Professional Documents
Culture Documents
CAT P2 English Memo PHSG
CAT P2 English Memo PHSG
CAT P2 English Memo PHSG
September 2022
QUESTION 1 QUESTION 2
1.1 C 2.1 N
1.2 C 2.2 J
1.3 B 2.3 K
1.4 D 2.4 M
1.5. C 2.5 A
1.6 D 2.6 O
1.7 D 2.7 P
1.8 C 2.8 C
1.9 B 2.9 S
1.10 D 2.10 D
Question 3
(1)
3.1 True
(1)
3.2 False, Disk Cleanup
(1)
3.3 False, Bandwidth
(1)
3.4 True
(1)
3.5 False, Ergonomics
[5]
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
SECTION B
4.1 4.1.1 Identify the feature in the advertisement that indicates that it is a
portable computer.
• Size of the monitor/15.6 HD LED Display
• (Built in) Wi-Fi/Bluetooh
• (Built in) Webcam
• Integrated graphics
✓ (Any ONE) 1
Page 2 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
4.2.3 Which one of the storage mediums (SSD/HDD) is best suited for
storage of large quantities of data?
• HDD ✓ 1
4.3 4.3.1 Describe what virtual memory is.
Virtual memory is a portion of hard drive space which acts as memory
(RAM). ✓ 1
Page 3 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
4.3.2 Explain when the operating system will make use of virtual memory?
• Too many applications open.
• The program is too large to run from the available RAM.
✓ (Any ONE) 1
4.4 4.4.1 Besides switching off all computers at night, state TWO other ways
in which the electricity usage of computing devices can be
decreased.
• Decrease brightness settings of the screen.
• Unplug chargers when not in use.
• Change the balance between power consumption and performance.
• Set devices on sleep/hibernate mode.
• Buy energy efficient devices
✓✓ (Any TWO) 2
4.4.2 Explain TWO ways in which the use of computers will be financially
beneficial for the insurance company.
• Greater productivity – time is saved by producing electronic
documents versus type writers/Electronic communication enhance
productivity.
• Information availability – access to current/accurate data/availability of
information on the web.
• Fewer employees – will save on payroll expenses.
• Cost saving – do not have to print everything which saves paper, save
on communication costs.
NOTE: Do not award marks for repetition of the same concept or any
reference to use of Internet.
✓✓ (Any TWO) 2
4.5 Explain how defragmentation is different from making backups.
Defragmentation rearranges parts of files on your harddrive ✓ whereas a
backup copies (complete) files/folders ✓ to a secondary storage medium
for safekeeping. 2
Page 4 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
4.6 Give TWO reasons why it is necessary to have an operating system
installed on a computer by referring to the functions of an operating
system.
• Controls all resources (hardware and software).
• Responsible for the loading of programs and running programs.
• Provides user interface.
• File handling.
• Provide basic security.
✓✓ (Any TWO) 2
4.7 4.7.1 Identify the technology that is referred to in the image.
Drone technology ✓ 1
4.7.2 Give TWO limitations of above-mentioned technology.
• Battery life
• Weather changes
• The use of drones may be limited by air space rules/laws.
• Flight license may be necessary for some models
✓✓ (Any TWO) 2
[25]
Page 5 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES
5.1 5.1.1 Explain to her why this is not a good idea by stating TWO
disadvantages of using Bluetooth in this environment.
✓✓ (Any TWO) 2
5.2.2 What will be the result of this to the user AND also explain why the
service provider decided to do this?
Page 6 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
5.5 5.5.1 Explain the basic working behind VR.
✓✓ (Any TWO) 2
[15]
Page 7 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 6: INTERNET AND NETWORK TECHNOLOGIES
✓✓ (Any TWO) 2
6.3 Give TWO ways to produce fewer, but more relevant results with a web
search (in general).
✓✓ (Any TWO) 2
6.4.1 Explain what biometric access is.
Biometric Access – fingerprint scanners OR retina scanners OR voice scanners
OR whole-hand scanners are used for access for the user. OR
Biometric scanning device needed to input the data of the user. 1
6.4.2 Recommend TWO contactless biometric access control systems the
hospital can consider using.
• Face Recognition access device
• Voice Recognition access device 2
6.5 Explain what plagiarism is.
Passing off someone else's work as your own without their permission
1
[10]
Page 8 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 7: SOCIAL IMPLICATIONS
✓ (Any ONE) 1
✓✓ (Any ONE) 2 4
Augmented reality ✓ 1
(Note to marker: accept any valid explanation that is an advantage of AR, but
NOT also of a training video, also accept a suitable comparison) 1 2
Page 9 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
• Voice assistant apps/apps you can ask for help looking up information:
Alexa, Siri, Google Assistant, Bixby, etc.
