CAT P2 English Memo PHSG

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

PRELIMINARY EXAMINATION

September 2022

COMPUTER APPLICATIONS TECHNOLOGY


Grade 12
PAPER 2 THEORY MEMORANDUM
TIME: 3 Hours Marks : 150

This memorandum consists of 18 pages

QUESTION 1 QUESTION 2

1.1 C 2.1 N

1.2 C 2.2 J

1.3 B 2.3 K

1.4 D 2.4 M

1.5. C 2.5 A

1.6 D 2.6 O

1.7 D 2.7 P

1.8 C 2.8 C

1.9 B 2.9 S

1.10 D 2.10 D

Total: [10] Total: [10]

Question 3
(1)
3.1 True
(1)
3.2 False, Disk Cleanup
(1)
3.3 False, Bandwidth
(1)
3.4 True
(1)
3.5 False, Ergonomics
[5]
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines

SECTION B

QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 4.1.1 Identify the feature in the advertisement that indicates that it is a
portable computer.
• Size of the monitor/15.6 HD LED Display
• (Built in) Wi-Fi/Bluetooh
• (Built in) Webcam
• Integrated graphics
✓ (Any ONE) 1

4.1.2 The processor in this advertisement has 2x cores. Explain why a


processor with two cores (Dual Core) would have a better
performance than a single core processor.
• When dual core or quad core or any other core is used to describe a
CPU, this tells you how many physical CPUs are on the chip.
• A dual core has two physical CPUs making it possible for the computer
to work more efficiently.
✓ (Any ONE) 1

4.1.3 Briefly explain why the CPU needs cache memory.


• CPU needs cache memory to avoid waiting ✓ for slower
components. ✓ 2

4.1.4 Explain the function of the 'HDMI Output'.


• HDMI carries high quality video ✓ and audio ✓ signals so there is no
need for separate audio cables as with VGA. 2

Page 2 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines

4.1.5 Name TWO differences between a build in Graphics Card and an


external Graphics Card besides anything relating to cost.
• A Dedicated Graphics Card is an external attachment that is
connected to the motherboard, an Integrated Graphics Card is in an
internal attachment that is integrated into the motherboard or the CPU.
• A Dedicated Graphics Card has its own graphics processing unit
(GPU), in an Integrated Graphics Card the graphics systems are built
into the same chip as the CPU.
• A Dedicated Graphics Card has its own RAM, an Integrated Graphics
Card uses the system’s RAM.
• The processing power in a Dedicated Graphics Card is usually higher,
and lower in an Integrated Graphics Card.
• The power consumption in a Dedicated Graphics Card is higher, and
lower in an Integrated Graphics Card.
✓✓ (Any TWO) 2

4.2 4.2.1 What does the abbreviation SSD stand for?


• Solid State Drive ✓ 1

4.2.2 Explain the characteristics of an SSD in terms of:


(a) Silent operation
(b) Faster performance
(a) There are no physical moving parts when writing or reading on an 1
SSD. ✓
(b) There is no time spent to move to the position where the file is
saved/can access it immediately. ✓
OR
Solid state drives operate much faster than traditional hard drives
as they store data electronically and not magnetically. 1

4.2.3 Which one of the storage mediums (SSD/HDD) is best suited for
storage of large quantities of data?
• HDD ✓ 1
4.3 4.3.1 Describe what virtual memory is.
Virtual memory is a portion of hard drive space which acts as memory
(RAM). ✓ 1

Page 3 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
4.3.2 Explain when the operating system will make use of virtual memory?
• Too many applications open.
• The program is too large to run from the available RAM.
✓ (Any ONE) 1
4.4 4.4.1 Besides switching off all computers at night, state TWO other ways
in which the electricity usage of computing devices can be
decreased.
• Decrease brightness settings of the screen.
• Unplug chargers when not in use.
• Change the balance between power consumption and performance.
• Set devices on sleep/hibernate mode.
• Buy energy efficient devices
✓✓ (Any TWO) 2
4.4.2 Explain TWO ways in which the use of computers will be financially
beneficial for the insurance company.
• Greater productivity – time is saved by producing electronic
documents versus type writers/Electronic communication enhance
productivity.
• Information availability – access to current/accurate data/availability of
information on the web.
• Fewer employees – will save on payroll expenses.
• Cost saving – do not have to print everything which saves paper, save
on communication costs.

