IT March 2016 Paper 2
IT March 2016 Paper 2
IT March 2016 Paper 2
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
FEBRUARY/MARCH 2016
MARKS: 150
TIME: 3 hours
5. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
1.1 Give ONE word/term for each of the following descriptions. Write only the
word/term next to the question number (1.1.1–1.1.10) in the ANSWER BOOK.
1.1.5 A protocol used for the transfer of large files between computers by
means of an Internet connection (1)
1.1.10 The key field in a database table that links to the primary key in
another database table in order to create a relationship between the
two tables (1)
1.2 Various options are provided as possible answers to the following questions.
Choose the answer and write only the letter (A–D) next to the question
number (1.2.1–1.2.5) in the ANSWER BOOK, for example 1.2.6 E.
1.2.1 The concept of packaging data and procedures into a single object
to prevent access from outside the object is called …
A an object code.
B encapsulation.
C an object program.
D a control structure. (1)
A Integration
B Systems
C Unit
D Acceptance (1)
A zombie.
B virus hoax.
C trojan horse.
D denial-of-service attack.
1.2.5 Determine the number of times the instructions inside the nested
loop below will be executed:
A 10
B 20
C 12
D 9 (1)
TOTAL SECTION A: 15
Copyright reserved Please turn over
Information Technology/P2 5 DBE/Feb.–Mar. 2016
NSC
SCENARIO
At the end of each year your school updates the stock registers for all departments.
The IT learners have been asked to help with the stocktaking process.
QUESTION 2
The laptop computer used by the Mathematics department for stocktaking purposes
has the following technical specifications and software installed:
2.1 Explain why each of the following components is essential for the functioning
of any computer:
Give a reason why DVD drives are no longer included in modern devices. (1)
2.7 What effect would the use of a separate graphics processor have on the
functioning of the laptop computer? (1)
2.8.1 How will a flash disk communicate that it requires the attention of the
operating system? (1)
2.10 ScanDisk, that checks the hard drive for errors, is an example of utility
software on a computer.
2.10.2 Give an example of utility software that rearranges the files on a disk
for faster retrieval. (1)
2.11 Many applications use complex graphics that require a large amount of RAM
storage when executed.
Explain how virtual memory is used to allow large applications to be executed. (3)
TOTAL SECTION B: 24
QUESTION 3
The school has set up a network for all classrooms and computer centres in the
building. There is a computer in each classroom and each computer centre has
40 computers linked in a network.
Administration building
Server
Wireless access
point
Building with Building with
classrooms classrooms
3.1 Motivate the setup of the network by answering the following questions:
3.1.4 The following Internet protocol (IP) address has been assigned to
one of the computers in Computer Centre A:
(b) Why should another computer on the same network (LAN) not
be assigned the same IP address? (1)
3.2 The server in the administration building is connected to an ADSL Internet line
with a 2 Mbps connection speed. The data package used by the school can
either be capped or uncapped.
3.3 A wireless access point has been installed in the middle of the school grounds
(see diagram on previous page) to enable the computers in the classrooms to
share the Internet connection with the administration building.
3.3.1 Explain a possible problem with sharing the Internet access. (2)
3.4 Stock data is available online to the learners who are helping with the
stocktaking process.
3.4.1 State TWO advantages of storing data online rather than locally on a
hard drive. (2)
3.4.2 Which technique is used to ensure that all the devices have access
to the most up-to-date information when stored data is shared
between devices? (1)
3.5 With Internet access available on the school grounds, learners are using
e-mail facilities, downloading educational material and attending online
lessons. All these services use specific protocols.
3.5.3 VoIP is also used when lessons are presented over the Internet.
3.6 The table below shows some network vulnerabilities and ways/techniques to
solve or prevent these problems.
COLUMN A: COLUMN B:
NETWORK VULNERABILITY SOLUTION/PREVENTION
3.6.1 Trojan applications that install A locking up server rooms
themselves on the system
B antivirus software
3.6.2 Hacking into the system from
outside the network C encryption
TOTAL SECTION C: 25
QUESTION 4
A central database has been created for the school to record the stock items of each
department during the stocktaking process.
4.1 The following tables have been designed for the database:
tblDepartment
tblStockItems
Key FieldName
1 Key FieldName
DepartmentID ItemID
DepName ItemName
DepContactName ItemQuantity
DepExtensionNum ∞ ItemCost
DepartmentID
NOTE:
• The ItemQuantity field refers to the number of items for each item
indicated in the ItemName field.
• The ItemCost field refers to the cost of a single item.
