CAT P2 Memo
CAT P2 Memo
CAT P2 Memo
SENIOR CERTIFICATE
GRADE 11
NOVEMBER 2014
MARKS: 150
SECTION A
1.1 K (1)
1.2 G (1)
1.3 I (1)
1.4 M (1)
1.5 J (1)
1.6 N (1)
1.7 A (1)
[7]
2.1 B (1)
2.2 D (1)
2.3 B (1)
2.4 B (1)
2.5 A (1)
2.6 B (1)
2.7 D (1)
2.8 B (1)
2.9 D (1)
2.10 C (1)
[10]
3.1 FALSE – A web browser is a program that enables a user to open and
display webpages. (2)
3.4 FALSE – The file extension of a file is indicated as 3 or 4 letters after the
file name. (2)
TOTAL SECTION A: 25
SECTION B
4.1.2 Biometric input is a type of input that uses the unique biological
features of a person to identify them. (1)
4.1.5 More space for large screens due to absence of physical buttons
Button / key layout can be changed on screen
More intuitive to use
Works much better with a GUI OS than physical keys, etc.
(Any 2 x 1) (2)
4.2 4.2.1 An interactive whiteboard is a touch sensitive device that works with
a computer and a data projector. (1)
4.2.3 Printer
Monitor (2)
4.3 4.3.1 Primary memory is where the computer holds all the programs /
instructions and data it is busy working with. (1)
4.3.3 If the computers are stolen or the building burns down a copy will be
available from a different location. (1)
4.4.2 Where the computing device does not have access to the
Internet. (1)
4.4.3 The hardware and software of the computer must be able to work
with the software being installed. (1)
5.1 A computer network is when two or more computers or computing devices are
connected to one another by some sort of communication media. (1)
5.2 Hardware
Software
Data
Information
(Any 2 x 1)
5.3 5.3.1 Clients are computers that users work on in a network. (1)
5.3.3 Proxy server provides a safety net between the network and the
Internet whilst the file server provides central file handling for the
network. (2)
5.3.4 Cables
Radio waves (Wireless) (2)
5.3.6 A router is a device that connects two networks to each other. (1)
5.4 5.4.1 Intranet is an organisation’s private network that uses the same
principle and software as the Internet. (1)
6.3 6.3.1 Data can be moved from one application to another without retyping
the data. An example is when you export data from a spreadsheet
to a table in a database. (2)
6.3.2 A CVS file can be used to import and export data from different
programmes which normally are not directly compatible. (1)
7.5 Malware is a collective term for all software designed to damage, disrupt or
take control of your computer. (1)
7.6 Viruses
Spam
(Any 1 x 1) (1)
[10]
8.1 8.1.1 Concatenate joins several text strings into one text string. (1)
8.1.2 An AND function checks whether all the arguments are TRUE and
returns TRUE if all arguments are TRU.E (1)
8.5.3 Grouping places records together which have the same value for a
specific field. (1)
[15]
TOTAL SECTION B: 75
SECTION C
9.1.5 16 GB (1)
9.1.8 Can transfer larger files which equates to better quality video.
Video and sound combined with one wire / connection.
(Any 1 x 1) (1)
9.1.9 HD TV
9.1.10 Dual core does NOT indicate dual CPUs. It simply means two
cores that can act as if there are two separate CPUs. (2)
9.3 9.3.1 It means the tablet can read all Microsoft office documents. (1)
9.3.2 Open source software is computer software that allows users to use,
change and redistribute it free of charge. (1)
9.3.3 The supplier will fix any broken / faulty equipment at the school and
no need to take it to a shop. (1)
9.3.4 The amount of pixels that the camera uses to create a picture.
(Note to the marker: Do not accept only the word “Megapixel”. The
question did not ask to expand the abbreviation.) (2)
9.4 9.4.1 A tablet user can use a monitor / screen to enter data by touching on
the screen. (1)
9.4.3 Bluetooth
USB
3G
Wi-Fi
(Any 2 x 1) (2)
9.5.3 Online harassment is when you are the Internet and you feel you
have been harmed in one way or another like pornography whilst
cyber bullying is when you are sent an abusive e-mail or SMS or
someone posts your picture on social networks. (2)
TOTAL SECTION C: 50
GRAND TOTAL: 150