETWORKS
In a peer-to-peer network, each computer (node) on the network connects directly to the
network AND to the other nodes. However, each computer has its own security. This
means that the computer’s settings determine who is authorised to access the resources.
Peers on this network are visible to each other and can share files and resources with
each other.
In a peer-to-peer network, data flows between peers and most home networks are
organised as peer-to-peer networks. This means that if your computer connects to your
home network, it will have the same role and permissions as your mother’s notebook and
your father’s smartphone. None of these devices organise the network nor do they need to
be connected for the network to work correctly. Instead, each computer can connect and
disconnect from the network automatically.
3.2.2 Support your answer in 3.2.1 by giving TWO reasons for your choice. (2)
Any TWO
• Network resources are shared amongst the computers
• Home or very small network
• Printers, Internet access and files can be shared
3.3 You decided to connect all the computers/devices to the Internet using an ADSL
line.
3.3.1 What does the acronym ADSL stand for? (1)
Asymmetric digital subscriber line
12
Information Technology revision booklet Grade 10 Term 3 and 4
3.3.2 What device would you need to connect the ADSL line? (1)
Modem / Router
13
Information Technology revision booklet Grade 10 Term 3 and 4
WIRED NETWORK
A wired network is a network that uses a physical media to transfer data between two or
more nodes. The transmission media for wired networks are:
WIRELESS NETWORKS
A wireless network is a network that uses non-physical components to transfer data
between two or more nodes. Local area networks are often wireless LANs (WLANs).
Transmission media include:
14
Information Technology revision booklet Grade 10 Term 3 and 4
15
Information Technology revision booklet Grade 10 Term 3 and 4
4.4 Write the following number in FC16 in decimal notation. Show all your work. (3)
FC16 = 15*161 + 12*160
= 240 + 12
= 25210
4.5 Write the following decimal number in binary notation. 2510 (3)
25/2 = 12 rem 1
12/2 = 6 rem 0
6/2 = 3 rem 0
3/2 = 1 rem 1
½ = 0 rem 1
11012
In unit 2.2 of the DBE textbook, page 24, they have a step-by-step
description of how to convert between different number types.
4.6 .jpg, .png and .gif are extensions of which category of files? (1)
Images/Pictures
Unit 2.5, page 47, discusses the
common file types and extensions
4.7 C:\Documents\IT_2021\PAT_Phase_1.docx
4.7.1 In reference to the above file path what is the:
a) The name of the file (1)
PAT_Phase_1.docx
b) Which application would you use to open the file (1)
Microsoft Word
4.8 Give TWO guidelines to developing a good file naming convention. (2)
16
Information Technology revision booklet Grade 10 Term 3 and 4
Any TWO
• Keep file names short but meaningful.
• Include useful information such as the name of the project or
document you are working on.
• Include the version number (e.g., V1 or -v1) and the date if there
is more than one version.
• Dates should always be in the format yyyy-mm-dd so that the _
les will be organised in date order.
4.9 You have created a folder with all your previous work to share with a classmate.
However, it is too large to send as is.
4.9.1 Which file type you will make use of to send the contents via email? (1)
Compressed file type. (zip/rar)
4.9.2 Explain TWO reasons why the file type you mentioned in 4.9.1 is the most efficient (2)
choice.
The contents will be smaller.
It will be easier to send one compressed file than several small files. After
decompressing the files, you will still have access to everything you have
created.
[20]
17
Information Technology revision booklet Grade 10 Term 3 and 4
3✓
1✓
R ✓ 18.78 ✓
464 ✓✓
3✓
18
Information Technology revision booklet Grade 10 Term 3 and 4
5.2.2 What will the value of SUM be, once the loop has stopped? (2)
15✓✓
5.2.3 If the statement in line number 3 is left out of the code, how will it influence variable
“SUM”? (2)
5.2.4 What is the type of statements in line number 1, 2 and 3 called? (1)
Assignment / initialization ✓
So how can you make sure your algorithm does what it is supposed to do? Let’s
look at some of the steps you can follow to make sure that you are able to create
high quality algorithms:
19
Information Technology revision booklet Grade 10 Term 3 and 4
5.3 The following Delphi application was created to compare a number added by a user and
a random number. Both the user and random numbers should be between 1 and 10.
Study the source code:
Line Code
1 procedure TForm1.btnCompareClick(Sender:Tobject)
2 var
3 iUserValue, iRandomValue: int
4 Begin
5 //Input
6 iUserValue := edtNumber;
7 randomize;
8 iRandomValue =random(10);
9 //Output
10 if iUserValue = iRandomValue then
11 Begin
12 lblAnswer.Caption:= ‘Correct Guess’;
13 end
14 else
15 Begin
16 lblAnswer.Caption:= ‘Incorrect, Random value
17 was:’ +#9 + iRandomValue;
18 end;
5.3.2 Rewrite line 6 to ensure that iUserValue will receive a correct value and store it in
memory. (2)
iUserValue := strToInt(edtNumber.Text);
.Text ✓ added
strToInt( … ) ✓ added
0✓ to 9✓
20
Information Technology revision booklet Grade 10 Term 3 and 4
5.3.4 Rewrite the RANDOM function in line 8 to ensure that random values between 1 and 10
will be generated. (2)
=randomRange(1,11) OR
=random(10+1+1)+1 OR
=random(10)+1
Bottom Value = 1 ✓ AND Top value = 10 ✓
[20]
21
Information Technology revision booklet Grade 10 Term 3 and 4
Open source software has a source code that is available to the public or
anyone that wants to use it. It also allows the user to change or modify the
code itself if need be. You can also distribute this type of software to anyone
and for any purpose.
