Cat P2 Nov2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

COMPUTER

APPLICATIONS
TECHNOLOGY
PAPER 2

NATIONAL SENIOR CERTIFICATE GRADE 12


NOVEMBER 2020
TOTAL: 150
TIME: 3 HOURS

THIS QUESTION PAPER CONSISTS OF 18 PAGES.


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

NATIONAL SENIOR CERTIFICATE


NOVEMBER 2020
COMPUTER APPLICATIONS TECHNOLOGY P2

INFORMATION AND INSTRUCTIONS

1. This question paper consists of the following sections:


SECTION A (25 marks)
SECTION B (73 marks)
SECTION C (52 marks)
2. Answer all the questions.
3. Answer all sections in the answer book.
4. Number the questions correctly according to the numbering system used in this
question paper.
5. Start EACH question on a NEW page.
6. Leave a line open between EACH sub question
7. Read each question carefully before answering and do NOT give more information
than the question requires as this will NOT be marked.
8. One mark is awarded per fact; therefore a 2-mark question will require 2 facts, etc.
9. Answers such as ‘slower/faster’ and ‘cheaper’ etc. will ONLY be accepted if they are
motivated.
10. Write neatly and legibly.

© SACAI COPYRIGHT Page 2 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

SECTION A
QUESTION 1: MATCHING ITEMS
Choose an appropriate term or concept from COLUMN B to match the explanation in
COLUMN A. Write down ONLY the letter next to the question number in the ANSWER BOOK,
e.g. 1.11 Q.

COLUMN A COLUMN B
1.1 Additional information in a file or document, such as the name of A client
the author
B GPRS

1.2 A network used by a company to share information only with its C plug-in
employees
D metadata

1.3 A computer that connects to a server and uses the resources of a E RAM
server
F ROM

1.4 A standard used to enable high speed data transfer between G fibre optic
cellular devices
H server

1.5 A number of black and white blocks combined into a square grid I add-on
which uses text to represent a URL
J mp3

1.6 Memory containing the start-up instructions used to load the K keylogger
operating system of a computer
L pdf

1.7 Software that attempts to capture usernames by tracking and M LTE


recording user keystrokes
N network

1.8 An element of a software program that adds specific or additional O intranet


functionality/features to an application
P web address

1.9 The application that opens a .wav file can also open this type of file Q QR-code
extension
R web repository

1.10 A central place where multiple files are stored for distribution over S key reader
a network
T VPN

[10]

© SACAI COPYRIGHT Page 3 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 2: MULTIPLE CHOICE


Various options are given as possible answers to the following questions. Choose the most
appropriate answer and write only the letter (A–D) next to the question number
(2.1–2.5) in the ANSWER BOOK, for example 2.6 E.

2.1 Which ONE refers to the effect of human error on output?


A LIFO
B SOHO
C GIGO
D I/O (1)

2.2 A program that is responsible for the managing of print jobs that are sent to a
printer.
A Spooler
B Queue
C IRQ
D BIOS (1)

2.3 A spreadsheet function used to determine the number of cells that meets specific
criteria.
A =SumIf
B =Sum
C =CountIf
D =Count (1)

2.4 Which ONE of the following statements about cloud storage is true?
A You can save backups of data in the cloud.
B You will not be able to share files with other users.
C You use storage space on your own computer.
D It is expensive to use cloud storage. (1)

2.5 A computer program, powered by rules and artificial intelligence, developed to


simulate interactive human conversations.
A Robot
B Ai Robot+
C Chat-bot
D Wii++ (1)

[5]

© SACAI COPYRIGHT Page 4 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 3: TRUE OR FALSE ITEMS

Indicate whether the following statements are TRUE or FALSE. Correct the statement if it is
FALSE by changing the underlined word in order to make the statement TRUE.
Note:
● You may NOT use the word “NOT” to change the statement.
● No mark will be awarded if only FALSE is written.

