provincial examination / provinsiale eksamens...

22
1 PROVINCIAL EXAMINATION / PROVINSIALE EKSAMENS INFORMATON TECHNOLOGY / INLIGTINGTEGNOLOGIE PAPER 2 / VRAESTEL 2 JUNE / JUNIE 2015 GRADE 11 / GRAAD 11 MARKS: 150 PUNTE: 150 TIME: 3 HOURS TYD: 3 URE This paper consists of 13 pages / Die vraestel bestaan uit 13 bladsye

Upload: others

Post on 04-Jan-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

1

PROVINCIAL EXAMINATION / PROVINSIALE EKSAMENS

INFORMATON TECHNOLOGY /

INLIGTINGTEGNOLOGIE

PAPER 2 / VRAESTEL 2

JUNE / JUNIE 2015

GRADE 11 / GRAAD 11

MARKS: 150 PUNTE: 150 TIME: 3 HOURS TYD: 3 URE This paper consists of 13 pages / Die vraestel bestaan uit 13 bladsye

2 Copyright reserved/Kopiereg voorbehou Please turn over /Blaai asb om

INLIGTINGSTEGNOLOGIE/INFORMATION TECHNOLOGY GRADE 11/GRAAD 11

INSTRUCTIONS TO CANDIDATES 1. This question paper consists of SIX sections:

SECTION A:

Multiple-choice, Match, True or False (25)

SECTION B: question 4

System Technologies (30)

SECTION C: question 5

Communication and Network Technologies (30)

SECTION D: question 6

Solution Development (33)

SECTION E: question 7

Integrated Scenario (32)

2. Answer ALL the questions.

3. Read ALL the questions carefully.

4. The mark allocation generally gives an

indication of the number of facts required in

your answer.

5. Number the answers correctly according to

the numbering system used in this question

paper.

6. Write neatly and legibly.

INSTRUKSIES AAN KANDIDATE 1 Hierdie vraestel bestaan uit SES afdelings:

AFDELING A:

Meervoudige keuse-vrae (25)

AFDELING B: vraag 4

Stelseltegnologieë (30)

AFDELING C: vraag 5

Kommunikasie- en Netwerktegnologieë (30)

AFDELING D: vraag 6

Ontwikkeling van Oplossings (33)

AFDELING E: vraag 7

Geïntegreerde Scenario (32)

2. Beantwoord AL die vrae.

3. Lees AL die vrae aandagtig deur.

4. Die puntetoekenning gee gewoonlik 'n

aanduiding van die getal feite wat in jou

antwoord verskaf moet word.

5. Nommer die antwoorde korrek volgens die

nommeringstelsel wat in hierdie vraestel

gebruik is.

6. Skryf netjies en leesbaar.

3

SECTION A [25] QUESTION 1 MULTIPLE CHOICE (10) Various possible options are provided as answers to the following questions. Choose the most correct answer and write only the letter (A – D) next to the question number (1.1 – 1.10), for example 1.1 D.

AFDELING A [25] VRAAG 1 MEERVOUDIGE KEUSE (10) Verskeie moontlike opsies word as antwoorde vir die volgende vrae verskaf. Kies die korrekte antwoord en skryf slegs die letter (A – D) langs die vraagnommer (1.1 – 1.10) neer.

1.1 Caching is used in a variety of situations in a computer system. Which of the following is not part of the them. A. CPU B. Storage C. EPROM D. Communications.

1.1 Berging word in n verskeidenheid situasies in die rekenaarsisteem gebruik. Watter van die volgende is nie deel daarvan nie? A. SVE B. Stoor C. UPLAG D. Kommunikasie

1.2 Virtual memory is an area of storage or diskspace… A. that the RAM use for dumping. B. that the ROM uses. C. that the operating system keeps for its own use. D. that CMOS uses.

1.2 Virtuele geheue is n stoor area of skyfspasie.. A. wat die ETG gebruik vir storting. B. wat die LAG aanwend. C. wat die bedryfstelsel vir eiegebruik aanwend. D. wat die KMOH gebruik.

