GRADE 12
INFORMATION TECHNOLOGY P2
JUNE THEORY EXAMINATION
2024
MARKS: 150
TIME: 3 HOURS
This question paper consists of 15 pages including the cover page.
Copyright reserved Please turn over
Information Technology/P2 2 June 2024
INSTRUCTIONS AND INFORMATION
1. This question paper consists of SIX sections:
SECTION A: Short Questions (20)
SECTION B: Systems Technologies (25)
SECTION C: Communication and Network Technologies (30)
SECTION D: Data and Information Management (25)
SECTION E: Solution Development (20)
SECTION F: Integrated Scenario (30)
2. Read ALL the questions carefully.
3. Answer ALL the questions.
4. The mark allocation generally gives an indication of the number of facts/reasons
required.
5. Number the answers correctly according to the numbering system used in this
question paper.
6. Write neatly and legibly.
Copyright reserved Please turn over
Information Technology/P2 3 June 2024
SECTION A: SHORT QUESTIONS
QUESTION 1
QUESTION 1.1: MULTIPLE CHOICE QUESTIONS
Various options are provided as possible answers to the following questions. Choose the
most correct answer and write only the letter (A-D) CLEARLY next to the question number
(1.1.1-1.1.5)
Example: 1.1.6 D
1.1.1 A single ‘secret’ key used to encrypt and decrypt sensitive data sent over a network.
A. Public key
B. Private key
C. Secure Socket Layer
D. Primary key (1)
1.1.2 A well formatted spreadsheet that uses the data of a business to model the current
and future performance of a business can be classified as…
A. …a Decision Support System.
B. …Fuzzy logic.
C. …an Expert System.
D. …distributed computing. (1)
1.1.3 Which form of integrity do we have when we ensure that our database server is
protected against practical issues such as power failure, mechanical failure, natural
disasters, etc..
A. Referential
B. Data
C. Logical
D. Physical (1)
1.1.4 Which one of the following data capturing methods is not a form of ‘Invisible’ data
capture.
A. Buying items with your loyalty card.
B. Using e-tags on public transport systems.
C. Scanning an item to check the item’s price.
D. Browsing the internet. (1)
1.1.5 Which of the following terms are used to describe a remotely controlled PC that
form part of a Botnet?
A. Zombie PC
B. Vampire PC
C. Werewolf PC
D. Ghost PC (1)
(5 x 1)
Copyright reserved Please turn over
Information Technology/P2 4 June 2024
QUESTION 1.2: MATCH COLUMN A WITH COLUMN B
For each of the following terms in COLUMN A choose the most appropriate definition in
COLUMN B. Write down only the question number in COLUMN A along with the appropriate
alphabetic letter in COLUMN B.
Example: 1.2.11 Z
COLUMN A COLUMN B
A service that runs on the Internet and is a vast collection of
interlinked, interactive documents stored on computers all
1.2.1 Web 2.0 A
over the world, accessed via the Internet.
The fraudulent practice of sending emails or other messages
claiming to be from reputable companies in order to trick
1.2.2 SEO B
individuals to reveal personal information.
The concept of renting software instead of buying a license to
1.2.3 Phishing C use it forever.
A search built on the idea of the web in which computers will
Proprietary have the ability to interpret metadata on web pages that will
1.2.4 D
software allow them to navigate and filter the web intelligently.
An attempt of people to redirect victims to fake websites
1.2.5 WWW E where they are tricked into disclosing sensitive information.
The next, and current, stage in the evolution of the WWW, is
Semantic
1.2.6 F characterized by more dynamic content.
Search
Users must pay a license fee to be allowed to use the
1.2.7 Pharming G software. No access to the source code is provided.
A license specifically for software that allows people to
distribute software for free or even charge for it as long as the
1.2.8 SaaS H
source code is available.
A strategy or technology to obtain a high-ranking placement
1.2.9 RIA I in the search result page of a search engine such as Google.
A web application that is designed to deliver the functions
GNU /
1.2.10 J and features of a desktop application.
GPL
(10 x 1)
Copyright reserved Please turn over
Information Technology/P2 5 June 2024
QUESTION 1.3: MISSING WORD
For each of the following statements, fill in the missing word or term. Write down only the
question number and the missing word. DO NOT rewrite the whole sentence.
Example: 1.3.6 Fireworks
1.3.1 Blu-ray is considered a type of __________ storage that represents data as a (1)
series of light patterns.
1.3.2 The BUS refers to an electrical path etched on the __________ and used to (1)
transfer data between multiple parts.
1.3.3 Multiprocessing refers to a processing technique where multiple ________ in a (1)
single processing chip are used to process data.
1.3.4 Mixed reality refers to technology whereby the physical aspects of the real world are (1)
combined with __________ aspects.
1.3.5 A __________ file (max 4 kb) used to store customized settings for a website on (1)
your local computer is called a cookie.
(5 x 1)
TOTAL SECTION A: 20
Copyright reserved Please turn over
Information Technology/P2 6 June 2024
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
Look at the advertisement below (From [Link] on 25-07-23) and answer the
questions that follow to the best of your ability.