3.1 The Disk Cleanup utility can help to close a non-responding application. (1)

3.2 A database report uses criteria to retrieve specific records or information. (1)

3.3 The BIOS is a hardware component that allows a computer to connect and
communicate over a network. (1)

3.4 SMS allows for real-time text-based communication. (1)

3.5 A router enables internet connectivity. (1)

3.6 Public hotspots allow users to connect to the internet using LTE. (1)

3.7 Data mining is the practice of researching large amounts of data in user
databases and websites to find consumer patterns and behaviours. (1)

3.8 Website ranking is the process of making changes to a website so that it appears
higher on the search engine results. (1)

3.9 CSS is the language used to format documents created with HTML. (1)

3.10 Sorting automatically highlight/format specific values in a spreadsheet cell or


range of cells, according to a rule. (1)

[10]

TOTAL SECTION A: 25

© SACAI COPYRIGHT Page 5 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

SECTION B
QUESTION 4: SYSTEM TECHNOLOGIES

4.1 Name the technology represented in the picture below where various devices and
technologies can be found in one device and describe THREE advantages of this
technology.

https://shape.att.com/blog/ (4)

4.2 What is described next?


A computer temporarily transfers data between memory and storage to
compensate for a shortage in memory. (1)

4.3 Give TWO reasons why the image quality of a front facing camera in mobile
phones is lower when compared to the image quality of a back facing camera. (2)

4.4 Give THREE reasons why the component in the picture below can be identified
as a graphics card.

(3)

© SACAI COPYRIGHT Page 6 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

4.5 Many apps are available for download on various platforms. Study the picture
below and answer the questions that follow.

4.5.1 What is meant by the word platform? (1)

4.5.2 Identify THREE criteria, except the platform, to consider when a user wants to
download/use an app. (3)

4.6 E-mail programs will block an attachment with an .exe extension. Give a
description of an .exe file. (2)

4.7 Plug and play allows a user to connect a device or component to a computer and
use it without any action from the user. Name the software installed during the
plug and play process and briefly describe the purpose of the software. (3)

4.8 Various apps can accurately determine high volumes of traffic using GPS
technology and direct one along the quickest route to one’s destination.

4.8.1 What is used by the apps to accurately determine one’s position? (2)

4.8.2 Apart from the geolocation, what other information does a GPS supply? (1)

4.9 Distinguish between Skype and VoIP in terms of the role it plays to make video
conferencing possible. (2)

© SACAI COPYRIGHT Page 7 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

4.10 Study the picture below and answer the questions that follow.

https://www.t3.com/news/

4.10.1 Identify the type of device in the picture. (1)

4.10.2 Apart from the CPU, RAM and storage, name the component that can NOT be
upgraded but does have an influence on the overall processing of the device.
(1)

[26]

© SACAI COPYRIGHT Page 8 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 5: NETWORK AND INTERNET TECHNOLOGY

5.1 Various notifications are located in the system tray of the Windows Taskbar. Briefly
describe each of the following notifications.

5.1.1

(2)

5.1.2

(2)

5.2 Suggest TWO ways to prevent unwanted advertisements from appearing on the
screen while using the internet. (2)

5.3 Study the following advertisement and answer the questions that follow.

Uncapped
100GB Fair Usage Policy
8 Mbps Download
2 Mbps Upload

https://www.techtrix.co.za

5.3.1 Explain what is meant by fair usage policy. (3)

5.3.2 What does Mbps stand for? (1)

© SACAI COPYRIGHT Page 9 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

5.4 Briefly discuss THREE advantages of using a network. (3)

5.5 Bluetooth used to be the preferred method of transferring data between devices.
Identify and briefly describe the technology/method used by the devices in the
picture below to transfer data.

https://www.techspot.com/guides (2)

[15]

© SACAI COPYRIGHT Page 10 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 6: INFORMATION MANAGEMENT

6.1 Differentiate between piracy and plagiarism. Clearly state piracy and plagiarism
followed by your answer. (4)

6.2 Explain why one should include the date of when information was obtained from a
website in the bibliography . (1)

6.3 Why is it not a good idea to click the first/top result of a web search when
researching information? (2)

6.4 The caching of web pages means that previously accessed web pages might be
displayed in a web browser.

6.4.1 Explain how this might affect the quality/accuracy of information on the web page. (1)

6.4.2 What can one do if one suspects that he/she is viewing a cached web page? (1)

[9]

© SACAI COPYRIGHT Page 11 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 7: SOCIAL IMPLICATIONS

7.1 Study the following picture and answer the questions that follow.

https://www.paintshoppro.com/

7.1.1 Give the term for adding the location of where a photograph was taken to the
photograph. (1)

7.1.2 Briefly discuss why it is not advisable to turn on the feature named in
QUESTION 7.1.1 if you are in a game reserve. (1)

7.2 While installing software, you were NOT required to enter a product key. Give TWO
reasons why this occurred. (2)

7.3 With technology that is available you can move a trolley filled with groceries past a
pay point and the total amount payable of all the items will be calculated instantly
without removing a single item.

