NATIONAL SENIOR
CERTIFICATE
GRADE 12
COMPUTER APPLICATIONS TECHNOLOGY P2
JUNE 2024
PAPER 2 THEORY MEMORANDUM
This memorandum consists of 11 pages
Page 1 of 20
SECTION A
QUESTION 1 QUESTION 2
B I – Cloud computing
1.1 2.1
D M – Add-on
1.2 2.2
C G – Piracy
1.3 2.3
D A – Hacking
1.4 2.4
B D - Teleconfrencing
1.5. 2.5
A E – Multi-tasking
1.6 2.6
C J – IOT
1.7 2.7
B K – Cross referencing
1.8 2.8
D H – CONCATENATE
1.9 2.9
C F – Aspect ratio
1.10 2.10
TOTAL [10] TOTAL [10]
QUESTION 3
False – task description /task definition
3.1
True
3.2.
False – Motherboard
3.3
True
3.4
True
3.5
TOTAL [5]
Page 2 of 20
QUESTION 4: SYSTEM TECHNOLOGIES
4.1 4.1 TWO broad areas where computers can save a company
money.
1. They can save on communication costs by using VoIP technologies/IM,
2
etc for communication.
2. They are more reliable and can work 24/7/365, which leads to improved
production.
3. Fewer employees – will save on payroll expenses.
4. Cost saving – do not have to print everything which saves paper;
5. etc
(Accept any valid reason) (Any 2)
4.2 The TWO essential hardware devices
1. CPU
2. RAM
3. GPU
2
4. SSD/HDD)
(Any 2)
4.3
TWO main advantages of laptop computer provides over a
desktop computer 2
1. It is portable.
2. It can be used on battery power for a few hours if there is no electricity
available, e.g., during a power outage.
(Any 2 Advantages)✓✓
4.4 Definition of convergence 2
Convergence refers to where the functionality of two or more devices are
combined in one device.
Example of convergent devices:
1. Tablet
2. Smartphone
Page 3 of 20
3. Laptop,
4. etc
(accept any relevant example) (any 1)
4.5 TWO functions of an operating system.
1. Provide basic security.
2
2. Basic running of the computer.
3. Memory management
4. Input- and output management (interpretation/communication of)
5. Co-ordinating/Managing tasks/loading/running programs (software)
6. Device management (e.g. disk management, printers etc.)
7. Provides user interface.(GUI)
8. File handling.
9. Starting up and shutting down a computer
(Any Two)
4.6 4.6.1 Utility software and explain how it will solve the problem 2
Disk Defragmentation/ defragmenter: ✓
1. Reorganises/Rearrange data on the hard drive
2. Connects fragmented parts of files so that access to files are faster Disk
Defragmentation
(any 1) ✓
4.6.2 Disk Clean up: ✓
2
1. It will remove temporary files
2. It will empty the Recycle Bin
3. It will remove unnecessary system files
(Any 1) ✓
4.7 4.7.1 TWO reasons why updates should be done regularly
1. To fix errors or bugs in the software
2. Improved security
3. Add new features / improvements 2
4. Stabilises the system
(Any 2 )✓✓
Page 4 of 20
4.7.2 The difference between a patch and a service pack.
Patch: Update that can be downloaded to fix a specific bug ✓
2
Service Pack: combination of patches over specific period of time/Release
of new features/corrections on software ✓
4.8 TWO wireless Input devices:
1. mouse
2. Keyboard
3. Microphone
4. headset
2
5. stylus
6. game controllers
7. webcam ( in relation to scenario above)
8. etc.
(Any 2)✓✓
4.9 Improve password (abc123)
1. Use special characters instead of the numbers 2
2. Change some of the letters to uppercase
3. Increase the length
4. Do not use patterns
5. Mix letters, characters and numbers.
Note to marker: Accept any other correct answer (Any 2)✓✓
4.10 2
TWO factors that could influence the quality of an image
1. Colour depth
2. Sensor size
3. ISO rating (the camera’s sensitivity to light).
4. Using optical rather than digital zoom.
5. Resolution
6. Etc.
(Any 2)✓✓
4.11 ONE practical example of where RFID tags are used. 1
Page 5 of 20
1. E-tolling/toll roads,
2. stock control in shops and warehouses,
3. pet /animal tracking,
4. access control systems, etc.