NOTE: Do not award marks for repetition of the same concept or any
reference to use of Internet.
✓✓ (Any TWO) 2
4.5 Explain how defragmentation is different from making backups.
Defragmentation rearranges parts of files on your harddrive ✓ whereas a
backup copies (complete) files/folders ✓ to a secondary storage medium
for safekeeping. 2

Page 4 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
4.6 Give TWO reasons why it is necessary to have an operating system
installed on a computer by referring to the functions of an operating
system.
• Controls all resources (hardware and software).
• Responsible for the loading of programs and running programs.
• Provides user interface.
• File handling.
• Provide basic security.
✓✓ (Any TWO) 2
4.7 4.7.1 Identify the technology that is referred to in the image.
Drone technology ✓ 1
4.7.2 Give TWO limitations of above-mentioned technology.
• Battery life
• Weather changes
• The use of drones may be limited by air space rules/laws.
• Flight license may be necessary for some models
✓✓ (Any TWO) 2
[25]

Page 5 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 5.1.1 Explain to her why this is not a good idea by stating TWO
disadvantages of using Bluetooth in this environment.

• The speed for transferring data is very slow compared to other


wireless technologies ✓
• The range is limited to a few metres/can loose signal if you move
away from the source ✓
• You can only connect a limited number or devices
• Bluetooth has a lower bandwidth
• May experience some security issues while transferring
• Bluetooth cannot transfer large amounts of data
• Connectivity issues can occur between different versions of
Bluetooth devices, etc.

✓✓ (Any TWO) 2

5.2 5.2.1 Briefly explain what a broadband connection is.

• Broadband refers to a high-speed. ✓ high-bandwidth connection to


the Internet ✓ 2

5.2.2 What will be the result of this to the user AND also explain why the
service provider decided to do this?

• ‘Throttle’ will slow down a user’s internet connection ✓


• A service provider will slow down a user’s internet connection if they
have exceeded their data cap for the specific period/downloaded an
excessive amount of data ✓ 2

5.3 5.3.1 Explain to her what an uncapped data package is.


Uncapped data means that there is no limit on the amount of data that 1
can be used over a specific period of time. ✓

5.3.2 What does it mean if your data connection is ‘shaped’?


‘Shape’ is a technique where certain network (internet) services e.g.
emails, are given preference while others such as social networking
services are given less priority, thus the services are giving priority to 1
more critical activities. ✓

5.4 Define the term ‘Ransomware’.


Malware✓ that encrypts data (making it unavailable)✓ until you pay the
hacker a ransom fee.✓ 3

Page 6 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
5.5 5.5.1 Explain the basic working behind VR.

• A technology that combines multiple inputs and outputs✓, so that


the computer creates a whole new world for you to experience. ✓
2

5.5.2 Describe TWO potential uses for VR, besides entertainment.


• Health care - training
• Automotive - analysing road scenarios and the behaviour of cars.
• Space & Military - these two industries have to operate in rather
dangerous environments that can’t be easily accessed, VR provides
conditions for making things as close to reality as possible for training.
• Tourism - try a holiday before you buy it.
• Flight simulation – training
• Etc.

Note: Accept any correct aanswer, except entertainment

✓✓ (Any TWO) 2

[15]

Page 7 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 6: INTERNET AND NETWORK TECHNOLOGIES

6.1 What is the difference between data and information?


Data is raw and unprocessed stats while information is processed data
2
6.2 Give TWO reasons why it would be better for the researcher to conduct a
survey online instead of using a hardcopy questionnaire.
• Much larger possible audience
• Data will already be electronic/Do not have to retype data
• Better data validation can be done
• Much easier to distribute to/retrieve from respondents
• Do not have to decipher bad handwriting, etc.

✓✓ (Any TWO) 2
6.3 Give TWO ways to produce fewer, but more relevant results with a web
search (in general).

• Use a more precise search phrase or use synonyms.


• Exclude certain words from the search by using Boolean operators.
• Use the search engine operators.
• Specify date ranges, file types, etc.
• Use quotations marks.
• Use more than 1 word but not more than 10 words in a phrase.

