Computer Applications Technology P2 May-June 2023 Eng REG
Computer Applications Technology P2 May-June 2023 Eng REG
2024
MARKS: 150
TIME: 3 hours
SECTION A (25)
SECTION B (75)
SECTION C (50)
3. Number the answers correctly according to the numbering system used in this paper.
7. One point is usually awarded per fact; A 2 mark question will therefore require TWO facts, etc.
8. Read the questions carefully. DO NOT give more options than the question requires as it will NOT be
marked.
10. Unless otherwise specified, answers such as 'cheaper', 'slower/faster' etc. NOT accepted.
11. DO NOT use brand names in your answers unless specifically required.
SECTION A
Several options are given as possible answers to the following questions. Choose the answer and write only
the letter (AD) next to the question numbers (1.1 to 1.10) in the ANSWER BOOK, e.g. 1.11 D.
A storage ('storage')
B supply ('input')
C communication ('communication')
D output ('output') (1)
1.2 … is the unit of measurement used for the speed of an Internet connection.
A KG ('KB')
B Mbps
C GHz
D MHz (1)
1.4 A user entered the following search string into a search engine:
"OS"–windows
This search engine will return a list of websites that refer to….
1.5 OKH ('OCR') fails to recognize alphabetic characters in a scanned document because...
1.6 … is a concept that refers to technology that can learn and make decisions.
A Augmented reality
B Internet protocol ('internet protocol')
C Virtual reality ('virtual reality')
D Artificial intelligence ('artificial intelligence') (1)
Copyright reserved Please turn the page
Machine Translated by Google
1.7 Which ONE of the following spreadsheet functions will identify the number in
the middle of an ordered list?
A MEDIAN
B MID
C AVERAGE
D FASHION (1)
1.8 A type of internet attack ('internet attack') which causes a website to crash by
to flood requests:
A Flousery ('spoofing')
B Denial of service
C Click-jacking
D Social engineering (1)
A Copyright infringement
B Limited freedom of expression
C Encrypted ('Encrypted') communication
D Invasion of privacy (1)
1.10 A system utility that can be used to check the performance of a CPU:
A Task Manager
B System Restore
C Disk Management
D Disk Cleanup (1)
[10] QUESTION 2: PASSITEMS
Choose a term/concept from COLUMN B that matches the description in COLUMN A. Write only the letter (A–T)
next to the question numbers (2.1 to 2.10) in the ANSWER BOOK, e.g. 2.11 U.
COLUMN A COLUMN B
F antivirus
A type of printer that uses plastic to print
2.4 G PDF
P WON
An update that fixes a single bug
found in software
2.9 Q ad blocker
A type of program that infects a
computer and tracks the
2.10 R patch
user's Internet activities
S section break
T CSV
(10 x 1) [10] QUESTION 3: TRUE/FALSE ITEMS
Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false' next
to the question numbers (3.1 to 3.5) in the ANSWER BOOK. If the statement is true, write
'TRUE'. If the statement is false, write 'FALSE' and change the underlined word(s) to
make the statement TRUE. (DO NOT only use the word 'NOT' to change the statement.)
EXAMPLES:
QUESTION ANSWER
3.1 Back line ('Orphan') is the last line of a paragraph that on its own at the top of a
word processing page appears. (1)
3.2 Testing for objectivity is a method researchers use to detect bias or bias.
(1)
3.3 Absolute cell referencing ('cell referencing') is when the cell references in a spreadsheet formula
change every time the formula is copied to another cell.
(1)
3.5 The NOW function returns both the current date and time in a spreadsheet. (1)
[5]
4.1 Name TWO supply devices used on a point of sale ('point of sale') system
can be used. (2)
4.3 Why are USB ports usually used to connect peripheral devices?
(2)
4.4 Name TWO specifications you would consider when buying a monitor. (2)
4.5 Give TWO reasons why your monitor does not display anything, even if both the computer and the
monitor are switched on.
4.7 You receive an error message about insufficient disk space while installing a particular program.
Suggest TWO ways to solve the problem so you can complete the installation.
(2)
4.8 Why would you distribute educational resources on an optical disc, rather than
over the Internet? (1)
4.9 NFC ('NFC') can be used to transfer photos from one device to another, by holding them
close to each other, without using the internet or any cables.
4.9.2 Give TWO uses of NVK, apart from transferring photos. (2)
4.10 Give TWO software technologies to help physically disabled users, who cannot use their hands, to
work on a computer. (2)
4.11 What application would a network administrator use to have all the computers in a
computer center shut down at the same time at a given time in the afternoon? (1)
QUESTION
5.2 Name ONE communication technology that uses light to transmit data. (1)
5.3 Many people and organizations use video conferencing for meetings or events,
e.g. Zoom, Skype or Google Meet.
5.4 Give TWO reasons why users cannot access a file on a network.
(2)
5.5 People in your household share the internet connection in your home.
Gives TWO ways to prevent problems like buffering and lags while using the internet, without the need
to close applications or limit the number of users.