• Personalised suggestions in (entertainment) apps like: Spotify, Apple
Music, Netflix, YouTube, etc.
• Financial institutions can identify fraud/calculate credit scoring
• The retail/online shopping sector can offer personalised suggestions
• Personalised healthcare assistants (can act as life coaches)
• Facial recognition in apps can identify people, etc.
✓✓ (Any two)
(Note to marker: accept any example, but not just an app name, it has to be
accompanied by a short description of the AI service it offers) 2
[10]
Page 10 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
✓✓ (Any TWO) 2
• Text boxes
• Shapes (lines/squares etc.)
• Content controls (accept examples e.g. author, title, abstract, date drop-
down list)
• Borders (paragraph/page/object)
• Paragraphs
✓ ✓ ✓ (Any THREE) 3
• The <p> tag is used to indicate a new paragraph and creates a space
before and after the paragraph. ✓
• The <br> tag is used to indicate a line break in the current paragraph
without any paragraph spacing. ✓
Page 11 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
Update labels ✓ 1
The information on the first label would be repeated on all other labels ✓ 1 2
(Note to marker: second mark has to refer to concept of records, not just
'information' – that could be fields as well and doesn't relate to criteria) 2
✓ (Any ONE)
(Note: Last argument should not be TRUE since the menu should not allow
you to choose an item that is not on the menu, however, do not penalise) 1
[15]
TOTAL SECTION B: 75
Page 12 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
SECTION C
QUESTION 9 : INTEGRATED SCENARIO
• Smart watches provide a person with not only the time but notifications of their
calls, messages, emails, social media updates and so on.
• Fitness trackers and sport watches keep track on the number of steps/amount
of time exercised and monitors heart rate. It can calculate and report on how
many calories burnt, etc.
• Smart clothing was developed to monitor such things as heart beats, blood
glucose levels and fitness levels when worn.
• Implantable wearable devices are surgically implanted under the skin and are
usually used for medical reasons like tracking insulin levels, symptoms of
diseases, etc.
• The gaming industry adds more wearables with virtual reality and augmented
reality headsets.
✓ ✓ (Any TWO) 2
Page 13 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
9.4.1 Describe TWO advantages for using a Graphical User Interface rather than
a Command line system.
Page 14 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
9.7.2 Which Excel function will return an automatically updated date?
=TODAY() ✓ 1
[25]
Page 15 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 10: INTEGRATED SCENARIO
10.1.1 Name the law used in South Africa to protect personal information. 1
POPI/ POPIA✓
10.1.2 Give TWO examples how personal information can be misused. 2
When someone uses your information to access your device.✓
When information is used for personal gain.
Page 16 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
10.4.2 How would users in general know that a website is a secure site?
• Checking the lock image near URL
• Checking https in front of URL 1
• Verify digital certificate
• Antivirus programs mark websites as unsafe.
✓ (Any ONE)
10.4.3.1 You used the following HTML coding: 3
<img scr = "info" width = "200" hight = "200">.
The image does not display correctly. Correct the error so that the
image will display correctly.
<img scr = "info" width = "200" hight = "200"> -
src instead of scr✓,
"info.png"✓,
spelling of height ✓
10.4.3.2 Name any other possible reason why an image will not display (except in 1
the coding itself).
If the image is not in the same folder as the text document. ✓
10.5.1 Give a practical example of IoT being used in a smart home.
In a smart home, for example, 1
• Devices are designed to sense and respond to a person's presence.
• When a person arrives home, their car communicates with the garage to
open the door.
• Once inside, the thermostat is already adjusted to their preferred
temperature, and
• The lighting is set to a lower intensity and colour, as their smart watch data
indicates it has been a stressful day.
• Other smart home devices include sprinklers that adjust the amount of
water given to the lawn based on the weather forecast and
• Robotic vacuum cleaners that learn which areas of the home must be
cleaned most often.
✓ (Any ONE)
10.5.2 Compatibility and Privacy are some of the concerns when using IoT. 2
Motivate the above statement.
• Some of the gadgets might not be able to connect to the system due to
hardware being incompatible with the software app (ecosystem) or version
you're using ✓
• Privacy is always a concern since there is a possibility of hackers breaking
into the system. ✓
10.6.1 They want to know if a Primary Key is necessary? Explain the reason 2
for using a Primary Key in an Access table and suggest a suitable field
for a Primary Key.
A field that identifies each record with a unique value. ✓
Examples of fields - ID number/auto number✓
Page 17 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
10.6.2 The Database Administrator created a report and used a function 2
=sum([Name] to display the number of IoT users. It does not work
correctly. Write down the correct function so that it displays correctly.
=COUNT✓ ([Name]) ✓
[25]
TOTAL SECTION C: 50
Page 18 of 18