Study Opportunities
November 2019
COMPUTER APPLICATIONS TECHNOLOGY
Grade 11
Paper 2 – Written
MEMORANDUM
TIME: 3 HOURS MARKS: 150
This memorandum consists of 14 pages (cover page included)
Question 1 Question 2
1.1 A
1.2 D
1.3 D
1.4 B
1.5 B
1.6 C F FTP
1.7 D
1.8 B
1.9 C
1.10 A [10]
2.1
2.2 L CAPTCHA
2.3 J LTE
2.4 A CSV
2.5 M SSD
2.6 C Braille
2.7 P ISO
2.8 Q ATM
2.9 I Typography
2.10 N SMALL [10]
Question 3
[ Note: Accept correct answers even if ‘False’ is not stated ]
3.1 False — router (1)
3.2 False — RSS (1)
3.3 False — Wiki (1)
3.4 True (1)
3.5 False — ROM (1)
[5]
General guideline
For some questions there may well be other answers that are correct, but that are not listed in the
memo. Please check / google, and use own discretion.
Question 4: System Technologies
4.1.1 Type of printer
Multi-function/Multi-purpose/4-in-1 (1)
Page 2 of 15
4.1.2 Meaning of ‘35 ppm’
The printer can print 35 pages per minute
(Don’t accept just ‘speed’) (1)
4.1.3 Benefit of NFC specification
Allows a (NFC-enabled) device to be brought in close proximity to the printer
in order to send a file to print (without having to print using the computer). (2)
4.1.4 How connected to a wired network
USB port / Ethernet port (1)
4.2 Factors effecting performance of any computer
Any THREE of:
Memory / RAM
Storage
CPU / Processor
Graphics / video card (3)
4.3 Examples of metadata stored with jpeg photo, except file size, type and name
Any TWO of:
Camera make/model
Dimensions (in pixels)
Date picture was taken
GPS location
Digital zoom
ISO speed
Contrast
Brightness, etc.
(Exclude items such as the file size, type and name.) (2)
4.4.1 Advantages of using sensors to gather data, besides speed
Any TWO of:
Data can be captured without human intervention
Data can be captured in dangerous/remote environments
Data is instantly available (to be acted upon e.g. Internet of Things)
Data is potentially captured more accurately, etc.
(Exclude the speed at which they can gather data.) (2)
4.4.2 Uses of an accelerometer on a smartphone
Any TWO examples of:
Change in movement / acceleration of smartphone (e.g. in gaming apps such as
cricket, golf and car racing)
Number of steps you take (e.g. in fitness apps)
Bump detection (e.g. in robotics and safety)
Detecting the ‘tilt’ or orientation of the smartphone (landscape/portrait), etc. (2)
Page 3 of 15
4.5.1 General role of any server
To provide resources to other computers/clients connected to the network (1)
4.5.2 What biometric security is in context of access to server room
Using a unique human/physical characteristic for identification e.g. fingerprints (1)
Page 4 of 15
4.6 Advantages of linking a POS system to a stock database
Any TWO of:
Stock levels can be tracked in real-time
Low stock levels can be ordered automatically / More efficient/accurate than manual
stocktaking
Can change the price of items in one place
Can easily conduct analysis of sales patterns/trends etc.
(Exclude answers relating to efficiency of input) (2)
4.7.1 Difference between Office 2019 and Office 365 in terms of the way you pay for them
Office 2019 is purchased (up-front/‘once-off’) while with Office 365 you pay on a
subscription (monthly/annual) basis (2)
4.7.2 Advantages of Office 365 over Office 2019
Any TWO of:
Generally cheaper (pay monthly not ‘up front’)
Free/automatic upgrades to software
Access to all apps (need full version of Office 2019 for this)
Can install on a few (5) devices (2)
4.8 Reasons for keeping software updated
Any TWO of:
Fix bugs / Can cause software to run more stably/efficiently
Add additional features
Ensure security / Plug loopholes for malware, etc. (2)
4.9 Why a custom installation
If you are an experienced user and know which components to install / Disk space an
issue, etc. (1)
[25]
Question 5: Network and Internet Technologies
5.1 Indications computer disconnected from a LAN
Any TWO of:
Can no longer access (logical / network / non-local) drives
No longer have access to printers/computers connected to the LAN
No indication of network activity on NIC
System tray shows network disconnected (red cross)
Internet services no longer available (e.g. browser won’t connect to website), etc. (2)
Page 5 of 15
5.2 Broad aims of spyware
Any TWO of:
To gather confidential information (e.g. passwords)
To monitor surfing habits
To create security loopholes (for other malware), etc.
