IT March 2013 Paper 2 MEMO
IT March 2013 Paper 2 MEMO
IT March 2013 Paper 2 MEMO
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
FEBRUARY/MARCH 2013
MEMORANDUM
MARKS: 180
QUESTION 1
1.1 A (1)
1.2 C (1)
1.3 C (1)
1.4 C (1)
1.5 B (1)
1.6 D (1)
1.7 B (1)
1.8 D (1)
1.9 C (1)
1.10 B (1)
TOTAL SECTION A: 10
QUESTION 2
2.3.3 Accept any ONE correct example explaining the use of threads
• Auto save while working on the document
• Spellchecking/grammar checking as you type out a document
• Rendering of graphics screens while playing a computer game (1)
2.4 2.4.1 Accept any TWO appropriate facts regarding memory management
• The operating system makes sure that every program gets the
memory that it needs.
• The operating system must ensure that two programs do not
access the same piece of memory – prevents access violations
in Windows OS.
• The operating system ensures that no application gains direct
access to RAM – gains access only through the memory
management unit.
• Manage the physical amount of RAM assigned to a program so
its size may vary according to the programs needs.
• No matter how much physical memory is available, all new
operating systems make use of virtual memory. (2)
2.4.2 Virtual memory is an area reserved on the hard drive that the OS
uses as additional RAM (2)
2.4.3 Thrashing is when the operating system spends more of its time
swapping pages (parts of a swap file) between the RAM and
virtual memory(paging) than executing application software. (2)
2.6 2.6.1 Accept any ONE correct way of solving no printer problem
• Drivers need to be installed
• Install the printer (1)
(b) No (1)
2.7 2.7.1 Partitioning a disk - You can split a single physical hard drive into
virtual/logical drives each with their own boot sector. (1)
2.8 2.8.1 A router manages the bandwidth because it is able to inspect the
data packets as they arrive and determine the correct
destinationof the data and forward it accordingly. (2)
2.9 2.9.1 Accept any ONE correct explanation for "non-system disk" error
message
• The user tries to boot from a DVD/CD/Flash/stiffy/hard drive
that doesn’t contain a bootable sector
• The boot sector of the C drive is damaged
• The default drive has not been configured as a boot disk
• The hard drive with the boot sector is not present in the PC (1)
2.9.2 Accept any ONE correct explanation for "safe mode" message
• The computer restarts after a power failure
• The user pressed F8/Del repeatedly during the POST in
order to select a different start up sequence
• The user pressed the "reset" button repeatedly (1)
2.9.3 The BIOS executes a series of tests to make sure that computer
hardware is connected properly and operating correctly. (2)
TOTAL SECTION B: 47
QUESTION 3: e-COMMUNICATION
OR
3.1.2 (a) Online trading through a digital means such as a website. (1)
Accept any similar alternative explanation
4.1 4.1.1 SPAM is electronic junk mail sent to someone without them
requesting it (i.e. unsolicited). (2)
4.3 4.3.1 Accept any TWO advantages from the company's perspective
• If client is involved in an accident any notice about allergies
is immediately available
• If the client visits a malaria infected region, the immunisation
records can be verified
• If the client's prescription medication is finished – new
medication can be dispensed from a local pharmacy
because the prescription is available online
Accept any similar valid explanations (2)
TOTAL SECTION C: 24
5.1 5.1.1 (a) A primary key is used to uniquely identify every record in a
database table. (2)
(c) Relationship
• Draw line between tables indicating relationship
• Indicate relationship as a one-to-many relationship (2)
5.2.3 Correct data: The correct year of birth of the client, e.g. 1980.
Valid data: Any valid year value that falls within the range of
1900 to 2013. (2)
5.2.5 (a) A syntax error occurs when the rules of the programming
language are violated which prevents the program from
running OR a syntax error occurs before the program
executes.
5.5 5.5.1 Accept any TWO valid reasons for using a WHILE loop with a
flag
• A while loop will make use of its checking condition to stop
the loop once the condition is true, i.e. the correct client is
found.
• The FOR-loop will check every client in the array even when
the correct client is found – wasting valuable processing
time.
• The number of clients in the database is not constant and
may change. (2)
5.5.3 Line 4:
If (Surname = ClientSurname) OR
(First three letters of Surname = First three
letters of ClientSurname) (2)
TOTAL SECTION D: 50
QUESTION 6
6.3.2 Proxy server: Server that allows all other computers in the
network to connect to the Internet (1)
6.5 6.5.1 Hot spot: Wireless Access Point that provides Internet connection
for mobile devices (2)
6.6.2 Accept any TWO valid reasons why VPN is security risk
• Any employee can connect to company's server from
anywhere an Internet connection is available.
• Any person (doesn't have to be an employee) can try to
access the server
• Making use of telephone cables EMI and eavesdropping can
become a problem. (2)
6.8 6.8.1 (a) Accept any ONE disadvantage of printing (excluding cost)
• Smaller area to advertise
• Not eco-friendly
• Not always suitable for visually impaired people
Also accept any correct alternative (1)
Example:
The raw numbers of tourists arriving in the country
Information:
Results of queries/data filtered or sorted to answer questions.
Example:
A report on the number of tourists grouped per country of origin
NOTE:
Give ONE mark for a correct example of data/information (3)
6.10.2 Record-locking is required:
• if more than one employee works on the same record some
of the changes done will be lost.
• because if the record is locked only one person is allowed to
work on that specific record. (2)
6.10.3 Both
TOTAL SECTION E: 49
GRAND TOTAL: 180
Copyright reserved