4.1.1 Suggest a suitable data type for the ItemCost field. (1)
4.1.2 Use the data in the tables (on the previous page) and give an
example that explains the one-to-many relationship that exists
between the tblDepartment and the tblStockItems tables. (2)
(c) Display the department name and the total stock value for
each department in a new field called TotalValue. (6)
4.1.4 An incomplete SQL statement that displays a list of all the laptop
computers and the number of laptop computers is given below.
Write only the missing code at (a) to complete the statement. (2)
4.2 Due to the number of people who need access, the database has been
moved from a stand-alone desktop to a server. DBMS software was installed
on the server to handle access to the database.
4.2.2 Name TWO actions that the DBMS software allows the user to
perform on the data in the database. (2)
4.3 Larger businesses will use a database distributed over several servers.
4.3.1 Give TWO reasons why it might not be feasible to have a larger
number of users accessing a single database on a single server. (2)
4.3.2 Name TWO models that can be used for data synchronisation in a
distributed database. (2)
TOTAL SECTION D: 27
QUESTION 5
The IT learners are writing programs to assist with the stocktaking process.
5.1 A two-dimensional array called arrStock has been used to record the
quantities of the four items for the four departments, as shown in the table
below.
NOTE: The array contains only the values shown in the table below.
Write pseudocode to calculate the total stock per item and store these values
in the array. (5)
5.2 Various errors can occur while coding and executing a program.
5.2.1 The three common types of errors are syntax, logical and runtime
errors.
Identify the type of error for each process in the table below.
Write down only the correct answer next to the question numbers
(5.2.1(a)–5.2.1(c)).
TYPE
ERROR
OF ERROR
MESSAGE
ERROR
(a) No semicolon entered at the end of an Missing
instruction semicolon
(b) The stock value is calculated incorrectly as No error
stockValue = quantity – itemPrice message
(c) A variable is created as an integer data
type to store the number of items. When
the program runs, the user enters the word
'seventeen' instead of the number 17 in Data-type
the GUI component. mismatch (3)
5.3 Each line of the text file called StockDetails.txt is used to store the room
number, the description of the items and the quantity of the stock item issued
to the room.
The format of the data in each line of the text file is as follows:
101;Laptop#5
102;Whiteboard#1
101;Whiteboard#1
102;Tablet#25
104;Tablet#20
:
The number of tablets and the room numbers where the tablets are
used must be stored in two parallel arrays.
Complete the algorithm to read the text file and populate the arrays
with the room numbers and the stock quantity of tablets issued to
those room numbers.
NOTE: Do NOT rewrite the first three statements of the algorithm. (6)
5.3.2 Although the text file was created and the filename was spelt
correctly, when trying to access the file from another program the
following message was displayed:
5.4 The following pseudocode was given to develop a program that must
generate four numeric values:
arrNumbers is declared as an array that can store the four numeric values as
integer values.
j 1
Loop from first position of array to last position of
array
k square(j)
arrNumbers[loop counter] number of values + k
if j modulus 2 = 0 then
arrNumbers[loop counter] round(arrNumbers[loop
counter - 1]/3)
j j + 1
Redraw and complete the trace table below to determine the four numeric
values in the arrNumbers array if number of values has a value of 4.
TOTAL SECTION E: 25
QUESTION 6
The learners who are helping with stocktaking are using their own mobile devices to
record data and to communicate with each other and the administrators.
6.1 Surveillance cameras and other mechanisms have been installed in the
school buildings as part of the security process to monitor all the stock.
6.1.1 Name TWO security techniques that the school could implement to
provide access control to the server room. (2)
6.1.2 The Mpeg 4 compression standard used for the recorded security
videos uses lossy compression.
6.1.3 The administrators used an audit trail to keep track of the stock
throughout the year.
6.2 Encryption is used when data about stock values are communicated over the
Internet.
Briefly explain the difference between the public key and private key
in this security standard. (3)
6.3 The school principal wants to be able to access security video footage after
school hours from his home. School staff members and security personnel
from outside the school also need access to this material.
6.3.1 Suggest TWO different techniques that will make secure access to
the server containing the security video footage possible. (2)
6.4 Learners spend a lot of time using their mobile devices to do stocktaking.
Suggest TWO ways in which the learners can extend the battery life of their
mobile devices while they are using these devices. (2)
6.5 Some of the stock items have been fitted with RFID tags.
6.6 Bluetooth technology is used to transfer the data from the mobile devices to
the data server.
6.7 The database administrator has decided to rent a server from a cloud-based
service in which to store the stock database.
6.7.3 State TWO benefits for the school if they were to outsource the data
server. (2)
TOTAL SECTION F: 34
GRAND TOTAL: 150
Copyright reserved