GRADE 12 CAT PAPER 2 OUTLINE
Systems Technologies – Questions 4, 9, and 10
Topic Subtopics Details
Types of computer SOHO, POWER, PERSONAL, MOBILE,
systems ENTERPRISE
Definitions and devices/software needed
for each user
1. General Data, Information, Definitions + real life scenario example
Concepts Knowledge,
Conclusions
Reasons for using Time saving,
computers/ICT
communication,
global connectivity
Convergence Combines multiple technologies into one
device (e.g., smartphones)
Information Input, Processing, Storage, Output,
Processing Cycle Communication
Definitions and examples for each stage
Input Integration 2 or more input mode combined to
enhance productivity
2. POS: barcode + keyboard + touchscreen
Hardware
Keyboard & mouse
(ergonomics),
wireless vs cabled-
Buying Decisions advantages/disadvantages
Digital Camera vs Webcam
- (resolution, lens, cost, etc.)
Scanners
(DPI, OCR, speed, etc.)
Monitors
(resolution, size, refresh rate, aspect ratio,
contrast ratio)
Printers
(inkjet, laser, MFP, resolution, speed,
paper size, etc)
Voice/Speech Differences, advantages & disadvantages
Recognition
Voice recog-identifies a unique voice for
security
Speech recog- identifies spoken words
SSD vs HDD (speed, cost, noise, power)
Backup vs Archive
Storage Devices
Cloud Storage vs Cloud Computing vs Grid
Computing(distributed computing )
Processing CPU, RAM, GPU, Motherboard
Risks with Input CTS, RSI,
Devices
Keyloggers (prevention tips)
Specs for Different Match devices (input/output/storage) to
Users user needs
Troubleshooting Sticky mouse,
scan issues,
printing problems,
disk errors,
Task Manager,(un responsive apps)
Defragmentation-rearranging scattered
files to speed up the computer
Disk cleanup- deleting unused apps or
filed to get more space
Green Computing Save paper, energy-efficient settings, e-
waste awareness
Essential/ Basic CPU, RAM, Storage (HDD/SSD), GPU
hardware
components
Application vs Definition
System Software
Application software-to perform specific
task. Eg MS Word, excel, etc
System software -manages
/maintains/controls the activities in the
computer
3.
Eg, OS, utilities (antivirus, compression)
Software
Web-based vs Web-based apps- software accessed
Installed Apps through online, eg, office 365
Installed apps- kept on local device. Eg MS
word installed.
Access, updates, storage, connectivity
comparison
System Minimum vs Recommended system
Requirements requirement
Minimum req-The minimum
specifications needed for a software
application or game to run adequately.
Meeting these ensures basic functionality
but might result in lower performance or
limited features.
Recommended System Requirements:
The optimal specifications suggested for a
software application or game to run
smoothly with all features and high
performance.
Meeting these ensures the best user
experience without issues or slowdowns.
Software Problems Bugs, patches, service packs, read-only,
& Upgrades upgrades
Risks of Flawed Malware, loss of data, security, crashes
Software
Trial/Beta Versions Used for testing new software
Licensing Types Site, Multi-user, Single-user, Subscription
(SaaS)
Creative Commons Licenses for legal open sharing of creative
work
User-Centered Systems built around user needs
Design (UCD)
OS Role/Functions Interface, multitasking, file management,
updates, GUI, security
File Types & File properties (size, author, path, etc.)
Metadata
Utility Software for Disk cleanup, defrag, compression,
Troubleshooting uninstaller, recovery
Performance CPU speed, RAM, disk, caching, malware
Influencing Factors
Add-ons e.g., Ad blocker, PrintFriendly, pop-up
blocker
Grade 12 CAT: Network Technologies – Topic Outline(15
marks)
Topic Details / Key Concepts
Types of Networks LAN, WAN, WLAN, GAN
Roles LAN: small area;
WAN: large area;
WLAN: wireless LAN- connect wirelessly
GAN: global connectivity(an example of WAN)
Advantages of Networks Easier communication.
Sharing of files and hardware
Centralised storage
Disadvantages Security threats (hacking);
Expensive to set up, etc
Internet Services VOIP(skype, Teams, ZOOm, WhatsApp video
calling),
IM( WhatsApp),
FTP,
Cloud Computing,
Grid Computing
VOIP Voice over IP (e.g., Skype, Zoom) – cheaper
calls
IM Instant Messaging (e.g., WhatsApp) – real-time
text chat
FTP File Transfer Protocol – Upload/download files
Cloud Computing Access data via internet; scalable; accessible
anywhere
Grid Computing Uses multiple computers to solve one task
Cloud/Grid - Pros Convenience, storage, remote access
Cloud/Grid - Cons Dependent on internet,
security issues
e-Government Services SARS (tax), IEC (elections), SABC (TV licence),
RTMC (fines)
e-Gov Pros/Cons Advantages of e-gov: Convenient, saves time.
Disadvantages of e-gov: Needs fast internet,
security risks, digital divide
Digital Divide Gap between those with and without tech
access
Internet Connection Types Wired: ADSL, SDSL(telephone lines), Fibre
(fibre cables)
Wireless: 4G/5G, WiFi, LTE, Hotspot
ADSL Download faster than upload (e.g., 50
Mbps/25 Mbps)
SDSL Same download & upload speed (e.g., 50
Mbps)
Pros of ADSL/SDSL Includes WiFi,
landline use(to make telephone calls)
Cons of ADSL/SDSL Not available everywhere,
weak signal in rural areas
Networking Devices Modem/Dongle connects computers to
Internet access
Router: hardware Connects networks / LANS
together
Switch: device Connects computers in a
network
WAP: a device which allows computing devices
to be connected to network wirelessly
NIC:-hardware device that allows computers
to be connected to a network
Broadband High-speed, permanent internet connectivity
(e.g., LTE, Fibre, ADSL, SDSL, )
Bandwidth Data flow capacity (Mbps / Gbps)
Amount of data that travels from one point to
another.