7.3.1 Why are grocery stores still making use of manual labour to scan the individual
items when technology as described above are available? (1)

7.3.2 Name the technology that makes the above mentioned possible. (1)

7.4 Describe THREE potential negative effects of social networks. (3)

[9]

© SACAI COPYRIGHT Page 12 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 8: SOLUTION DEVELOPMENT

8.1 Predict how the values in a database table will change when a calculated query is
run . (1)

8.2 Certain aspects need to be considered when creating a webpage. Study the
following screen shot of a webpage and list any FOUR mistakes made in the design
of the webpage.

https://www.pinterest.com (4)

8.3 You created a webpage. All of your html coding is in your MainPage.html file. The
images used in the webpage are all saved in the Pictures folder. The folder structure
of your webpage is as follows:

You included the following coding in your webpage to display a picture named
MyDog.gif:

<img src="MyDog.gif" alt="Best friend">

What will happen when you open the web page? Give a reason. (2)

© SACAI COPYRIGHT Page 13 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

8.4 A column graph was created to show the rainfall for the first six months of the year.
Recommend a more suitable graph to display the trend (rainfall) over a period of a
year.

(1)

8.5 Give a brief description of how data is saved in a .csv file. (1)

8.6 How will you solve the following problem?


You entered the data below into a spreadsheet. You want to view the complete
address without making the column wider or the font size smaller.

(1)

8.7 Briefly discuss TWO advantages of using the 'Track Changes'-feature of a word
processing program. (2)

8.8 Name TWO controls that can be found on the developer tab of your Ms Word
application which you can use to enter or select data. (2)

[14]
TOTAL SECTION B: 73

© SACAI COPYRIGHT Page 14 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

SECTION C: INTEGRATED SCENARIO


Take the following scenario into consideration when you answer QUESTIONS 9 AND 10.
SCENARIO
You will be working in a museum for the holidays. The different computers from various
departments are all linked to a network. You have been asked to assist the staff with computer
related issues and questions.

QUESTION 9:

9.1 The shop at the museum regularly lose items due to theft. Propose ONE
technology that can be used to help prevent theft of items. (1)

9.2 Updates were downloaded and installed on the museum’s server. You recommend
restarting the server. Justify your recommendation by explaining why it is
necessary to restart the server to complete the installation of the updates. (2)

9.3 The museum is introducing a BYOD-policy. What does BYOD stand for and briefly
explain what it is. (2)

9.4 Name TWO possible reasons why employees are unable to connect their mobile
devices to the museums Wi-Fi network for internet access.

Note: You can assume that the devices are in good working order. (2)

9.5 The museum urgently needs to upgrade the buildings. Briefly name and explain
ONE ICT strategy that can be implemented by the museum to get the funds they
need. (3)

9.6 The museum's manager recommends controlling access to the server room using
biometric fingerprint security. Briefly discuss TWO limitations of biometric
fingerprint security. (2)

9.7 Some computers in the museum are running out of hard drive space. As a solution
it was decided to defragment the hard drives of those computers. State if the
solution will solve the problem and motivate your answer. In your motivation refer
to the purpose of defragmentation. (2)

© SACAI COPYRIGHT Page 15 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

The museum decided to replace all existing desktop computers with laptops. Study the
specifications of the following two laptops. Questions 9.8 – 9.12 apply to these ads.

