IT March 2014 Paper 2
IT March 2014 Paper 2
IT March 2014 Paper 2
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
FEBRUARY/MARCH 2014
MARKS: 180
TIME: 3 hours
5. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
Various options are given as possible answers to the following questions. Choose the
answer and write only the letter (A–D) next to the question number (1.1–1.10) in the
ANSWER BOOK.
1.1 A malicious program that resides on your computer and propagates via
network and Internet connections is known as …
A adware.
B a spider.
C a worm.
D a key logger. (1)
A NTFS
B SMTP
C TCP/IP
D IRC (1)
A the value of B is smaller than 4 and smaller than 12, for example 3.
B a negative value has been assigned to B.
C the value of B is greater than 12.
D both conditions will never be true at the same time. (1)
1.4 Which of the following is the domain part of the e-mail address
[email protected]?
A co.za
B user1
C mybusiness
D [email protected] (1)
1.6 Which loop structure would be best suited to find the information of a
customer in the database of a big company with more than 100 000 records?
A Single loop
B Unconditional loop
C Conditional loop
D Infinite loop (1)
A Notepad
B Adobe Reader 8
C Structured Query Language (SQL)
D Scandisk (1)
1.10 Which of the tasks numbered (i), (ii) and (iii) is/are the responsibility of a
network administrator?
A Only (i)
B Only (ii)
C (i) and (ii)
D (ii) and (iii) (1)
TOTAL SECTION A: 10
SCENARIO
Schools will take part in a variety of athletics meetings arranged to take place in some of
the major cities around the country as part of a national competition.
QUESTION 2
The organisers in each major city need to set up computer systems to be able to
manage and process the vast amount of data that will be obtained from the registration
of the athletes as well as the results for each event. Volunteers from the local
communities and schools offered their assistance.
CPU
• CU
• Cache
• Registers North bridge RAM
• ALU
• FPU
2.1.1 The volunteer observes that the CPU contains registers. Briefly
explain the function of registers. (2)
2.1.3 The basic process of how a CPU operates consists of four stages,
namely fetch, decode, execute and store. Briefly describe what
takes place during the DECODE stage. (2)
2.1.4 What is the physical connection between the CPU and the north
bridge called? (1)
2.1.5 Different slots, such as AGP and PCI Express, are found on a
motherboard.
(c) Someone told the volunteer that the PCI Express slots are
on-board and not hot-pluggable.
(a) State TWO major differences between RAM and ROM. (2)
2.2 Large quantities of data related to all the athletes need to be saved on hard
drives (HDD).
2.2.1 Which ONE disk controller, EIDE or SATA, will you recommend for
connecting high-performance hard drives? (1)
2.2.2 Explain TWO aspects that influence the access time of an HDD. (2)
2.2.3 Disk caching will improve performance in terms of the storage and
retrieval of data. Explain what disk caching is. (2)
2.4.3 Some of the organisers complained that some websites show less
content when displayed on the smartphones, compared to
displaying them on regular PCs.
2.5 Data stored about the athletes must be protected against loss or damage.
Although backups will be made regularly, data can still be lost due to
unexpected power failures.
2.5.1 Suggest how the loss of data due to unexpected power failures can
be prevented. (2)
2.5.2 Give TWO reasons, other than power failures, for the loss of or
damage to data. For each reason, suggest a measure that can be
adopted to prevent the loss or damage of data. (4)
2.5.3 Give TWO reasons why the local hard drive of a PC will not be
suitable for backup purposes. (2)
2.6 The centres in each city that will host athletic events have a set of computers
connected in a LAN, using a switch.
2.7 The organisers created a help desk to support the volunteers at the different
centres. The following conversation took place between one of the volunteers
and the help desk:
2.7.2 Apart from protecting a computer against viruses, state TWO other
forms or useful protection that antivirus software normally offers. (2)
TOTAL SECTION B: 50
QUESTION 3: e-COMMUNICATION
The organisers requested that an online website portal be developed where athletes
can view their results and maintain their personal details.
3.2 One of the organiser's computers is sending spam e-mails to all the athletes
without his permission.
3.2.2 What can be done to stop a computer from sending spam? (1)
3.2.3 Suggest TWO ways in which the receipt of spam can be limited. (2)
3.3 The organisers want to ensure that athletes' details are kept secure when
they sign into their profiles on the website. This can be done by using
encryption.
4.1 The entrepreneur designed and manufactured T-shirts and sweaters which he
advertised on his website.
4.1.1 What is the term used for conducting transactions, such as buying
and selling products, on the Internet? (1)
4.2 The entrepreneur uses Google to find young athletes in South Africa to help
promote his products. He obtains the following results:
4.2.1 Why will the search phrase used in this example produce different
results when used in another search engine? (1)
4.2.2 Recommend a way that will improve the search results for the
information he requires. (1)
4.3 The entrepreneur would like to make his business as environmentally friendly
as possible.
4.3.2 He recently bought the latest computer equipment for his business.
What would you recommend the entrepreneur does with his
outdated computer equipment? (1)
[10]
TOTAL SECTION C: 24
The data on athletes is managed using custom software designed for the athletics
meetings and is stored in a database. A separate GUI is developed for user access.
