0% found this document useful (0 votes)
112 views19 pages

Computer Applications Technology P2 May-June 2023 Eng REG

Uploaded by

ravenswaypro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views19 pages

Computer Applications Technology P2 May-June 2023 Eng REG

Uploaded by

ravenswaypro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Machine Translated by Google

SENIOR CERTIFICATE EXAMINATION/


DEGREE JUNE 10 -EXAM

COMPUTER APPLICATION TECHNOLOGY V1

2024

MARKS: 150

TIME: 3 hours

This paper consists of 17 pages.

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 2 DBE/


SS/ NSS

INSTRUCTIONS AND INFORMATION

1. This paper consists of:

SECTION A (25)
SECTION B (75)
SECTION C (50)

2. Answer ALL the questions.

3. Number the answers correctly according to the numbering system used in this paper.

4. Start EACH question on a NEW page.

5. DO NOT write in the right margin of the ANSWER BOOK.

6. Leave a line open after EACH subquestion.

7. One point is usually awarded per fact; A 2 mark question will therefore require TWO facts, etc.

8. Read the questions carefully. DO NOT give more options than the question requires as it will NOT be
marked.

9. All answers MUST relate to Computer Application Technology.

10. Unless otherwise specified, answers such as 'cheaper', 'slower/faster' etc. NOT accepted.

11. DO NOT use brand names in your answers unless specifically required.

12. Write neatly and legibly.

SECTION A

QUESTION 1: MULTIPLE CHOICE QUESTIONS

Several options are given as possible answers to the following questions. Choose the answer and write only
the letter (AD) next to the question numbers (1.1 to 1.10) in the ANSWER BOOK, e.g. 1.11 D.

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 3 DBE/


SS/ NSS

1.1 A router ('Router') is categorized as a ... device.

A storage ('storage')
B supply ('input')
C communication ('communication')
D output ('output') (1)

1.2 … is the unit of measurement used for the speed of an Internet connection.

A KG ('KB')
B Mbps
C GHz
D MHz (1)

1.3 A firewall is used to prevent ... gaining access to a computer.

A approved programs ('approved programs')


B Trojans and worms
C unauthorized programs
D 'wireless fidelity' (Wi-Fi) (1)

1.4 A user entered the following search string into a search engine:

"OS"–windows

This search engine will return a list of websites that refer to….

A the word 'OS', but not the word 'windows'


B both the word 'OS' and the word 'windows'
C the word 'windows', but not the word 'OS'
D neither the word 'windows' nor the word 'OS' (1)

1.5 OKH ('OCR') fails to recognize alphabetic characters in a scanned document because...

A the electronic files are too large.


B a poor quality scanner ('scanner') was used.
C the scanner malfunctioned.
D A Wi-Fi scanner has been used. (1)

1.6 … is a concept that refers to technology that can learn and make decisions.

A Augmented reality
B Internet protocol ('internet protocol')
C Virtual reality ('virtual reality')
D Artificial intelligence ('artificial intelligence') (1)
Copyright reserved Please turn the page
Machine Translated by Google

Computer Application Technology/ P2 4 DBE/


SS/ NSS

1.7 Which ONE of the following spreadsheet functions will identify the number in
the middle of an ordered list?

A MEDIAN
B MID
C AVERAGE
D FASHION (1)

1.8 A type of internet attack ('internet attack') which causes a website to crash by
to flood requests:

A Flousery ('spoofing')
B Denial of service
C Click-jacking
D Social engineering (1)

1.9 … is a disadvantage of having electronic access to people's personal information.

A Copyright infringement
B Limited freedom of expression
C Encrypted ('Encrypted') communication
D Invasion of privacy (1)

1.10 A system utility that can be used to check the performance of a CPU:

A Task Manager
B System Restore
C Disk Management
D Disk Cleanup (1)
[10] QUESTION 2: PASSITEMS

Choose a term/concept from COLUMN B that matches the description in COLUMN A. Write only the letter (A–T)
next to the question numbers (2.1 to 2.10) in the ANSWER BOOK, e.g. 2.11 U.