✓✓ (Any TWO) 2
6.4.1 Explain what biometric access is.
Biometric Access – fingerprint scanners OR retina scanners OR voice scanners
OR whole-hand scanners are used for access for the user.  OR
Biometric scanning device needed to input the data of the user.  1
6.4.2 Recommend TWO contactless biometric access control systems the
hospital can consider using.
• Face Recognition access device 
• Voice Recognition access device  2
6.5 Explain what plagiarism is.
Passing off someone else's work as your own without their permission
1

[10]

Page 8 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 7: SOCIAL IMPLICATIONS

7.1 User-centered design

A method of computer program design which focuses on the user's specific


needs and requirements. ✓ 1

7.2 Software accessibility input option to help someone with tremors

• Slower mouse speed


• Filter keys
• Voice typing/speech recognition/speech-to-text/'narrator'

✓ (Any ONE) 1

7.3.1 Role of a bot in DDoS attack

(a bot): a computer being controlled by an attacker ✓

(DDos attack): is used to send requests to/flood a (host) website/online


service with unwanted traffic until it is no longer available. ✓ 2

7.3.2 DDos attack used in cyberwarfare

(cyberwarfare): They could use it to attack/take down an enemy's/ another


country's services such as: ✓
• (military/broadcast) communications
• nuclear sites (launch/disable missiles)
• infrastructure (e.g. water, sanitation, power grid)
• transport, etc.

✓✓ (Any ONE) 2 4

7.4.1 Name of technology to use equipment

Augmented reality ✓ 1

7.4.2 Why more useful than video

It adapts to/is applied to the environment/equipment YOU see (not just a


generic example) ✓

(Note to marker: accept any valid explanation that is an advantage of AR, but
NOT also of a training video, also accept a suitable comparison) 1 2

Page 9 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines

7.5 Examples of AI's uses in everyday lives

• Voice assistant apps/apps you can ask for help looking up information:
Alexa, Siri, Google Assistant, Bixby, etc.
• Personalised suggestions in (entertainment) apps like: Spotify, Apple
Music, Netflix, YouTube, etc.
• Financial institutions can identify fraud/calculate credit scoring
• The retail/online shopping sector can offer personalised suggestions
• Personalised healthcare assistants (can act as life coaches)
• Facial recognition in apps can identify people, etc.

✓✓ (Any two)

(Note to marker: accept any example, but not just an app name, it has to be
accompanied by a short description of the AI service it offers) 2

[10]

Page 10 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines

QUESTION 8: SOLUTION DEVELOPMENT

8.1 Reasons for using Save-as

• To save a file in a new directory/folder/location


• To save a file under a new name
• To save it as a different file type/export the file to another file type/change
file type

✓✓ (Any TWO) 2

8.2 Elements that form part of cover pages

• Text boxes
• Shapes (lines/squares etc.)
• Content controls (accept examples e.g. author, title, abstract, date drop-
down list)
• Borders (paragraph/page/object)
• Paragraphs

✓ ✓ ✓ (Any THREE) 3

8.3 Difference between output of <p> and <br> tags

• The <p> tag is used to indicate a new paragraph and creates a space
before and after the paragraph. ✓
• The <br> tag is used to indicate a line break in the current paragraph
without any paragraph spacing. ✓

(Note to marker: accept a drawing of different outputs) 2

8.4 Default value of Volunteer field

Yes/True/On/-1 ✓ (No quotation marks) 1

8.5 Reason for calculation error in 50 – 30 divide by 4

(reason for error):


• The 30 is being divided by 4 before being subtracted
• Order of operations
• Division is done before subtraction
✓ (Any ONE)
(correction):
• Type it this way =(50-30)/4 (Note: don't penalise if = is omitted)
• Put brackets around the subtraction before you divide
✓ (Any ONE) 2

Page 11 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines

8.6.1 How to insert merge fields instantly on all labels

Update labels ✓ 1

8.6.2 Expected output if <<Next Record>> rule was not present

The information on the first label would be repeated on all other labels ✓ 1 2

8.7 Comparison between purpose of validation rule and query criteria

• The purpose of validation rule is to limit possible entries/control what can


be typed in ✓
• Query criteria is used to extract/only display specific records ✓ (accept
lines/people in the place of records)