(Any 1)
[25]
QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES
5.1 5.1.1 Meaning of different speeds for ADSL
2
1. The 50 Mbps is the maximum download speed ✓
2. 25 Mbps the maximum upload speed. ✓
5.1.2 Difference between shaped and uncapped packages 1
1. Shaped: When a certain internet service is given a higher priority/
preference than other services
2. Uncapped: There is no limit on the amount of data that can be
used over a specific period of time/ may use as much data as they
want to.
5.2 TWO factors to consider when choosing an ISP
1. Coverage of the ISP's services
2. Types of services/security offered by the ISP / Shaped/unshaped/
Cap/uncapped 2
3. Download and upload speeds offered / speed of the line
4. Support offered by the ISP
5. Reviews from other customers, e.g. reliability /ratings
6. Pricing/Terms of the various packages/contracts available
7. Mobility
(Any 2)
Page 6 of 20
✓✓
5.3 TWO general advantages of making use of an ADSL
connection. 2
1. Make phone calls on your landline and use the line for Internet
access at the same time.
2. A permanent connection which is always on.
3. Includes Wi-Fi connectivity
(Any 2) ✓✓
5.4 TWO benefits/advantages of using cloud storage.
1. As long as you have Internet you can access whatever you want
anywhere and anytime. (Ubiquity)
2. Enables collaboration – because data is not limited to a single machine,
multiple people can access it at once and work together/sharing
documents 2
3. Data can be easily shared
4. Scalable sizes/ upgrade storage sizes
5. Files can be synchronised across all devices.
6. Automatic backup
7. Secured files
8. Saves local storage space
9. File extensions are not block/ remains the same
10. Etc,
(Any 2) ✓✓
5.5 TWO reasons to turn off the video component, when
using Skype 2
1. More bandwidth usage/You use a lot of data (cap)
2. Privacy concerns
3. Call quality may be poor if you have a slow Internet connection/requires
fast internet connection.
4. Irritation/interfere with concentration/interrupts/productivity decreases
(Note to marker: accept any 2 valid reasons ) ✓✓
5.6 TWO disadvantages/reasons for not using of e-
Page 7 of 20
government.
1. Large sections of the South African population have limited access to 2
technology and limited knowledge of it /digital divide/ bandwidth cost/
device affordability
2. Citizens are sometimes nervous about online threats which receive a lot
of publicity in the media.
3. There are also sometimes concerns about the security, privacy and use
of information.
4. It is not generally possible to make all services totally electronic/ two
systems need to be maintained – the traditional manual system and the
electronic self-service system.
5. many people prefer to deal with someone in person
(Any 2) ✓✓
5.7 ONE advantage of making use of grid computing
services. 1
1. More efficient use of unused/idle resources.
2. if one computer fails its function is taken over by another.
3. Upgrading can be done without downtime as the function of one is
taken over by another.
4. Jobs can be split into smaller chunks
5. Saves both money and resources by utilising the power of ‘idle’
computers.
(Any 1) ✓
[15]
Page 8 of 20
QUESTION 6: INFORMATION MANAGEMENT
6.1 TWO advantages of using electronic forms to gather
data.
1. Improved accuracy/ Data validation can be done/No issues with
handwriting
2. Data can be exported for analysis (e.g. into a spreadsheet) directly
3. Easy to share/obtain/distributed
2
4. Quicker feedback/turnaround time/collection time
5. Data is already captured
6. More likely to up to date
7. Easier to correlate/analyse/find data, etc
(Note to marker: Accept answers relating to any type of electronic
form,such as Google Docs, Microsoft Word forms, etc.)
