Information Technology P2 May-June 2022 MG Eng
Information Technology P2 May-June 2022 MG Eng
Information Technology P2 May-June 2022 MG Eng
INFORMATION TECHNOLOGY P2
2022
MARKING GUIDELINES
MARKS: 150
QUESTION 1
1.1.4 C - extremely high volumes of traffic that request data from the (1)
website.
TOTAL SECTION A: 15
QUESTION 2
2.1.3 Any ONE type of storage device used to increase storage space:
SD card / memory card (1)
2.1.4 Why would device C would be the most suitable device to scan QR codes:
Mobility/portability
Access to camera/ front and rear facing camera/built in camera (2)
2.3.2 Any TWO other types of caching that is used on a computer system:
Web caching
Disk caching (2)
CONCEPTS:
Malware disguised as useful/legitimate software
Activated by action from the user (installing/downloading) (2)
TOTAL SECTION B: 25
QUESTION 3
3.2.2(a) IP address:
A unique address/code that identifies a device on a network. (1)
OR
OR
3.4.2 (b) The CA verifies that the business or organisation is valid. (1)
TOTAL SECTION C: 25
QUESTION 4
4.5 Why should name and surname be split into two fields:
There is more than one piece of information in the field
OR
Any indication that it might be necessary to separately work with the name
and surname values (1)
4.6 4.6.1 Data redundancy refers to the unnecessary repetition of data (1)
4.7.2 How can step 3 & 4 in the data progression diagram be applied:
4.7.3 Fuzzy logic deals with reasoning that works with probabilities.
4.9.1 (b) Physical integrity - ensuring that data is protected against damage
from power surges, natural disasters, theft, etc. (1)
4.9.2 Any TWO ways to ensure the date is entered in the correct
format:
Provide a list/component to select from/date picker/calendar
Specify format in input component/ghost text
Format/Data type check/applying a validation rule
Input mask (2)
TOTAL SECTION D: 25
5.2.2 Any ONE reason why names and ages cannot be stored in array
provided:
An array can only store values of one specific data type
Names and ages are represented by two different data types
The provided array can only store integer values (1)
Notes:
Values may be placed in the same line as long as progression of
algorithm is clear.
Mark with fault by penalising for the faulty value in that column only. (5)
TOTAL SECTION E: 20
Copyright reserved Please turn over
Information Technology/P2 10 DBE/2022
SC/NSC – Marking Guidelines
QUESTION 6
CONCEPTS:
Studying/observing current processes/trends
Creating a set of rules
Creating an optimal process (3)
(b) Any ONE reason why active tags will be needed for satellite
tracking:
The signal needs to be transmitted over longer distances
Stronger signal needed to communicate with satellite
Signal needs to be transmitted continuously (1)
6.3.2 Any ONE reason for installing fibre rather than mobile LTE:
Fixed location internet has a lower cost per GB than mobile LTE
Fibre might have faster connection speeds depending on the
speed of the package
Using a lot of data
6.3.4 Will the 70GB Night Surfer Data hold a benefit for the company:
Yes, backup/update procedures can be done overnight
OR any other applicable motivation
OR
6.5 6.5.1 Any TWO ways that AI can be used when working with big data:
Find possible connections among datasets
Recognize knowledge using natural language processing
Can be used to automate and accelerate data preparation tasks
Can learn common human error patterns
Detect and resolve potential flaws in information
Can learn by watching how the user interacts with an analytics
program
Can identify data types
It can alert users to anomalies or unexpected patterns in data
Identify potential threats from system logs or social networking
data
6.5.2 With the duplication model, each separate site has a complete copy
of the entire database stored.
With the partitioning model, each site stores and manages only the
part of the database it works with. (2)
6.6 6.6.1 Virtualisation is the use of software to create an entity that only
exist for as long as the software is being run. (2)
Yes, the user must pay for the operating system to avoid
committing piracy (2)
6.7.3 (a) How can Quantum computing can be used in the statistical process of
preventing the spread of a virus:
(b) Any TWO problems of cloud computing which are solved using Edge
computing:
Bypasses the latency caused by cloud computing.
Acts as mini data centres which cloud computing lacks.
Used to process time-sensitive data in remote locations with limited
or no connectivity to a centralised location. (2)
TOTAL SECTION F: 40
GRAND TOTAL: 150
Copyright reserved