(Note to marker: second mark has to refer to concept of records, not just
'information' – that could be fields as well and doesn't relate to criteria) 2

8.8 Correct VLOOKUP field error

• Column argument should be 2


• =VLOOKUP(D2,A2:B39,2 ,FALSE)
• =VLOOKUP(D2,A2:B39,2) (Note: don't penalise for any spelling
errors, or cell reference errors, but DO penalise for other syntax errors)

✓ (Any ONE)

(Note: Last argument should not be TRUE since the menu should not allow
you to choose an item that is not on the menu, however, do not penalise) 1

[15]

TOTAL SECTION B: 75

Page 12 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
SECTION C
QUESTION 9 : INTEGRATED SCENARIO

9.1.1 Explain the term 'wearable technology'.


Wearable technologies are electronic mobile devices worn as accessories or part
of clothing, ✓ that continuously generate data from various environments and
communicate with other devices/PC/networks. ✓ 2

9.1.2 State TWO uses of wearable technology.

• Smart watches provide a person with not only the time but notifications of their
calls, messages, emails, social media updates and so on.
• Fitness trackers and sport watches keep track on the number of steps/amount
of time exercised and monitors heart rate. It can calculate and report on how
many calories burnt, etc.

• Smart clothing was developed to monitor such things as heart beats, blood
glucose levels and fitness levels when worn.

• Implantable wearable devices are surgically implanted under the skin and are
usually used for medical reasons like tracking insulin levels, symptoms of
diseases, etc.

• The gaming industry adds more wearables with virtual reality and augmented
reality headsets.
✓ ✓ (Any TWO) 2

9.2 Briefly explain why software and hardware are interdependent.


Hardware is idle without software and software cannot be utilized without
supporting hardware. ✓ Therefore, hardware and software are complementary to
each other. ✓ 2

9.3 What is a dedicated device?


Devices that are designed to perform just one specific task, such as Automatic
Teller Machines (ATMs), GPS devices and household appliances like microwave
ovens and washing machines. ✓ 1

Page 13 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
9.4.1 Describe TWO advantages for using a Graphical User Interface rather than
a Command line system.

• A GUI allows more information to be conveyed to the user using icons,


pictures, text, etc. ✓
• Icons can make it easier for the user to know what a computer is going to
do before it does it. ✓
• Using a mouse is a lot quicker than typing in commands. It allows the
user to carry out much more complex operation in a much easier way.
✓ ✓ (Any Two) 2

9.4.2 What does an entry-level computer mean?


A computer that is cheapest to purchase in its range (e.g. desktop PC) ✓, with
2
fairly low hardware specifications.✓
9.5.1 What is meant by syncing files?
It is a method of keeping files that are stored in several different physical
1
locations or devices up to date. ✓
9.5.2 What is the purpose of syncing files?
It is ensuring that data (files, emails, notes, etc) in one location are the exact
1
replica/copy of data from another location. ✓
9.6.1 What does it mean when a site uses cookies?
A cookie file is saved to your phone/tablet. It stores the website’s name, and also
a unique ID that represents you as a user. ✓ That way if you go back to that
2
website again, the website knows you’ve already been there before. ✓
9.6.2 Do I have to accept cookies? Motivate your answer.
2
No. Websites that use these cookies have to get your permission first.✓✓
9.7.1 Which date will the following function return:
=DATE(YEAR(A1), MONTH(A1)+5,DAY(A1)+7).
22✓ November✓ 2022 2

Page 14 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
9.7.2 Which Excel function will return an automatically updated date?
=TODAY() ✓ 1

9.8.1 Explain what is meant by a Two Factor (two-step) Authentication.


Two‐factor (two‐step) authentication (2FA) is a security process in which users
provide two different authentication factors to verify themselves, usually
something you know (like a password) plus something you have (like a one‐time
password – OTP sent to your phone). ✓
(Note: Accept any answer where the learner explain that a two-step verification
must be done, or if they give examples of a two-step verification) 1

9.8.2 Give TWO advantages of Authentication as safety measurement.

• More secure – helps to prevent unauthorised access to your banking account.