COLUMN A COLUMN B

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 5 DBE/


SS/ NSS

2.1 Text, numbers and pictures in a A asterisk (*)


format suitable for use by
computers B currency

2.2 Software used to remove C VPN


malicious software ('malware') from
a computer system D hashtag (#)

2.3 A wild card used in database queries E data

F antivirus
A type of printer that uses plastic to print
2.4 G PDF

A file format that can be used to H spyware


2.5 share data between applications
i authority
A word processing option that allows you
2.6 to apply different footers in J 3D
the same document
K service pack ('service pack')

A type of network with a very L information ('information')


2.7 high level of security ('level of
security'), which you can access m laser
over the Internet
A adware ('adware')
The evaluation of information
2.8 that focuses on whether that
information is still relevant
oh next (header/footer)

P WON
An update that fixes a single bug
found in software
2.9 Q ad blocker
A type of program that infects a
computer and tracks the
2.10 R patch
user's Internet activities
S section break

T CSV
(10 x 1) [10] QUESTION 3: TRUE/FALSE ITEMS

Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false' next
to the question numbers (3.1 to 3.5) in the ANSWER BOOK. If the statement is true, write
'TRUE'. If the statement is false, write 'FALSE' and change the underlined word(s) to
make the statement TRUE. (DO NOT only use the word 'NOT' to change the statement.)

NO mark will be awarded if FALSE is written without a correct answer.


Copyright reserved Please turn the page
Machine Translated by Google

Computer Application Technology/ P2 6 DBE/


SS/ NSS

EXAMPLES:

QUESTION ANSWER

The initial loading instructions ('start-up Where


instructions') are stored in the LAG ('ROM').

A NIC ('NIC') has slots for


False, Motherboard
hardware components, such as the CPU ('CPU').

3.1 Back line ('Orphan') is the last line of a paragraph that on its own at the top of a
word processing page appears. (1)

3.2 Testing for objectivity is a method researchers use to detect bias or bias.
(1)

3.3 Absolute cell referencing ('cell referencing') is when the cell references in a spreadsheet formula
change every time the formula is copied to another cell.
(1)

3.4 Phishing occurs when a user goes to a fake website


is sent even if the correct URL for the legitimate website is entered.
(1)

3.5 The NOW function returns both the current date and time in a spreadsheet. (1)
[5]

TOTAL SECTION A: 25 SECTION B

QUESTION 4: SYSTEM TECHNOLOGIES

4.1 Name TWO supply devices used on a point of sale ('point of sale') system
can be used. (2)

4.2 Define the concept convergence ('convergence'). (2)

4.3 Why are USB ports usually used to connect peripheral devices?
(2)

4.4 Name TWO specifications you would consider when buying a monitor. (2)

4.5 Give TWO reasons why your monitor does not display anything, even if both the computer and the
monitor are switched on.

NOTE: Assume the monitor is in perfect working order. (2)

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 7 DBE/


SS/ NSS
4.6 Explain TWO limitations of using web-based applications.
(2)

4.7 You receive an error message about insufficient disk space while installing a particular program.

Suggest TWO ways to solve the problem so you can complete the installation.
(2)

4.8 Why would you distribute educational resources on an optical disc, rather than
over the Internet? (1)

4.9 NFC ('NFC') can be used to transfer photos from one device to another, by holding them
close to each other, without using the internet or any cables.

4.9.1 Give ONE disadvantage of using NPC in this situation. (1)

4.9.2 Give TWO uses of NVK, apart from transferring photos. (2)

4.10 Give TWO software technologies to help physically disabled users, who cannot use their hands, to
work on a computer. (2)

4.11 What application would a network administrator use to have all the computers in a
computer center shut down at the same time at a given time in the afternoon? (1)

4.12 Name TWO risks associated with using flawed software


in connection with. (2)

4.13 Give TWO benefits of using the 'Snipping Tool' to create a


screenshot, rather than using the 'Print Screen' option. (2)
[25]

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 8 DBE/ 2023


SS/ NSS

QUESTION

5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Define the concept of grid computing. (2)

5.2 Name ONE communication technology that uses light to transmit data. (1)

5.3 Many people and organizations use video conferencing for meetings or events,
e.g. Zoom, Skype or Google Meet.

5.3.1 Suggest TWO good practices that an organizer can implement to


manage a video conference. (2)

5.3.2 Explain TWO disadvantages of video conferencing. (2)

5.4 Give TWO reasons why users cannot access a file on a network.
(2)

5.5 People in your household share the internet connection in your home.

Gives TWO ways to prevent problems like buffering and lags while using the internet, without the need
to close applications or limit the number of users.
(2)

5.6 Give TWO reasons why instant messaging is commonly used.


(2)

5.7 An Internet Service Provider (IDV/'ISP') offers the following Internet connectivity options:

ACCOUNT OPTIONS
SERVICE OPTION 1 OPTION 2
Connection type Fiber ('Fibre') 30 Fiber ('Fibre') 30
Speed 'meg' 'meg'
… Yes no
Shaped ('Shaped') Yes no
… Yes no
Price R299.00 R599.00

Complete the table above by giving the TWO aspects of the service offered by the IDV
while taking into account the price of each option. (2)
[15] 6: INFORMATION MANAGEMENT

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 9 DBE/ 2023


SS/ NSS

QUESTION

6.1 Give TWO aspects that you should include in a task definition for a research project,
such as the PAT. (2)

6.2 In the PAT you are expected to develop questions at different levels.

6.2.1 The table below gives examples of how the four levels of questions can start. The purpose of a
level 3 question appears in the table.