(Exclude specific answers in terms of how spyware works) (2)
5.3 What a ‘.mobi’ site is
A ‘mobi’ version of a website is one designed to be viewed on a mobile device (with a text-
only display or a low resolution screen)
Why ‘.mobi’ sites no longer needed
They are generally no longer needed because smartphones enable normal web pages to
be displayed / Websites are ‘responsive’ (i.e. change the size of content to fit size of
screen) (2)
5.4 Functions of a firewall
Controls which programs can access the internet
Protects a computer against unauthorised access from the internet / Acts as a barrier
against malware (2)
5.5 What spam is
Spam is electronic ‘junk mail’ / unsolicited email
Why emails end up in spam/junk folder
Any ONE way of:
The sender’s (IP) address may be identified as a distributor of spam (‘blacklisted’)
Something in the subject line is causing the email to be identified as spam
Your email filters might be too strictly or incorrectly set, etc. (2)
5.6 What case sensitive is
Lowercase and uppercase version of letters are regarded as being different / It matters
whether you use lowercase or uppercase letters in the password (1)
5.7 Ways to ensure that a website is easy to navigate
Any THREE of:
Links (menus / navigation bar) should be easy to find
Menu links should appear in a consistant position on the pages
Links should be consistent in appearance
Link should be short
Link text should be easy to understand
Cursor should change shape on links
There should be no ‘broken’ links (that do not work)
Have ‘home button’ or ‘return to top of page’ button on long pages, etc. (3)
5.8 Most likely reason for poor video/audio quality during video conferencing
Slow internet connection (1)
Page 6 of 15
[15]
Question 6: Information Management
6.1.1 Why a good idea to use ‘Header row’ option when sorting
Selecting the ‘Header row’ would include the top row, which generally contains the
column headings, in the sort process. (It would be easier for the user to select a
meaningful name indicating the contents of the column, rather than a non-descriptive
‘Column 1’, ‘Column 2’, etc.) (1)
6.1.2 Why radio buttons, rather than check boxes
It must only be possible to select one of the options (not both – which is what check boxes
would imply) (1)
6.2.1 Why supply email address in survey
To provide feedback on the results/findings of the survey (1)
6.2.2 Ethical to pass email addresses to a business?
Motivation for ‘No’: The business might use the addresses to send e.g. spam, or ‘leak’ the
addresses to other parties – the respondent would lose control over who they allowed to
have their addresses, which might well end up on criminals’ phishing lists, etc.
(Accept an argument that they never gave their email addresses with the intention of
redistribution / trusted that it would be used only for the intended/stated purpose.)