A B
2.1 If you compare computer A to computer B, you will see that computer A is the
superior computer. This is easily reflected in the price.
2.1.1 Which TWO aspects of the CPU will influence the performance of the
computers? (2)
2.1.2 How much RAM does computer B have? (1)
2.1.3 What is the main purpose of RAM? (1)
2.1.4 Both computers have a 512GB SSD.
List TWO reasons why retailers prefer an SSD over a HDD. (2)
2.1.5 You notice that the screen on Computer A has both ‘1920 x 1200’ and
‘16”’ listed as specifications. Explain what each of these means. (2)
Copyright reserved Please turn over
Information Technology/P2 7 June 2024
2.1.6 Both computers have Windows 11 installed as the operating system.
(a) Define an operating system. (2)
(b) List TWO functions of an operating system. (2)
2.2 Your cousin studied to become a Graphic Designer. After completing his
studies, he unfortunately couldn’t find stable work. Now he has started a small
online store and wants to start working from home. He has come to you for
some advice:
2.2.1 Name THREE essential items that your cousin will need to purchase
for his new SOHO. (3)
2.2.2 Your cousin noticed that Adobe Photoshop mentions recommended
hardware requirements before installing the software.
Explain what is meant by recommended hardware requirements. (2)
2.2.3 What major advantage would the RTX 3060 6Gb have for your cousin? (2)
2.2.4 Your cousin mentions that he always has a lot of programs running on
the PC. He will listen to music, design a logo, and browse social media
while recording his Podcast.
Which CPU will be better suited to handle so many programs and why? (3)
2.2.5 Are the graphic cards on these computers integrated? Motivate your
answer. (2)
2.2.6 Your cousin has decided to take computer B over computer A.
Briefly explain why this was a good decision. (1)
TOTAL SECTION B: 25
Copyright reserved Please turn over
Information Technology/P2 8 June 2024
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
You are the IT manager for a small business, "TechSavvy Solutions," which specialises
in providing tech support and digital solutions for local clients. Your team consists of
several IT specialists, and the office is equipped with workstations, printers, servers, and
various communication devices.
3.1 A network is a vital part of modern businesses.
3.1.1 Define the term 'network'. (2)
3.1.2 List THREE reasons for using networks. (3)
3.1.3 Describe the following four components that are essential for a basic
network.
(a) NIC (1)
(b) Network Operating System (NOS) (1)
(c) Switch (1)
(d) Access Point (1)
3.1.4 Name and discuss ONE disadvantage of having a network. (3)
3.2 The network speed can be determined by the communication media used.
3.2.1 Tabulate and compare UTP and fibre optical cables in terms of the (6)
following aspects:
• Speed
• Bandwidth
• Security
3.2.2 Differentiate between a Personal Area Network (PAN) and Wide Area (4)
Network (WAN) in terms of coverage and usage.
3.3 When working in a network environment, security should be considered.
3.3.1 Explain the importance of logging into a network and connecting to a (2)
server.
3.3.2 Describe how the following TWO methods works to secure data in a
network environment.
(a) Encryption (2)
(b) Multi-layer verification (2)
Copyright reserved Please turn over
Information Technology/P2 9 June 2024
3.4 VoIP is a technology that can be used for communication.
3.4.1 Expand the acronym VoIP. (1)
3.4.2 List ONE requirement for using VoIP. (1)
TOTAL SECTION C: 30
Copyright reserved Please turn over
Information Technology/P2 10 June 2024
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
You are a database manager at a university library. The library uses a relational
database to keep track of books and borrowers. The database helps manage the
borrowing process and ensures that all records are up-to-date and accessible. The
database consists of two primary tables: Books and Borrowers.
Table 1: Books
BookID Title Author Genre
1 Introduction to SQL John Smith Education
2 Advanced Databases Jane Doe Education
3 Database Management Mark Johnson Computer Science
4 Fictional Universe Emily Bronte Fiction
5 Science of Data Albert Einstein Science
Table 2: Borrowers
BorrowerID Name ContactInfo
1001 Alice Brown [Link]@[Link]
1002 Bob White [Link]@[Link]
1003 Carol Green [Link]@[Link]
1004 David Black [Link]@[Link]
4.1 Define the following terms:
4.1.1 Data (1)
4.1.2 Information (1)
4.1.3 Knowledge (1)
4.2 The Books table is used to keep track of the books in the library.
Identify the primary key in the Books table and explain its significance. (2)
4.3 Based on the given tables, describe how you would link the Books and
Borrowers tables to track which books are borrowed by which borrowers. (3)
4.4 Explain why a one-to-one relationship will not be suitable when linking these (2)
two tables.