QUESTIONS BEGINNING WITH ... LEVEL PURPOSE OF QUESTION


Who, What, When, Where, 1 (a) …
How much

Why, How 2 (b) …


If/If, What if 3 (c) Adjust, change or
predict (d)
Would it be better than… 4 …
How can I determine...
What would be the best way…

Complete the table by giving the purpose of the following:

(a) A Level 1 question


(b) A Level 2 question
(c) A Level 4 question (3)

6.2.2 Give ONE reason for using questions at different levels when doing
research. (1)

6.3 Explain how you can avoid being guilty of plagiarism when doing research. (2)

6.4 Study the survey below and discuss TWO reasons why this survey is NOT useful.

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 10 DBE/ 2023


SS/ NSS

QUESTION

(2)
[10] 7: SOCIAL IMPLICATIONS

7.1 Give TWO ways to reduce the possible negative impact of ICTs on the
environment. (2)

7.2 Explain TWO dangers of sharing your location online. (2)

7.3 What can you do to prevent fake news from being spread?
when you use social media? (1)

7.4 Discuss TWO consequences for the victims of identity theft.


(2)

7.5 Why is a screen lock pattern ('screen lock pattern') used on a computer
device generally considered less secure than a strong password? (1)

7.6 Give TWO recommendations to prevent ransomware attacks.


(2)
[10]

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 11 DBE/ 2023


SS/ NSS

QUESTION

8: SOLUTION DEVELOPMENT

8.1 Consider the screenshot of a word processing document below.

8.1.1 What is the purpose of using a ruler bar when working in a word
processing document? (2)

8.1.2 What type of text alignment has been applied to the paragraph above AND what
is the benefit of aligning text this way?
(2)

8.1.3 Give ONE way to see the address to which in the hyperlink
('hyperlink') referred to in the paragraph above. (1)

8.2 Study the screenshot of a spreadsheet below.

8.2.1 What spreadsheet property would you use to insert the list of months
complete column A without having to type it? (1)

8.2.2 Give TWO ways to format the number values in columns B to D more meaningfully.
(2)

8.2.3 Why are the values (not the formatting) in the cell range?

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 12 DBE/ 2023


SS/ NSS

QUESTION

D3:D9 NOT correct? (1)

8.2.4 Name ONE function to determine the total of the values in column
B, C and D. (1)

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 13 DBE/ 2023


SS/ NSS

8.3 Study the screenshot of a database table in Design View below.

8.3.1 Why would an input mask ('input mask') on the Worker_ID field
be useful? (1)

8.3.2 Suggest THREE improvements to the validation rule so that it will only
accept ages between 15 and 65 (both 15 and 65 inclusive) in the
Age field. (3)

8.3.3 Give ONE reason, other than the validation rule, why the current
design of the Age field might cause errors. (1)
[15]

TOTAL SECTION B: 75 SECTION C

QUESTION 9: INTEGRATED SCENARIO

Your school would like to organize a Youth Day event. CAT learners will use their ICT
knowledge to assist the organizing committee.

9.1 A local business donated a fully working computer to use for the event. Study the specifications of
this computer.

COMPUTER SPECIFICATIONS

Windows 7
1 GHz Celeron
120 GG ('GB') HDD
1 GG ETG ('GB RAM')
14" LCD ('LCD') monitor

9.1.1 Give TWO reasons why the latest Windows operating system
Copyright reserved Please turn the page
Machine Translated by Google

Computer Application Technology/ P2 14 DBE/ 2023


SS/ NSS

('operating system') cannot be installed on this computer.


(2)

9.1.2 Suggest an operating system that can be installed on this computer, instead of
proprietary software such as Windows.
(1)

9.1.3 Give ONE reason why it would not be advisable to do this


computer upgrade. (1)

9.2 Details of the event were posted on social media.

Give TWO benefits of using social media platforms to communicate with the public.
(2)

9.3 An invitation with a shortened ('shortened') URL was sent to the guests by e-mail so that they could register to attend
the event.