ISP Considerations( Cap/Uncap,
Vodacom, Mweb, MTN, Hard/Soft Cap,
etc)
Shaped/Unshaped,
Bundles (services provide)
Area covered
Distance from the tower/ access point
Cost
Cap vs Uncap Cap: Limited data over a period
Uncap: Unlimited data over a period
Hard Cap vs Soft Cap Hard: ISP Stops all services completely when
cap is used up.
Soft: Some access remains when your cap is
reached.
Shaped vs Unshaped Shaped: Some services slower than others
Unshaped: Equal speed for all services
ISP Services Email,
spam filtering,
internet connection, etc
Downloading / Data from internet (download) to local device
Uploading/streaming
to internet (upload) from device
Coverage vs WAP Coverage: Area signal is available
WAP: Wireless Access Point device
Telecommuting Working from home using internet
Throttling ISP slows speed after usage limit
Distributed/Grid Computers work together as one powerful
Computing system
IoT (Internet of Things) Devices like smart TVs, fridges connected to
internet
Grade 12 CAT: Social Implications (10 marks)
Topic Details / Key Concepts
Rights ✔ Right to Access -This is the right of all
individuals to have fair and equal access to digital
resources and the internet.
✔ Right to Privacy-This is the right to keep
personal information safe and protected when
using digital platforms
Internet Attacks Aim to disrupt or harm computers/networks
DoS / DDoS Bombard system with data to slow down/crash
Attacks
Sniffer Attack Program reads data packets sent to a
computer/network
Malware Types Bot, Botnet, Zombies, Ransomware
Ransomware Malware that Encrypts/blocks access to files,
demands payment
Bot Program performs automated tasks online
Botnet Group of bots controlled by attacker remotely
Zombie Infected device(1 device) under remote control
Social Tricking people to reveal sensitive info
Engineering
Phishing Use Fake emails requesting sensitive info
Pharming Redirect to fake website/link to deceive someone
into getting sensitive info
Clickjacking Hidden link disguised as something else
Smishing Deceptive SMS messages
Baiting Lure using curiosity to click/open a threat
Pretexting Fake identity used to gain info
Spoofing Forged email/header to mislead recipient
Computer Theft of hardware/software/information
Crimes / Fraud
Protecting Chain, Cabinet, Security Doors, Alarms, Bolts,
Hardware Biometrics
Protecting Backup, Passwords, Authentication
Software
Software Theft Piracy, uninstalling without consent
Other Thefts Identity theft, Bandwidth theft, Info theft, Time &
services theft
Hoax False information spread to trick people
Scam Deception for financial gain
Adware Displays unwanted ads (often bundled)
Popups / Interruptions or tools that record keystrokes
Keyloggers
Protection Anti-malware, Antivirus, Software Updates, VPN
Against Threats
Security Tools HTTPS, Digital Signatures, Digital Certificates,
Encryption (SSL)
Firewall Blocks unauthorized access
Anti-spyware Protects against tracking software
VPN Virtual Private Network – secure private browsing
TOR Browsers Browsers that offer anonymous internet use
Managed ISP-managed for better security & support
Routers
Information Management(10 marks)
Topic Concept / Details
Feature
PAT – Information Evaluation of - Authority: Credibility of source
Management Websites - Currency: How up-to-date the info
is
- Accuracy: Correct and factual info
- Objectivity: Bias-free and balanced
Electronic Forms - Advantages: Quick responses, easy
/ Online Surveys distribution, cost-effective
- Disadvantages: Requires internet
access, potential for dishonest
responses, digital divide
Spreadsheet vs Compare use cases, strengths, and
Database limitations of each for handling data
Analysis of Data Sorting, filtering, summarizing, and
interpreting results from
surveys/data
Closed / Open- - Closed-ended: Yes/No or multiple
Ended Questions choice (easier to analyse)
- Open-ended: Descriptive answers
(more detail but harder to analyse)
Task Definition Clear understanding of the problem
to be solved or the question to be
answered
Report Writing & - Avoid copying others' work
Plagiarism - Use own words and cite sources
Report Structure Includes Title, Introduction, Findings,
Conclusion, Sources/References
Tool / Software: Ensuring Use of design tools to maintain
Database Accuracy of Data clean, valid data
Capture
Validation Rule Restricts type of data entered (e.g.,
age must be > 0)
Input Mask Defines a specific format for data
entry (e.g., phone number as (000)
000-0000)
Field Size Limits number of characters allowed
(e.g., max 10 characters)
Format Controls how data is displayed (e.g.,
Date, Currency, Percent)
Solutions development
- Software usage: Word, Tool functions and
Excel, Access shortcuts
- Spreadsheet concepts: Error detection and
conditional formatting, data handling
filtering, sorting
5. Solution
Development - Database basics: tables, Simple DB structures
queries, primary keys, and uses
validation
- Word features: mail merge, Document formatting,
styles, TOC, referencing tools automation and
structure