1.3 Which term applies when a person tries to fool you into giving private information by an email? A. Flaming. B. Phishing. C. Lurking. D. Spamming.

1.3 Watter term is van toepassing wanneer „n persoon jou wil oorreed om jou privaatinligting per epos te verskaf. A. Flaming. B. Phishing. C. Lurking. D. Spamming.

1.4 Identity theft is… A. fraudulent action of stealing a user's green ID book

while he/she is online. B. use of driver software to automatically allow access

to private information on a network. C. copying of the username and password of a user on

an online shopping site. D. fraudulent action of collecting sufficient personal

information about an individual in order to assume his/her identity .

1.4 Identiteitsdiefstal is die… A. bedrogpleging deur „n gebruiker se groen ID-

boekie te steel terwyl hy/sy aanlyn is. B. om „n drywerssagteware te gebruik om

automatiese toegang te verkry tot private inligting op „n netwerk.

C. die kopiêring van „n gebruikersnaam en wagwoord by „n aanlyn inkopietransaksie op „n webtuiste.

D. om onregmatig genoegsame inligting van „n persoon te bekom, om dan hulself as die persoon te kan voordoen.

1.5 Characteristics of a fiber optic cable include …

A. thin and light weight, hence can be used in cramped

areas. B. supports low transmission rates. C. protects networks from viruses. D. has a higher attenuation than UTP.

1.5 „n Eienskap van veseloptiesekabels is… A. dun en liggewig en kan in beknopte areas

gebruik word. B. betreklike lae datatransmissie spoed. C. om netwerke te beskerm teen virusse. D. dat dit „n hoër sein verswakking het as

“UTP” kabels.

1.6 What type of network does one typically set up and use to exchange files wirelessly between people by using Bluetooth. A. HAN. B. PAN. C. WAN. D. LAN.

1.6 Watter tipe netwerk word gebruik om lêers koordloos tussen twee mense deur middel van Bluetooth te stuur? A. HAN. B. PAN. C. WAN. D. LAN.

4

1.7 Where does ICT not make the biggest difference? A. Worldwide Communication. B. Improvement of the efficiency of the Government. C. Environmental Improvements. D. Rural development.

1.7 Waar maak IKT nie die grootste verskil nie A. Wêreldwye kommunikasie. B. Verbetering in die effektiwiteit van die

regering. C. Omgewingsverbeterings. D. Landelike ontwikkeling.

1.8 What type of network would most commonly make use of a 3G modem? A. LAN. B. Cellular network. C. WLAN. D. HTML5.

1.8 Watter tipe netwerk sal die mees waarskynlikste van ‟n 3G modem gebruik maak? A. LAN. B. Sellulêre netwerk. C. WLAN. D. HTML5.

1.9 The process whereby geographical coordinates are added

as „metadata‟ to media such as photographs and video. A. Geotagging. B. GPS. C. VoIP. D. VPN.

1.9 Die proses waar geografiese koördinate as metadata by media soos bv. foto‟s en video‟s gevoeg word. A. Geotagging. B. GPS. C. VoIP. D. VPN.

1.10 ICT is not limited by… A. poorly written an designed software systems. B. profitability. C. good infrastructure. D. fear of ICT.

1.10 IKT word nie ingeperk deur... A. swak geskrewe en ontwikkelde stelsels. B. winsgewendheid. C. goeie infrastruktuur. D. vrees vir rekenaars.

5

QUESTION 2 / VRAAG 2: (10) Match each of the descriptions in COLUMN A with a term in COLUMN B. Only write the number and the correct letter. Pas die beskrywing in KOLOM A by die regte term in KOLOM B. Gee slegs die nommer en korrekte letter.

COLUMN A COLUMN B 2.1 The term that refers to the fact that the computer is made up of many

parts or „modules‟ that can be added together. Die term verwys na die feit dat die rekenaar uit ’n groot aantal aparte dele of modules bestaan wat saamgevoeg is.

A Firewire

B EEPROM

2.2 The type of ROM which is used in most modern devices.. Die tipe ROM wat in die meeste moderne toestelle gebruik word.