Motivation for ‘Yes’: It would only be ethical if the respondents (expressly) gave their
permission for their email addresses to be distributed
(Do not accept an unmotivated Yes/No) (1)
6.2.3 Why not meaningful to simply count male and female respondents
More males than females (or vice versa) may have answered the survey
This would be made more meaningful if expressed as e.g. a percentage of the
male/female respondents surveyed that indicated that they practise green computing
(e.g. 60% of males indicated ‘Y’, while 80% of females indicated ‘Y’) (2)
6.3.1 Advantage of using filters in Access table
Any ONE advantage of:
Very quick to apply directly (to tables)
Several predefined filters (e.g. ‘last week’) are available
No need for knowledge of queries (easier to use), etc. (1)
6.3.2 Disadvantage of using filters in Access table
Any ONE disadvantage of:
Filters cannot be saved for future use
Filters are limited in complexity compared to queries (1)
Page 7 of 15
6.4 How to improve the layout
Give instructions/guidelines in terms of the data format to be used (e.g. yyyymmdd) /
Add faint (‘light grey’) letters (e.g. ‘Y’, ‘M’, ‘D’) in each cell to provide this information (1)
6.5 Why sometimes good to save a file in a previous version of software before
sharing
To prevent compatibility issues
(In case the recipient has a ‘lower’ (older) version of the software, saving it in the older
version will ensure that the recipient will be able to open the file.) (1)
[10]
Question 7: Social Implications
7.1.1 What social engineering is
Social engineering is any attempt to con/’fool’ a user
into releasing confidential information (or to impersonate someone in order to gain
some form of ‘privileged access’ in general – such as impersonating a policeman to
gain entry to a house) (2)
7.1.2 What pharming does
Pharming redirects a user to a fake/replica/different site
Why even more dangerous than phishing
even when the user types in the correct URL in the browser (they do not have to
even click on a link – as they must do if they are to be the victim of e.g. a phishing
attack). (2)
7.2.1 What is outsourcing?
Outsourcing means a company can contract (some of their) business functions out to
other individuals/companies (1)
7.2.2 Benefits of outsourcing to a company
Any TWO benefits of:
Greater access to skilled workers (around the world)
Can work across time zones (24/7)
Potentially greater efficiency (allows a company to focus on their core functions,
and not have to manage other issues)
Skilled labour may cost less in other countries
(Do not accept just ‘cost saving’, without a motivation/explanation of how this is
related to outsourcing)
Saving on office space and other infrastructure, etc. (2)
Page 8 of 15
7.3 Broad categories of ethical issues that should be in school’s AUP
Any TWO of:
Any issues regarding respecting privacy/confidentiality
Any issu\es regarding netiquette
Not abusing resources such as bandwidth
Not attempting to bypass security settings, etc. (2)
7.4 Why better to add email address in the Bcc field when forwarding to many
Any ONE reason of:
So that the message will not be seen as spam
So that you do not disclose people’s email addresses to many other people (1)
[10]
Question 8: Solution Development
8.1 How to change vertical spacing of text on a single-page Word document, without
Enter key, changing the text or the font in any way
Any TWO ways of:
Change line spacing
Change paragraph spacing (before/after)
Change top/bottom margins
Change the vertical alignment of the page (top, center, bottom)
(Exclude use of the Enter key, or changing the font in any way) (2)
8.2 Extract of spreadsheet
A B C D E F
1 20%
Tickets Tickets Value of
2 Name Grade Reward
Issued Sold Donations
3 Brits, K 8 15 15 R100.00 R20.00
4 Buitendag, B 11 20 9 R54.00 R0.00
5 Lamont, ZA 9 15 15 R200.00 R40.00
6 Monama , MN 10 15 14 R84.00 R0.00
7 Waker, P 12 20 20 R80.00 R16.00
8 Van Staden, B 8 15 7 R42.00 R0.00
9 Nanavat, PR 8 15 15 R90.00 R18.00
10 Marshall, J 12 20 15 R90.00 R0.00
11 Abrahams, A 11 20 11 R66.00 R0.00
8.2.1 Cell formatting used in cells C2:E2
Text wrapping / Wrap Text (1)
Page 9 of 15
8.2.2 What the function =SUMIF(B3:B11,"<>12",D3:D11) will return:
The total number (SUM)
of tickets sold (D3:D11)
by all learners excluding the Grade 12s (i.e. by Grades 8, 9, 10 and 11) (3)
8.2.3 Function that determines cash reward: =IF(C3>D3,0,E3*$E$1)
How decided