(Any 2) ✓✓
6.2 Spreadsheet/Excel ✓ 2
MOTIVATION
1. Spreadsheet software allows you to organise data in a structured
manner
2. Spreadsheet software comes with built-in functions for statistical
analysis/ calculations.
3. Spreadsheet software allows you to create charts and graphs to visually
represent your data.
4. Spreadsheet software allows you to filter and sort your data based on
different criteria.
(Any 1)✓
6.3 TWO reasons NOT to use wiki for academic research. 2
1. Wiki may contain unsubstantiated opinions of people
2. no specific author for wiki and are not necessarily experts in a field of
study
3. Could be biased and contain inaccuracies
4. may not have been peer reviewed .
(Any 2) ✓✓
Page 9 of 20
6.4 TWO database query options/features that are used to
analyse data.
1. Criteria/Functions in criteria
2. Total(s)/Group by (NOT Grouping/Group)
2
3. Sort
4. Show (only relevant fields)
5. Calculated fields/Filter
(ANY 2) ✓
6.5 TWO ways to detect plagiarism in a learner's report.
1. Search for specific sentences from the report on the internet to check
for the original source
2
2. Investigate if no references were given/ check if no citation inserted
3. Look for words or phrases that seem beyond the ability of the
learner/Some sentences do not seem to fit with the style of the writing
4. Use online plagiarism software /(accept specific name of the software)
(ANY 2) ✓✓
[10]
Page 10 of 20
QUESTION 7: SOCIAL IMPLICATIONS
7.1 7.1.1 Definition of Ransomware
A type of malware designed to encrypt or block access to your computer 2
system and files ✓ demanding a sum of money ('ransom') ✓
7.1.2 safeguard your data against ransomware attacks. 1
Regular backups in a safe place (not attached to computer) ✓
7.2 7.2.2 Definition of Socia engineering. 2
The act of misleading /manipulating people to obtain confidential
information for fraudulent purposes
7.3 TWO strategies to discourage cyberbullying. 2
1. Report the offender
2. Block the offender from contacting them
3. Do not respond to taunts/messages from the bully
4. Be selective in your use of social media/Do not initiate a discussion that
could lead to cyberbullying of anyone
5. Do not make controversial posts that may open you up to harassment
6. Etc.
(Any 2) ✓✓
7.4 TWO reasons why some schools ban the use of 2
smartphones
1. Distraction to learning /theft of time
2. Sharing of sensitive pictures
3. Theft creates unnecessary disciplinary issues for the school
4. Learners may develop anti-social behaviour
5. cyberbullying /online harrasment.
6. Etc..
(Any 2)✓✓
Page 11 of 20
7.5 ONE way to prevent computer hardware theft. 1
1. Install security gates and burglar bars
2. Limit access/employ security companies/guards
3. Install security cameras
4. Install alarm systems
5. Biometric security for entry into the computer lab /biometric access
6. Place devices in a strong room/safe
7. Secure computers to the desk or floor, e.g. Kensington lock
8. Attach a security device to computers e.g. RFID tags/ install a tracking
device to the computers
(Any 1) ✓
[10]
QUESTION 8: SOLUTION DEVELOPMENT
8.1 Why an HTML page you created is not opening in a browser.
1
Not saved with an html extension or <html> beginning and end tags omitted
8.2
Difference between output of <p> and <br> tags
1. The <p> tag is used to indicate a new paragraph and creates an open
2
space/line before and after the paragraph.
2. The <br> tag is used to create a line break in the current paragraph
without any paragraph spacing.
(Note to marker: accept a drawing of different outputs)
8.3 8.3.1
Grade ✓ 1
Complexion ✓
8.3.2
Properties of a primary key.