5.1 The tblAthletes table below is currently used to store athletes' details and
event results.
5.1.1 Which field in this table is the most suitable primary key? (1)
5.1.2 Identify TWO fields in the table with poorly chosen data types and
recommend more appropriate data types. Write down only the
name of the field and the suggested data type. (2)
5.1.3 How will they ensure that the date of birth will always be entered in
the format DD/MM/YYYY? (1)
5.1.4 What measure can be taken to ensure that the field containing the
athlete's name will never be left blank? (1)
(a) Explain why the current design of the database table is not
suitable to capture the events in which the athletes would like
to participate and the results. (2)
(b) Describe the best way in which the design of the database can
be changed so as to be able to capture all possible
events/results for an athlete participating in more than one
event. (3)
5.2 User and technical documentation was provided with the software that is used
to manage athlete information.
(b) Name TWO other topics, apart from the programming code,
that should be included in the technical documentation. (2)
5.3.2 During a test of the software that was developed, the program
stopped working with the following error message:
5.4 The interface below is used to capture information of athletes. Study the
diagram and answer the questions that follow.
Enter information
Name:
DOB:
Address:
Gender:
Submit details
5.5.2 The following algorithm has been designed to find and display the
results of a specific athlete but it contains a few logical errors:
Line
1 Input the name of the athlete
2 found false
3 assign the index of first element in the array to the counter
4 Repeat while not found
5 If input name equals the name in the array at the
position indicated by the counter
6 found true
7 Increase counter by one
8 found false
9 End repeat loop
10 If found
11 Display name and result
Use the test data that follows and the names 'John' and 'Dave' as
input data to test the algorithm.
Test data:
5.5.3 After the software has been developed with no logical errors, users
complain that names they enter cannot be found, although the
names appear in the array.
(a) What could be the reason why a name in the array cannot be
located? (1)
5.6 The programmer who created the application software used object-orientated
programming (OOP) principles. Study the class diagram below and answer
the questions that follow.
ATHLETE
- Name
Attributes
- Address
- DateOfBirth
+ Gender
+ Club
+ Constructor()
+ Constructor(Name, Address, DateOfBirth)
- getName():string
Methods
- getAddress():string
+ setAddress(Address)
+ IsValidDateOfBirth(DateOfBirth):boolean
+ toString():string
5.6.2 Explain why the class shown in the diagram violates the principle of
data encapsulation. (1)
5.6.4 Two constructors are included in the class diagram. This is known
as overloading.
IsValidDateOfBirth(day,month,year)
5.7 The following data structures can be used to store and manipulate data in a
program:
• A two-dimensional array
• An array of type string
• A string
• An array of objects
In each of the following cases, decide which ONE of the above will be the
best to use:
TOTAL SECTION D: 47
QUESTION 6
Six client computers and one server computer to be networked were installed at the
head office. An administrative office has been set up in each city where athletics
meetings will take place to collate and send results to the head office.
6.1 The organisers have been offered either an ADSL or a 3G Internet connection
to connect the various administrative offices to the head office in order to
create a VPN.
6.1.2 State TWO possible problems that could occur when using a 3G
connection. (2)
6.2 The organisers looked at the performance of one the computers in the newly
installed network using the Windows Task Manager.
3%
679 MB
6.2.2 The organisers are concerned about the high number of threads.
Explain what a thread is in computing terms. (2)
6.2.5 The screenshot of the task manager was taken during normal
operation of the computer. Why does this computer not necessarily
need a faster CPU? (1)
6.3 Not all the athletes can afford a personal trainer. The organisers decided on
using an expert system using artificial intelligence that can be of help to train
these young athletes.
6.4 Each athlete competing in the half-marathon event will receive an RFID tag.
6.4.2 State TWO advantages of using RFID tags from the event
manager's perspective. (2)
6.4.3 Marshals on duty at strategic points along the road agreed to use
their smartphones as a means of communicating with fellow
marshals along the road during the event.
(a) Explain why Wi-Fi will NOT be a suitable connection type. (1)
6.5 One of the organisers stumbled upon information on a social media website
indicating that a specific athlete used a banned substance.
6.5.1 Give an example of a social media website that could have been
used to publish this information about the athlete. (1)
6.5.2 Is the organiser allowed to act upon this information? Motivate your
answer. (2)
6.5.3 It was established that the profile does not belong to the athlete
implicated. What kind of computer crime was committed against
the athlete in this case? (1)
6.6 The organisers are hosting a website with information about the different
athletics meetings. It has been suggested that the website should contain
hyperlinks.
6.6.3 Websites are normally accessed using a web browser and a URL.
Explain what a URL is and give an example of a URL as part of
your answer. (2)
6.7 Fingerprint readers are used to let authorised organisers enter the
administration office.
6.7.2 Name TWO other examples of this type of technology that could
also be used. (2)
6.8 The network at the head office uses the client-server model.
6.9 The Ethernet network communication standard is used at the head office.
6.9.4 What is the name of the organisation that evaluates and approves
network standards? (1)
TOTAL SECTION E: 49
GRAND TOTAL: 180
Copyright reserved