• Malware will not be able to access your data even if your password has been
compromised.
• It can alert you to possible fraud attempt
✓✓ (Any Two) 2

9.9 Blockchain is a new technology used in financial transactions. Explain how


this technology works.
Blockchain is a specific type of database. It differs from a typical database in the
way it stores information; blockchains store data in blocks that are then chained
together. ✓ As new data comes in it is entered into a fresh block. Once the block
is filled with data it is chained onto the previous block, which makes the data
chained together in chronological order. ✓ 2

[25]

Page 15 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
QUESTION 10: INTEGRATED SCENARIO
10.1.1 Name the law used in South Africa to protect personal information. 1
POPI/ POPIA✓
10.1.2 Give TWO examples how personal information can be misused. 2
When someone uses your information to access your device.✓
When information is used for personal gain.

(NOTE to marker any example of abuse/misuse of information may be


accepted)
10.1.3 How can one restrict unauthorised access to a Word document? 1
Using a password✓
10.1.4 Suggest two methods/actions a school can implement to make sure 2
personal information from the schools' database will not be leaked.
Make use of username and passwords, ✓defining access levels to a
network✓ etc
10.2 Give the generally accepted term that describes a process where a 1
single idea or business practice is funded by multiple small donations
from volunteer contributors, usually before the business venture is
started.
Crowd funding✓
10.3.1 Define the term digital currency. 1
Digital currency is a form of virtual currency, it can be exchanged for other
currencies, products and services. ✓
10.3.2 Name ONE example of a digital currency. 1
Bitcoins, Ethereum and Luno.
✓ (Any ONE)
10.3.3 Evaluate the efficiency of using digital currencies. 2
Digital currency has low fees, fast transactions and ease of use✓; however,
they have been mostly used for payment of criminal activities such as
ransomware demands. ✓
(Accept any statement with a one logical advantage and disadvantage)
10.4.1 Explain how you are going to make sure that the website is user friendly.
• Consistent layout on each webpage
• Ease of navigation 2
• Readability
• Suitable colour themes
• Ensure Links are working (etc)
✓✓ (Any TWO)

Page 16 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
10.4.2 How would users in general know that a website is a secure site?
• Checking the lock image near URL
• Checking https in front of URL 1
• Verify digital certificate
• Antivirus programs mark websites as unsafe.
✓ (Any ONE)
10.4.3.1 You used the following HTML coding: 3
<img scr = "info" width = "200" hight = "200">.
The image does not display correctly. Correct the error so that the
image will display correctly.
<img scr = "info" width = "200" hight = "200"> -
src instead of scr✓,
"info.png"✓,
spelling of height ✓
10.4.3.2 Name any other possible reason why an image will not display (except in 1
the coding itself).
If the image is not in the same folder as the text document. ✓
10.5.1 Give a practical example of IoT being used in a smart home.
In a smart home, for example, 1
• Devices are designed to sense and respond to a person's presence.
• When a person arrives home, their car communicates with the garage to
open the door.
• Once inside, the thermostat is already adjusted to their preferred
temperature, and
• The lighting is set to a lower intensity and colour, as their smart watch data
indicates it has been a stressful day.
• Other smart home devices include sprinklers that adjust the amount of
water given to the lawn based on the weather forecast and
• Robotic vacuum cleaners that learn which areas of the home must be
cleaned most often.
✓ (Any ONE)
10.5.2 Compatibility and Privacy are some of the concerns when using IoT. 2
Motivate the above statement.
• Some of the gadgets might not be able to connect to the system due to
hardware being incompatible with the software app (ecosystem) or version
you're using ✓
• Privacy is always a concern since there is a possibility of hackers breaking
into the system. ✓
10.6.1 They want to know if a Primary Key is necessary? Explain the reason 2
for using a Primary Key in an Access table and suggest a suitable field
for a Primary Key.
A field that identifies each record with a unique value. ✓
Examples of fields - ID number/auto number✓

Page 17 of 18
Computer Applications Technology/P2 GDE/Preparatory2022
Marking Guidelines
10.6.2 The Database Administrator created a report and used a function 2
=sum([Name] to display the number of IoT users. It does not work
correctly. Write down the correct function so that it displays correctly.
=COUNT✓ ([Name]) ✓

[25]
TOTAL SECTION C: 50

GRAND TOTAL : 150

Page 18 of 18

You might also like