2
1. A primary key field must contain a unique value✓
2. A primary key field cannot be null/empty/required. ✓
Page 12 of 20
8.4
<title>Computer<title> 1
The closed tag it is missing the closing tag </title>✓
8.5
TWO database features which can help to improve the 2
accuracy of the data entered by a user
1. Validation rule/validation text (do not accept only validation text)
2. Input mask
3. Default values
4. Format
5. Field size
6. Lookup values like List Box, Combo Box
(Any 2) ✓✓
8.6
TWO HTML tags used in the screenshot to avoid a
plagiarism offence . 2
1. cite ✓
2. figcaption
3. blockquote✓
8.7
TWO reasons Use of Save As 2
1. Creating a Copy or Alternate Version/
2. Changing File Formats
3. Customizing Properties and Metadata
4. Avoiding Overwriting Existing Files/
5. Different folder/ location
6. Saving for first time / new file name
(Any 2) ✓✓
8.7 TWO changes that must be made to the calculated field
2
1. An “=” sign must be changed to a colon(:)
2. The second division operator (/) should be changed to multiplication
operator(*)
PERCENT: ✓ [MARK]/75*✓ 100
(accept explanation or rewriting the formula)
[15]
Page 13 of 20
TOTAL SECTION B: 75
QUESTION 9 : INTEGRATED SCENARIO
9.1 9.1.1
Company that made the processor 1
Intel ✓
9.1.2
Size of the primary memory 1
8GB✓
9.2 9.2.1
TWO specifications to consider when buying a monitor,
besides the screen size.
2
1. Resolution
2. Refresh rate
3. Viewing angle
4. Aspect ratio
5. Contrast ratio
6. Input connector port
7. Response time
8. Colour depth
9. Frame rate
(Any 2) ✓✓
9.2.2 1
How the size of a screen is measured
Diagonally ✓(Also accept Access from one cornner to another)
Page 14 of 20
9.3 Definition of Telecommuting 1
Telecommuting, also known as telework or work from home, refers to an
arrangement that allows employees to work away from the
company’s offices ✓
9.4 9.4.1
Definition of Ergonomics 1
Ergonomics is the study of how people interact with computers and designs
workspaces to enhance efficiency and comfort. ✓
9.4.2 Injury sustained due to extensive typing.
Carpal Tunnel Syndrome (CTS) ✓ 1
(note to marker: do not accept RSI)
9.4.3 TWO input device specifically designed for visually impaired
users
2
1. Braille Keyboard
2. Trackballs and Joysticks
3. Large key keyboard
4. Oversized buttons on devices
5. microphone / headset
6. etc.
(Any 2) ✓✓
9.5 9.5.1 TWO things to increase storage on the hard drive, other than
upgrading or creating a backup.
2
1. Uninstall unused apps/ software/
2. Compress / Zip data or file
3. Use disk cleanup to delete unnnecesary files.
(note: accept valid way to increase storage beside backup or upgrading)
(Any 2) ✓✓
9.5.2 Protect your computer against power failures
1. Install a UPS
2. Install inverter 1
3. Make use of solar panels / batteries, etc.
(Any 1) ✓
9.5.3 Purpose of backup
Page 15 of 20
1
1. Data Protection in case of accidental deletion, hardware failure, etc✓
9.5.4 ONE reason for zipping/compressing a file.
1. Possible decrease in storage space for a file/Reduce file size 1
2. Uses less data when sending files
3. Add a layer of security to files with password
4. Send a folder or group of files as single/smaller e-mail attachment
5. Faster to transfer large, zipped files to removable media
6. Zipped folder cannot be infected by virus
(Any 1) ✓
9.6 9.6.1 ONE reason for updating anti-virus software regularly.
1. Protection Against New Malware
2. fix bugs, enhance efficiency, and optimize scanning speed. 1
3. to address security holes
(Any 1) ✓
9.6.2 TWO ways for preventing a virus, except installing antivirus. 1
1. Do not click on links/attachments in suspicious e-mails or websites
2. Do not use pirated/cracked software
3. Only download files from safe sources
4. Use a browser known for good security e.g. Firefox/Pop-up blocker
5. Minimise use of untrustworthy/external media to transfer data
6. Scan external media before data transfer , etc..
(Any 1) ✓
9.6.3 Definition of Firewall 2
A firewall is a software or hardware ✓that prevents unauthorised access to
computer or network. ✓
9.7 ONE potential advantage of using FTP instead of email to 1
share files.