The learners receive a reward only if they sold all the tickets issued to them
How calculated
The reward is calculated as 20% (the percentage in cell E1)
of the (value of the) donations raised by the learner (3)
8.3.1 Type of data source for a mail merge, besides a spreadsheet
Any ONE type of data source of:
Database table/query
Table in a word processing document (1)
8.3.2 Step after creating main document, selecting recipients (before completing
merge)
Insertion of merge fields (1)
8.4 Insert a chart from an existing spreadsheet into a Word document
8.4.1 Why select the Create from File option
To choose from (use) an existing file (1)
8.4.2 Purpose of the ‘*.*’ specification
To cause all files (irrespective of name/type) to be listed / No restriction on which files
will be listed (1)
8.4.3 Effect of selecting the Link to file option
Changes made in the original file (spreadsheet) will be reflected in the Word
document (1)
8.5 How to obtain online help when working on a document
Any ONE way of:
Press F1
Type a search term/phrase in the Tell me what you want to do box
Click on the ? (on File tab, in top right corner of window, or on the Help menu)
Click on ‘Contact Support’ (on the Help menu) (1)
[15]
Page 10 of 15
Question 9: Integrated Scenario
9.1.1 Why online survey form better way to collect data, rather than options such as SMS
Any TWO reasons of:
Accuracy (online forms will automatically store data)
Efficiency (data does not have to be recaptured)
SMS not suited for surveys (rather for short messages)
Virtually no cost (apart from data/cap)
Online forms can provide guidance, basic data validation, etc. (2)
9.1.2 (a) What the Mode function does and to which type of data applied
The Mode function determines the most frequently occurring
numerical value (2)
9.1.2 (b) How the form could be changed, so that the MODE function could be used to
analyse these choices
The user could be asked to enter a number (e.g. 1,2,3) representing each of the
options, or use a sliding scale (e.g. 1–5, from not interested to very interested), so
that the Mode function could then be used to analyse the choices (1)
9.2.1 What is
QR code (1)
9.2.2 How could image be used to make it easier for people to take part in the survey?
It allows people to scan the code with their phone (not have to copy the URL down)
(1 mark for concept of scanning – accessing QR code content)
which will then take them to the survey
(1 mark for linking to the survey online – ‘opening the URL’) (2)
9.3 Spreadsheet with a list of volunteers and donors:
Page 11 of 15
9.3.1 Why sorting alphabetically according to Volunteer will not give meaningful
information
Surname and first name / initial occur in the same cell (in an inconsistent order [names
and surnames reversed] and with inconsistent spacing, so that the data would not be
sorted strictly by surname or by first name / initial)
Solution to this problem
Place surname and first name / initial in separate columns (2)
9.3.2 Data type used for cells D2:D7 and Motivate
Text
Leading zero (in front) of cellphone number is displayed (if numerical type it would
‘fall away’) (2)
9.3.3 Facilities to visually identify the two biggest donations in column G, without sorting
or using functions
Any TWO of:
Insert a (column / bar) chart
Filtering (Custom filter)
Conditional formatting
(Exclude answers relating to sorting the data or using functions) (2)
9.3.4 Function, besides COUNTIF or COUNTIFS, to determine the number of people who
have volunteered for the various categories of Help in column F
Subtotal (1)
9.4 Spreadsheet from Q 9.3 imported into an Access table
9.4.1 Why row 1 should be included in the imported data
The headings in row 1 will then serve as field names (1)
9.4.2 How spelling errors can be prevented for any new data in the Category field
Any TWO of:
Validation rule
Use of a selection list / combo box
(Exclude input mask and field size as answers) (2)
9.4.3 Advantages of a database, as opposed to a spreadsheet, besides answer for Q 9.4.2
Any TWO of:
Better for performing (complex) queries on the data
More user-friendly and faster input via forms
Better for producing (professional, customised) reports
Better for working with / linking to large amounts of data (that may be hard to deal
with using a spreadsheet) (2)
Page 12 of 15
9.4.4 Reasons why only Cell No suitable as Primary Key
There are ‘blank’ values in certain other fields (Volunteer, Hours Per Day, Donation)