Laptop A Laptop B

Windows 10 Home (32 Bit) Windows 10 Home (64 Bit)


Intel Core i7 Processor Intel Core i9 Processor
15.6-Inch FHD 15.6-inch 4K UHD
8GB DDR4 RAM 32GB DDR4-2666MHz
1TB Hard Drive 1TB PCIe SSD
Intel UHD Graphics 620 NVIDIA GeForce GTX 1650 4GB
3 Year Warranty 1 Year Onsite Warranty

9.8 The graphics specifications refer to FHD and UHD. Distinguish between FHD and
UHD by expanding the acronyms and briefly describing the difference between the
two. Clearly state FHD and UHD followed by your answer. (3)

9.9 Which of the two laptops (A or B) will be more suitable for doing administration
work? Motivate your answer. (2)

9.10 One of the workers wants to purchase a laptop for personal use. He will mostly play
games on the laptop. He saw the adverts above.

9.10.1 With reference to the specifications, which laptop (A or B) will you recommend to
play the latest games? Provide TWO reasons to motivate your answer. (3)

9.10.2 List ONE specification that may not be sufficient for playing games. (1)

9.11 The operating system specifications refer to 32-bit and 64-bit operating systems.
Briefly explain what a bit (binary digit) is in general computer terms. (2)

9.12 Why is laptop B likely to be thinner than laptop A? (1)

[26]

© SACAI COPYRIGHT Page 16 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

QUESTION 10: INTEGRATION

PLEASE NOTE: The scenario in QUESTION 9 also applies to QUESTION 10.

10.1 You suggest that the museum use vlogs instead of blogs to promote the museum
on social media.

10.1.1 Explain what a vlog is. (1)

10.1.2 Discuss ONE advantage of vlogs when compared to blogs. (1)

10.2 The network is out of order and you determine that the problem is with the
following device. Identify the device below.

(1)

10.3 Name the injury that a person can get if he/she is appointed to capture the details
of all the items in the museum and suggest TWO possible preventative measures
that can be taken. (3)

10.4 The manager is worried that the museum might become a victim of a cyber-attack
and that the cyber criminals would demand a payment in a cryptocurrency.

10.4.1 What is cryptocurrency? (1)

10.4.2 What is a blockchain? (2)

10.5 One of the staff members is preparing a database table to capture the details of
all staff working at the museum.

10.5.1 Write the Input Mask for the cell number 089 000 1234. (1)

10.5.2 A ‘Listbox’ or ‘Combobox’ could be used to ensure that the user can only select
Male or Female. Distinguish between a Listbox and a Combobox in terms of how
data is displayed to the user. (2)

10.6 A staff member received an email with an attached agenda from the manager. He
does not understand why the e-mail was sent only to him as all staff members
normally attend the meetings.

Briefly discuss why it seems to the staff member that he was the only one who
received the e-mail if it is normally sent to all staff members? (2)

© SACAI COPYRIGHT Page 17 of 18 Please turn over


NSC NOVEMBER: COMPUTER APPLICATIONS TECHNOLOGY P2 | 2020

10.7 The manager uses a spreadsheet to calculate the percentage of days that an
employee is absent. Employees may only take a full day’s leave. The following
worksheet was created:

The formatting for each of the different columns are as follows:

Name Text
Surname Text
Days Worked Number
Days Absent Number
Percentage Days Absent Percentage

The formula used in cell E2 to determine the percentage was:


=ROUND(D2/C2*100,1)

The correct ‘Percentage Days Absent’ must be displayed as 1.5.

Answer the questions that follow

10.7.1 Why does the percentage in cell E2 display incorrectly? Indicate what causes the
percentage of days to be displayed incorrectly. (2)

10.7.2 Propose a change that you can make to how the Days Worked and Days Absent
values are displayed and briefly motivate why you propose this change. (2)

10.8 All the computers in the museum are linked to a network with internet access. Will
the network be classified as a LAN or a WAN? Motivate your answer. (3)

10.9 The museum wants to make use of SaaS.

10.9.1 What does SaaS stand for? (1)

10.9.2 Give a brief description of what SaaS is. (2)

10.10 One of the employees pressed ‘Ctrl+Alt+Del’ on the computer. Name TWO options
that she will be presented with. (2)

[26]

TOTAL SECTION C: 52
GRAND TOTAL: 150

© SACAI COPYRIGHT Page 18 of 18 END OF DOCUMENT

You might also like