4.5 Database normalisation can be used to eliminate anomalies in a database.
4.5.1 Describe the process of normalising a database. (3)
4.5.2 Explain how an update anomaly can occur. (2)
Copyright reserved Please turn over
Information Technology/P2 11 June 2024
4.6 Vast amounts of data available make data mining possible.
Describe the processes of data mining and provide a practical example (4)
4.7 Data redundancy refers to the unnecessary repetition of data within a database.
Explain TWO reasons why data redundancy should be minimised. (2)
4.8 There are various people involved with managing and working with a database.
Discuss the role of the following:
4.8.1 Database Administrator (DBA) (2)
4.8.2 Database Programmer (2)
TOTAL SECTION D: 25
Copyright reserved Please turn over
Information Technology/P2 12 June 2024
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
One of the most recent advancements in natural language processing (NLP) is the
emergence of large language models (LLMs) that are built using vast datasets with
enormous amounts of data. – [Link]
AI has even advanced to the point where it can generate programming code and create
complex algorithms in short amounts of time. While in its early stages, human intervention
is still required to solve syntax and especially logic errors.
Answer the following questions:
5.1 Debugging is an essential part of programming.
5.1.1 Differentiate between a syntax error and a logic error. (2)
5.1.2 What would typically cause an error that reads ‘[Doc32 Error] E2019
Incompatible types’? (1)
5.1.3 What would typically cause a stack overflow error? (1)
5.1.4 When working with an array you could receive the error, 'Index out of
bounds'.
What programming error would typically cause this error? (1)
5.1.5 Which Delphi statement or programming structure should be used to
handle errors more professionally? (1)
5.2 One of the most common and accepted programming concepts today is Object
Orientated Programming. (OOP)
5.2.1 Define the term mutator. (1)
5.2.2 List TWO possible reasons why OOP has become the industry standard
in programming. (2)
5.3 A variable bFlag has been declared as a Boolean data type.
Indicate whether the following statements are CORRECT or INCORRECT:
5.3.1 The following two lines of code will result in the same answer:
Line 1: if bFlag then
Line 2: if bFlag = True then (1)
5.3.2 The statement NOT bFlag will always produce 'false' as the result. (1)
Copyright reserved
Information Technology/P2 13 June 2024
5.4 A local hotel makes use of an array to manage room assignments. Each index in the
array represents a room number, so that Array[1] represents Room 1, and the value
of Array[1] represents the occupant.
For example, if Array[3] has a value of ‘John’, it means that John is staying in
Room 3.
Currently, three teams are staying in the motel. Team A, Team B and Team C have
all been assigned rooms. For simplicity, only A, B, or C were used to indicate the
team member. The room assignments are as follows:
Array[1] Array[2] Array[3] Array[4] Array[5] Array[6] Array[7] Array[8]
A C C B A B A C
The teams then requested that the room assignments be changed so that all
members of the Team A are placed next to one another, then all members of Team
B and finally all members of Team C.
Use pseudocode or Delphi code to create an algorithm that will reassign the rooms
correctly. Note that NO marks will be given to any form of hard-coding, and that your
algorithm should work with any initial room assignment, not just the example above. (9)
TOTAL SECTION E: 20
Copyright reserved Please turn over
Information Technology/P2 14 June 2024
SECTION F: INTEGRATED SCENARIO
QUESTION 6
A company uses a website and many different forms of e-communication to interact with
clients.
6.1 The company hosts a website and will use this website to promote the business
and market their services.
Important information regarding the company will appear on the website and
micro blog.
Explain what a micro blog is. (2)
6.2 The company is investigating the possibility of implementing cloud computing
and IoT.
6.2.1 The Internet provides various online storage facilities.
(a) Define the term cloud computing. (2)
(b) Briefly discuss TWO advantages of using cloud storage. (2)
(c) Motivate why the following TWO issues would be important
when choosing a specific online storage facility:
• Speed
• Security (2)
6.2.2 The Internet of Things is one solution for information overloading.
(a) Briefly explain what the Internet of Things is. (2)
(b) What is meant by information overloading? (2)
(c) Give and briefly discuss an example of how IoT can be used in
the company to save electricity consumption. (2)
6.2.3 HTML (hypertext mark-up language) and JavaScript, which is a
scripting language, are often mentioned in terms of web page design.
(a) Why does one need HTML to display web pages? (1)
(b) Why is JavaScript regarded as a scripting language? (1)
Copyright reserved Please turn over
Information Technology/P2 15 June 2024
6.3 A security consultant working at the company warns of security threats that
employee computers will be exposed to when connecting to the internet.
6.3.1 A rootkit was found on the server in the administration office.
(a) What is a rootkit? (1)
(b) Give ONE security implication of the rootkit that installed itself
on the computer. (1)
6.3.2 Social engineering is also a big concern regarding the privacy of
employee data.
Define what social engineering entails. (2)
6.3.3 Describe a denial-of-service attack. (2)
6.3.4 How does antivirus software identify malware? (1)
6.3.5 One of the employees, Charles Cloete, uses the following password:
Charles123.
Give TWO reasons why this example is NOT a strong password. (2)
6.4 The company decided to use a chatbot to deal with enquiries from clients and
to communicate with clients in the chat function on their website.
6.4.1 A chatbot is a form of artificial intelligence (AI).
Define AI. (2)
6.4.2 State ONE advantage of using a chatbot to deal with user enquiries
in this scenario. (1)
6.4.3 Give TWO reasons why it would be more appropriate to use a real
person rather than a chatbot to handle user chats. (2)
TOTAL SECTION F: 30
GRAND TOTAL: 150
Copyright reserved