9.3.1 The URL [Link]/AgwzA1 was sent by email.

Give TWO reasons why the guests might mistrust this shortened URL.
(2)

9.3.2 Give THREE advantages of using online forms instead of pen and paper based
forms to register for the event.
(3)

9.4 The data from the online forms is stored in a spreadsheet.

9.4.1 Which mail merge option ('mail merge option') will you use for name cards
to only selected guests saved in the spreadsheet.
(1)

9.4.2 Name a spreadsheet function that can be used to determine a winner of a lucky
draw. (1)

9.5 Your school is considering providing free internet to the public during the event.

9.5.1 Give TWO possible reasons why your school should NOT offer free
internet access. (2)

9.5.2 Suggest TWO precautions you can take when using free Internet access.
(2)

9.6 Your school has received several donations through crowdfunding.

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 15 DBE/ 2023


SS/ NSS

9.6.1 Explain the concept of crowdfunding. (2)

9.6.2 Name ONE crowdfunding platform. (1)

9.6.3 Name TWO spreadsheet properties (not functions) that can be used to display the top
determining ten amounts received through
crowdfunding. (2)

9.7 A former student donated half a Bitcoin to the school for the occasion.

9.7.1 What form of currency does Bitcoin belong to? (1)

9.7.2 Give TWO benefits of making donations in Bitcoin. (2)


[25] QUESTION 10: INTEGRATED SCENARIO

The school would like to promote a healthy lifestyle. They host a walking and jogging club open to
the whole community.

10.1 The school uses e-mail communication to invite the community to participate in the club activities and
also to keep them informed of activities.

10.1.1 What email address will the club secretary use to send a
send email to many people at once? (1)

10.1.2 How can the club secretary make sure that parents do not see each other's email addresses
when sending an email to many people at
once? (1)

10.1.3 Parents complain that emails go directly to their spam folder.

Give ONE way parents can ensure future emails don't go to their
spam directory. (1)

10.1.4 The club secretary attempted to send out a video via email.
An error message warned the club secretary that the video attachment
was too large.

Suggest TWO ways the secretary could share the video electronically.
DO NOT refer to storage media. (2)

10.2 The club offers lockers with biometric locks for members to store their valuables in while
jogging or walking.

10.2.1 Explain the concept of biometric security. (2)

10.2.2 Give TWO disadvantages of using biometric locks. (2)

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 16 DBE/ 2023


SS/ NSS

10.3 The club's secretary has drawn up the following database table to record the details of
to save the members:

FIELD NAMES DESCRIPTION (OPTIONAL)


Surname Surname of the member/Lid's surname First
FirstName name of the member/Lid's first name Cellphone number
CellNumber of the member/Lid's mobile phone number Date of
birth/Gebortedatum ?
DOB
ChronicConditions

10.3.1 What database property should be on a new or existing field


applied to uniquely identify each record? (1)

10.3.2 Suggest a data type, along with a motivation, for the


ChronicConditions field, other than 'Yes/No'. (2)

10.4 The chairman of the club suggested that it would be more effective to create a website that would give
information about the club's activities and events.

10.4.1 Give TWO user-centered design guidelines


('UCD/user-centred design guidelines') that a designer must use to create a website.

(2)

10.4.2 The club's website must display the following table:

The HTML code for the table is as follows:

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 17 DBE/ 2023


SS/ NSS

<table border="1">
<tr>
<td rowspan=2>Distance</td>
</tr>
<tr>
<td>1</td>
<td>Marathon</td>
</tr>
<td>2</td>
<td>Half Marathon</td>
</table>

Suggest TWO improvements to the HTML code so that the table will display correctly.
(2)

10.5 The club uses a drone for various activities.

10.5.1 What technology enables a drone to create a map ('map') of the


route the runners will use? (1)

10.5.2 Give TWO advantages of equipping a drone with a camera to follow


the joggers or walkers. (2)

10.5.3 The drone pilot notices that there is not enough space on the SD card of the camera after filming the first
race.

How can this problem be solved without moving data or replacing


the SD card? (1)

Copyright reserved Please turn the page


Machine Translated by Google

Computer Application Technology/ P2 18 DBE/ 2023


SS/ NSS

10.6 What category of user will a computer with sophisticated hardware


want to use to edit videos? (1)

10.7 The club members can train in the gym on equipment connected to AR (adjusted
reality/'augmented reality') technology.

10.7.1 Give the definition of AR technology. (3)

10.7.2 Give ONE example of where AR can be used. (1)


[25]

TOTAL SECTION C: 50 GRAND TOTAL: 150

Copyright reserved
Machine Translated by Google

Computer Application Technology/ P2 19 DBE/ 2023


SS/ NSS

Copyright reserved

You might also like