Page 16 of 20
1. allowing faster data transfer speeds compared to email attachments.
2. No file size restrictions
3. If a file transfer is interrupted, FTP can resume from where it left off.
(any 1) ✓
9.8 9.8.1 Definition of Green computing
1
Green computing is a term for using, and managing computer systems and
technology in an environmentally friendly and energy-efficient manner ✓
9.8.2 TWO ways to promote green computing.
1. Choose energy-efficient components (processors, monitors, printers) to 2
reduce power consumption
2. Recycle old electronic devices responsibly to reduce e-waste.
3. Print only when necessary.
4. Opt for double-sided printing and recycled paper.
5. Enable sleep mode on devices when idle.
6. Share documents digitally rather than printing paper copies.
(Accept any 2 valid ways of ensuring green computing) ✓✓
9.9 Definition of Botnet 2
A botnet (short for “robot network”) consists of multiple computers✓, often
referred to as “bots” or “zombies” that have been infected✓ with malware.
[25]
Page 17 of 20
QUESTION 10 : INTEGRATED SCENARIO
10.1 TWO types of computer users
1. Home user 2
2. Personal user
3. SOHO user
4. Mobile user
5. Enterprise/Office user
(Any 2 )
10.2 10.2.1 Convert the characters to lowercase.
1
<
10.2.2 Letter (A to Z, entry optional).
1
?
10.3 Function for the 'current date and time 1
now✓ ()
10.4 How downloading a video differ from streaming a video
2
1. Streaming allows you to watch or listen to content without
downloading it.
2. Downloading involves saving a file from the internet onto
your device, allowing you to access it offline at any time.
10.5 10.5.1 Definition of Big data
Big data are very large structured and unstructured data sets that are 2
analysed to reveal trends.
10.5.2 Benefits of big data for a research company 2
1. Big data leads to better decision making which could reduce costs
2. The volume of data gathered provides more insight/ Companies have
more data to analyse and base their findings/advice on
3. Because data is gathered all the time, big data is more relevant /targeted
advertising
(Any 2) ✓✓
Page 18 of 20
10.6 10.6.1 Safeguarding information measures
1. Adopt a Strong Password Policy
2. Back up 1
3. Encription
(Any 1) ✓
10.6.2 Definition of Plagiarism 2
Plagiarism refers to the act of using someone else’s work✓, ideas, or
intellectual property without proper attribution or permission. ✓
10.7 Steps to take before creating a Table of Contents
2
1. Apply appropriate styles ✓
2. to (different levels of) headings ✓
10.8 Definition of wearable Technology 2
refers to a category of electronic devices that can be worn✓ directly on the
body or indirectly as accessories✓
10.9 10.9.1 Explain the term digital divide.
The digital divide refers to the unequal access ✓to digital technologies✓ and 2
the internet among different groups of people.
10.9.2 TWO ways in which digital divide affects education. 2
1. Unequal Access to Learning Resources
2. Remote Learning Disparities
3. Unequal Learning Opportunities
4. digital divide widens the skills gap between students.
5. etc..
(Accept any valid effect of digital divide in education)✓ ✓
10.10
=DATE(YEAR(B1)-2, MONTH(B1)+8,DAY(B1)+10
2
20 February✓ 2022✓
10.11 ONE metadata other than the file size
1. Last modified
2. Date modified 1
3. File extension/File type
4. File name
5. Date created
6. Date printed
7. Author
8. Subject
Page 19 of 20
9. GPS information
10. Time,
11. etc (Any ONE) ✓
[25]
TOTAL SECTION C: 50
GRAND TOTAL : 150
Page 20 of 20