0 ratings0% found this document useful (0 votes) 49 views6 pagesMarch 2019 QP Only
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Stanmore Secondary School
Department of Mathematics & Information Technology
First Controlled Test 2019
GRADE 11 - INFORMATION TECHNOLOGY
Tine: Hour Max Marks: 60
Examiner: Mr S. Naidoo Moderator: Mr AF Gabriel (Woodview Sec)
insacion
1. Answer all questions.
2. Only answers written in ink will be marked,
3. Write neatly and legibly,
4. This question paper consists of FIVE questions in SIX pages.
Question One: MULTIPLE CHOICE
For each question, 1.1. to 1.10, there are four options for the question above it.
Choose the option(A-0) that best matches the question and write down only the letter of your choice.
LL. The speed of the CPU is measured in:
‘A. Megahertz
B. Bits per second(Bps)
C. Gigabytes(GB)
D. Megabytes(MB)
12, Itenables more than one program or parts of the same program to be processed at the same time
on different processors.
Multiprogramming
Multitasking
Multiprocessing
Simultaneous processing
ooe>
1.3 Adevice driver...
A. is unnecessary when plug and play is implemented.
8. is firmware which is embedded in new devices manufactured after
2005.
C. isautomatically included in any new device which implements hotswapping.
O. is software that provides communication between a peripheral and the
operating system.
Page 1 of 61.4 An internal bus ..
A. is the pathway used to transfer data between CPU and RAM
8. connects printers to stand-alone PCs,
C. stores the results of calculations performed in the CPU,
D. comes in several types, such as data, instruction or address,
1.5 Firewire is.
A: becoming the preferred method to connect almost any peripheral toa
computer.
B. the best data connection to use for capturing a digital video.
© 8 parallel communication standard which allows devices to transfer
data at high speeds,
D. software that prevents unauthorised access to a network.
1.6 A small text file which is stored by a web server on your computer and which contains personal data
Such as your username or your Internet surfing preferences, is known as
AL Spyware
B. Cookie
C. Digital Signature
D. Spam
17 The hardware component used in the start-up of a computer,
A. cpu
8. BIOs
c. usB
D. ups
1.8 .-is non-volatile memory that can be used as secondary storage,
A. SRAM
8. DRAM
C. Flash memory
D. Cache memory
1-9 Which operating system has been designed specifically to work on a cellphone?
A. Android
8. Solaris
C. Windows Vista
D. Linux
1.10 An IRQ stands for
A. Interrupt Request
8. Internal Request Query
©. Interruption Query
D. Interrupt Relay Line
[10]
Page 2 of 6Question Two:
A I-¢
aS pees cuslicore iso 2.4GHz Intel quad-core i7-4700MQ
500GB HDD, SATA Ill 12GB DDR3-1,600MHz
Intel Integrated Graphics W/DVI + VGA + DP Y
19.5" 16 x 9 TFT LED Wide Monitor 1TB HDD, SATA III
2GB AMD 8690A Graphics
23-inch, 1,920x1,080 touch screen
6 x Serial ATA Ill, 6 x USB3.0 (2 by Header),
8 x USB2.0 (6 by Header)
1x PCI Express 3.0 x16 Slot 4x USB 3.0 ports, 2 x USB 2.0 ports, a SD
card reader, and HDMLin and -out ports built
DVD+RWIDVD- Super Multi SATA Drive into its base
Microsoft Windows 8.1 64Bit
Intel High Definition Audio (6.1 + 2-Channel)
Intel Matrix Storage (RAID 0/1/5/10)
Microsoft Security Essentials Anti-Virus
Gigabit Ethemet, 802.11b/g/n, Bluetooth 4.0
Microsoft Windows 10.1 64Bit
| Scenario
The current IT learner's would like to upgrade the schoo!’ library facilities. As part of
the upgrade, the Grade 11 committee have suggested purchasing an IT infrastructure
for the library and have requested your assistance in evaluating certain proposals
‘Study the adverts above and answer the questions that follow.
Page 3 of 6Questions
2-1 The two computer under consideration have a 3.4GHz and a 2.4GH2 processor
2.1.1 What does GHz measure? (yy
2-12 Which processor should be more efficient when the end user is busy with
running multiple applications and surfing the Internet? Justify your answer, 2)
2.2 Cache memory helps to improve the performance of a CPU. Describe one way
inwhich cache memory is configured to be utilised in multi-core processors, ()
2.3 What is the function of the CMOS chipset of the ‘motherboard? a
2.4 Both PCs have an on-board BIOS
2.4.1 Which term best describes the 610S of the computer:
software, hardware or firmware (yy
2.4.2 What are the two main functions of the B10$2 (2)
2.5 What type of device will typically be connected to a ‘motherboard via a SATA
connection? (y)
motherboard. (a)
2.7 Explain what the computer would do to enable it to Continue working, if it had
insufficient memory. (2)
28 was suggested that the computers be fitted with Solid State Drives (ss0s)
Briefly explain what benefits a Solid State Drive wil provide over the rives that
are currently listed in the adverts? (1)
2.9 Differentiate between 3.5" and 2. ‘S"portable hard drives. (2)
(15)
Question Three
in the interest of cutting down on costs, the committee Purchased computer
System A. The committee now has to settle on software
3.1 The librarian looks atthe quotation and wants to know ifthe Operating System is really necessary
3.1.1 Which operating system comes with this PC, (y)
3.12 Name four functions of the operating system (4)
Page 4of63.2 Name the device/s that uses the following Operating systems
3.2.1 Windows
3.22 OSK
3.2.3 Android
3.2.4 1087 (4)
3.3 Differentiate between multithreading and multiprocessing. (2)
3.4 Explain the term virtual memory. ()
(12)
Question Four
As there are many threats in the ICT world, the principal asked the grade 11. learners how to keep all the
data in the library computer safe.
4.1 State any 3 type of threats to data. 3)
4.2 Differentiate between a virus and a computer worm. (2)
4.3 Give 2 reasons on how the librarian can be a threat to the data. (2)
4.4 Power problems can lead to loss of data. Name 1 hardware device that can be
purchased to prevent this problem from happening. (ay)
4.5 There are ways to combat threats to data.
4.5.1 List 2 tips on backing up the computer. (2)
4.5.2 List 2 disadvantages of using online backup. (2)
4.5.2 What software can be purchased to prevent malware threats to the data? ()
(13)
Page 5 of 6Question
e
Background:
To avold a password from being cracked or guessed, the following rules are required to be followed:
* The password must be minimum 8 letters long,
* The password must start and end with an uppercase letter.
{fall the above rules are met, the password chosen is valid
Write an algorithm using pseudocode that will
1. Ask the user to enter his password, (2)
2. Test the password for minimum 8 letters. If The password falls short of 8 letters,
show an appropriate message. (3)
3. Test the password to validate if the fir
‘st letter is uppercase. If the password
does not have the first letter as upper
‘case, display an appropriate message. (6)
[19]
Page 6 of 6