The other remaining fields contain duplicate (i.e. non-unique) values (Gender,
Category, Help)
(Taken together, the above two reasons are sufficient to conclude that Cell No is the
only field that can be used as a Primary Key in this table; since a Primary Key can
neither contain ‘blank’ values, nor duplicate values in other records.) (2)
9.5 Steps to create a report in the database to calculate the total amount donated by
volunteers in the Business category
Create a query showing the business donations only (criterion for Category field would
be ‘Business’), then create a report based on this query
Add SUM function (i.e. =SUM([Donation]), in a text box)
in the report footer (3)
[25]
Question 10: Integrated Scenario (continued)
10.1.1 Function of a driver
A driver allows the operating system (‘computer’) to control / communicate with a
device (1)
10.1.2 Advantage of setting the scanner to produce greyscale images
The image file produced will take up less space (smaller file size) (1)
10.2.1 Piece of equipment that can be used to reduce the risk of the laptops being stolen
Cable lock (1)
10.2.2 Advantages of using a hybrid laptop compared to a conventional laptop
Any TWO of:
Can be used as a touch screen device
Screen can be used/positioned in various configurations (to make it more portable)
Screen can swivel 360 degrees or be removed to act as a tablet, etc. (2)
10.2.3 Benefits of using a UPS
Any TWO of:
Provides power (for limited time) if electric supply goes off
Prevents loss of data as it gives one a chance to save work
Prevents potential hardware damage (resulting from fluctuations in power)
Cheaper option than a generator, etc. (2)
Page 13 of 15
10.2.4 Ways to ensure that the battery life of the laptops will last as long as possible
Any TWO of:
Setting the laptop to automatically ‘sleep’ (or enter hibernation mode) when it is not
being used
Reducing the brightness of the screen
Choosing a balance between power and performance (power schemes)
Switch speakers to mute
(Exclude answers that are not realistic or practical, such as switching off the laptop or
buying other hardware) (2)
10.3.1 Why not a good idea just to copy data on laptop to a folder on the local hard drive
Any TWO of:
Hard drive problems/failure will cause both original data and the backup to be lost
Data should be stored externally in the case of theft / hardware failure
Backup files can be accidentally altered/deleted (2)
10.3.2 Why a cabled LAN not a good idea for the day of the fête
Any TWO of:
Might need a lot of cabling (could therefore be expensive/difficult to set up)
LAN will need extra security
Portability (of the laptops) would be limited – as opposed to a wireless setup
People could trip over cables, etc. (2)
10.3.3 Why not practical that a learner go from stall to stall to back up data on an
external 3.5" external hard drive
Any TWO of:
A 3.5" external hard drive would need to be connected to a power source at each
stall
Could take a lot of time to go from stall to stall (50) – might disrupt the backup
schedules
Might be more difficult to implement (consistently) ‘smart’ backup procedures (e.g.
compress data before backing up, incremental backups)
Might not be a free USB port on some laptops
Would need to copy the data to another computer in case something happened to
the external hard drive, etc.
(Exclude capacity of the external hard drive as a practical answer.) (2)
10.4.1 What it means to ‘back up data to Dropbox’
It means to copy/synch data to the cloud / an online server (Dropbox) (1)
10.4.2 The main potential problem in using Dropbox to back up the data
It relies on / needs (fast) internet connectivity (1)
Page 14 of 15
10.5.1 Why posting photos of fête to the school’s intranet not a good way of sharing;
referring to the concept of an intranet
An intranet is an internal website (of the school),
so members of the public would not have access to the photos (only school
personnel/learners) (2)
10.5.2 Examples of social networking sites to post and comment on the photos
Any TWO of:
Facebook, Instagram, Twitter, Flickr, Pinterest, Tumblr, etc. (2)
10.5.3 What a hashtag is and why it would be useful in this context
A hashtag is a # sign followed by text / a word / a phrase
It can be used to tag on social media so it becomes ‘searchable’ (2)
10.6 Visual indications to check if a website is secure
Icon of a small closed lock appears next to the URL
URL begins with https:// (2)
[25]
TOTAL: 150
Page 15 of 15