(2)
5.7 An Internet Service Provider (IDV/'ISP') offers the following Internet connectivity options:
ACCOUNT OPTIONS
SERVICE OPTION 1 OPTION 2
Connection type Fiber ('Fibre') 30 Fiber ('Fibre') 30
Speed 'meg' 'meg'
… Yes no
Shaped ('Shaped') Yes no
… Yes no
Price R299.00 R599.00
Complete the table above by giving the TWO aspects of the service offered by the IDV
while taking into account the price of each option. (2)
[15] 6: INFORMATION MANAGEMENT
QUESTION
6.1 Give TWO aspects that you should include in a task definition for a research project,
such as the PAT. (2)
6.2 In the PAT you are expected to develop questions at different levels.
6.2.1 The table below gives examples of how the four levels of questions can start. The purpose of a
level 3 question appears in the table.
6.2.2 Give ONE reason for using questions at different levels when doing
research. (1)
6.3 Explain how you can avoid being guilty of plagiarism when doing research. (2)
6.4 Study the survey below and discuss TWO reasons why this survey is NOT useful.
QUESTION
(2)
[10] 7: SOCIAL IMPLICATIONS
7.1 Give TWO ways to reduce the possible negative impact of ICTs on the
environment. (2)
7.3 What can you do to prevent fake news from being spread?
when you use social media? (1)
7.5 Why is a screen lock pattern ('screen lock pattern') used on a computer
device generally considered less secure than a strong password? (1)
QUESTION
8: SOLUTION DEVELOPMENT
8.1.1 What is the purpose of using a ruler bar when working in a word
processing document? (2)
8.1.2 What type of text alignment has been applied to the paragraph above AND what
is the benefit of aligning text this way?
(2)
8.1.3 Give ONE way to see the address to which in the hyperlink
('hyperlink') referred to in the paragraph above. (1)
8.2.1 What spreadsheet property would you use to insert the list of months
complete column A without having to type it? (1)
8.2.2 Give TWO ways to format the number values in columns B to D more meaningfully.
(2)
8.2.3 Why are the values (not the formatting) in the cell range?
QUESTION
8.2.4 Name ONE function to determine the total of the values in column
B, C and D. (1)
8.3.1 Why would an input mask ('input mask') on the Worker_ID field
be useful? (1)
8.3.2 Suggest THREE improvements to the validation rule so that it will only
accept ages between 15 and 65 (both 15 and 65 inclusive) in the
Age field. (3)
8.3.3 Give ONE reason, other than the validation rule, why the current
design of the Age field might cause errors. (1)
[15]
Your school would like to organize a Youth Day event. CAT learners will use their ICT
knowledge to assist the organizing committee.
9.1 A local business donated a fully working computer to use for the event. Study the specifications of
this computer.
COMPUTER SPECIFICATIONS
Windows 7
1 GHz Celeron
120 GG ('GB') HDD
1 GG ETG ('GB RAM')
14" LCD ('LCD') monitor
9.1.1 Give TWO reasons why the latest Windows operating system
Copyright reserved Please turn the page
Machine Translated by Google
9.1.2 Suggest an operating system that can be installed on this computer, instead of
proprietary software such as Windows.
(1)
Give TWO benefits of using social media platforms to communicate with the public.
(2)
9.3 An invitation with a shortened ('shortened') URL was sent to the guests by e-mail so that they could register to attend
the event.
Give TWO reasons why the guests might mistrust this shortened URL.
(2)
9.3.2 Give THREE advantages of using online forms instead of pen and paper based
forms to register for the event.
(3)
9.4.1 Which mail merge option ('mail merge option') will you use for name cards
to only selected guests saved in the spreadsheet.
(1)
9.4.2 Name a spreadsheet function that can be used to determine a winner of a lucky
draw. (1)
9.5 Your school is considering providing free internet to the public during the event.
9.5.1 Give TWO possible reasons why your school should NOT offer free
internet access. (2)
9.5.2 Suggest TWO precautions you can take when using free Internet access.
(2)
9.6.3 Name TWO spreadsheet properties (not functions) that can be used to display the top
determining ten amounts received through
crowdfunding. (2)
9.7 A former student donated half a Bitcoin to the school for the occasion.
The school would like to promote a healthy lifestyle. They host a walking and jogging club open to
the whole community.
10.1 The school uses e-mail communication to invite the community to participate in the club activities and
also to keep them informed of activities.
10.1.1 What email address will the club secretary use to send a
send email to many people at once? (1)
10.1.2 How can the club secretary make sure that parents do not see each other's email addresses
when sending an email to many people at
once? (1)
Give ONE way parents can ensure future emails don't go to their
spam directory. (1)
10.1.4 The club secretary attempted to send out a video via email.
An error message warned the club secretary that the video attachment
was too large.
Suggest TWO ways the secretary could share the video electronically.
DO NOT refer to storage media. (2)
10.2 The club offers lockers with biometric locks for members to store their valuables in while
jogging or walking.
10.3 The club's secretary has drawn up the following database table to record the details of
to save the members:
10.4 The chairman of the club suggested that it would be more effective to create a website that would give
information about the club's activities and events.
(2)
<table border="1">
<tr>
<td rowspan=2>Distance</td>
</tr>
<tr>
<td>1</td>
<td>Marathon</td>
</tr>
<td>2</td>
<td>Half Marathon</td>
</table>
Suggest TWO improvements to the HTML code so that the table will display correctly.
(2)
10.5.3 The drone pilot notices that there is not enough space on the SD card of the camera after filming the first
race.
10.7 The club members can train in the gym on equipment connected to AR (adjusted
reality/'augmented reality') technology.
Copyright reserved
Machine Translated by Google
Copyright reserved