It is free and you do not need to pay for using it, which saves you money.
Since the source is available to anyone, the public can collaborate and fix
bugs.
Collaborators can improve the performance or even add features of good
quality and well-designed software.
The software can expose your computer to viruses and other cyber-attacks.
22
Information Technology revision booklet Grade 10 Term 3 and 4
6.2 The society will be using the computers for 3D modelling and graphics applications. What
type of computers will they need to purchase: Netbooks, Laptops, Desktops, or Servers?
Give a reason for your answer. (2)
They will need desktops✔ as 3D modelling/graphics applications will require
a GPU and a powerful machine. Laptops will not typically be powerful
enough for this purpose.✔
OR
Student’s valid reason.
You can find a table explaining the different types of computers on page
12 of the DBE text book.
6.3 The school would like to connect these new computers to their LAN. Which networking
device will be required in order to connect them? (1)
Switch ✔
6.4 Using a computer for extended periods of time can lead to health issues.
HEALTH ISSUES
While it is probably not bad for your health to use a computer for a few minutes every day,
spending hours in front of the computer every day can be bad for your health. The most
common health problems associated with regular computer use include:
• Back and neck pain: sitting hunched forward or lying back in your chair can cause
both back pain and neck pain.
• Hand or arm pain: this is caused by the overuse of a mouse and keyboard.
• Eyestrain: by focusing your eyes for hours on the screen.
• Obesity: inactivity sitting behind the computer for extended periods of time.
• Computer stress: being anxious or nervous when a computer malfunctions or
does not perform optimally as expected.
• Repetitive strain injury (RSI): a general term used to describe the pain felt in
muscles, nerves and tendons caused by repetitive movement and overuse.
• Carpal tunnel syndrome (CTS): a condition that causes numbness, tingling and
other symptoms in the hand and arm.
6.4.1 Name AND describe a common injury that can be caused by extended computer use. (2)
RSI (Repetitive Strain Injury)✔: RSI affects tendons mainly in the
hands/wrist/arms and is caused by repetitive actions✔.
OR
CTS (Carpal Tunnel Syndrome)✔: inflammation of tendons in the wrist✔,
causing pressure on the nerves in the wrist, resulting in pain and weakness.
OR
Tendonitis✔: inflammation of tendons✔.
23
Information Technology revision booklet Grade 10 Term 3 and 4
ERGONOMICS
Ergonomics is the study or science of how humans interact with man-made objects and
then creating products to increase productivity, reduce discomfort and reduce injuries. In
our modern environment these products include, keyboards, a mouse, computer desks
and chairs.
6.4.3 List THREE ways in which one can avoid injury whilst using a computer. (3)
Any THREE ✔✔✔
- Sit correctly, don’t sit or slouch.
- Adjust the height of your seat/table so that you are comfortable.
- Make sure there is adequate lighting and ventilation.
- Ensure the mouse & keyboard are at the same level and that they are
close to each other.
- Make sure that the monitor is position at the correct level so that you
do not need to strain your neck and shoulders to view it.
- Look away from the monitor every +-20min and focus on something
far away to help prevent eye strain.
- Take regular breaks, don’t use the computer for more than an hour at
a time.
- Student’s own reason.
6.5 The society has not indicated that they will be installing any antivirus software on the
computers.
TYPES OF THREATS
Not all types of computer threats work in the same way or have the same goals.
The table below lists some of the most common threats in the world today, as well
as the best way to avoid them.
You can find the complete list of threats on page 148 and 149 of the DBE
textbook.
24
Information Technology revision booklet Grade 10 Term 3 and 4
6.5.1 Why is it important that the society should install antivirus software on the computers? (2)
To prevent any of the computers being infected by malware✔, as well as
preventing the spread of any such malware on the network✔.
OR
Student’s valid reason.
6.5.2 Suggest an antivirus software that the society can use. (1)
Any ONE ✔:
• Norton Antivirus
• AVG
• Avast
• Bit Defender
• Kaspersky
• McAfee
• ESET Security
• etc.
6.5.3 There are several different types of malware.
Name AND describe ONE type of malware. (2)
Any TWO of (1 ✔ for name, 1 ✔ for description):
- Virus: Software loaded onto the computer without the knowledge or
consent of the owner, designed to disrupt the normal functioning of
the machine.
- Worm: able to distribute itself over a network, usually via email
without a person having run an infected program. Worms replicate
themselves many times over, causing the computer to run slowly and
possibly crash.
- Trojan: A destructive program disguised as a useful application.
- Spyware: Software that attempts to monitor and track the use of a
computer. E.g. keyloggers.
- Adware: Software that downloads and bombards you with adverts
and pop-ups whenever you are connected to the internet.
[20]
25