C Universal Serial Bus

D Multiverwerking/ Multiprocessing

2.3 The term we use to call the „sticks‟ of memory that you can add to your computer. Die term wat gebruik word vir die geheuekaarte wat gebruik word om geheue tot die rekenaar toe te voeg.

E Multitaakverwerking/ Multitasking

F Switch

2.4 The term we use to refer to the software or instructions kept on ROM chips. Die term wat gebruik word om na die programmatuur op die ROM-skyfies te verwys.

G Modulêre ontwerp/ Modular design

2.5 Attempts from people, generally employing e-mail, to direct other people to fake websites, where they are tricked into releasing personal information, then using these details to commit identity theft and fraud. Pogings van mense, gewoonlik via e-pos, om ander mense na vals webtuistes te neem, waar hulle om die bos gelei word om persoonlike inligting uit te gee; dan word hierdie besonderhede gebruik om identiteitsdiefstal te pleeg.

H Delphi

I Phishing / uitvissingsbedrog

2.6 What is the most popular and most frequent connection used at present to connect virtually all new devices to a computer? Wat is die gewildste en algemeenste konneksie wat deesdae gebruik word om byna alle toestelle waaraan jy kan dink aan ’n rekenaar te koppel?

J DIMMs

K Firmware

2.7 A device used to connect computers in a network to a central location so that communication can occur. ’n Toestel wat gebruik word om rekenaars in 'n sentrale plek in 'n netwerk te konnekteer sodat kommunikasie kan plaasvind.

L Flash drive

2.8 This type of processing can only take place when the operating system divides the programs or threads or processes between more than one physical CPU. Die tipe verwerking kan net plaasvind wanneer die bedryfstelsel die programme, take of prosesse tussen meer as een fisiese SVE verdeel.

M AVG

N GW Basic

2.9 This type of processing can take place with a single (or multiple) processor, and can be used to allocate CPU time to each of the active programs, so that it appears that the computer is performing more than one task simultaneously. Die tipe verwerking kan met een SVE (of veelvuldige SVE’s) plaasvind, en kan gebruik word om SVE-tyd aan elk van die aktiewe programme toe te ken sodat dit lyk asof die rekenaar meer as een taak tegelyk uitvoer.

O BIOS

P Windows

2.10 An example of a high-level programming language. ’n Voorbeeld van ’n hoëvlakprogrammeertaal.

Q Spooler

6

QUESTION 3: TRUE / FALSE [5] WRITE DOWN IF EACH OF THE FOLLOWING STATEMENTS ARE TRUE OR FALSE.

VRAAG 3: WAAR / ONWAAR [5] SKRYF OF DIE VOLGENDE STELLINGS WAAR OF ONWAAR IS.

3.1

A router is a device that converts the data or signal from a computer to a format that can be transmitted over a communication channel such as an ADSL line.

3.1

‟n Roeteerder is ‟n toestel wat die data/sein van ‟n rekenaar omskakel na ‟n formaat wat via ‟n kommunikasiekanaal soos ‟n ADSL-lyn oorgedra kan word.

3.2 HTTP is a protocol used for secure, encrypted communication over the Internet.

3.2 HTTP is 'n protokol wat gebruik word om geënkripteerde data veilig oor die Internet oor te dra.

3.3 Settings in server software are called policies. 3.3 Instellings in die bedienerprogramme word beleid genoem.

3.4 A firewall can only be hardware.

3.4 ‟n Firewall is slegs apparatuur.

3.5 Firewire was developed to provide fast data transfer for video cameras and external data storage.

3.5 Firewire is ontwikkel om vinnige data-oordrag aan videokameras en eksterne hardeskywe te verskaf.

TOTAL SECTION A: 25 TOTAAL AFDELING A: 25

7

SCENARIO John is one of the best cycling coaches in Mpumalanga. He is also the organiser of a prestige cycling event where the top 10 cycling clubs in the province compete against each other. The organising of such an event has many different aspects that need to be covered. John is working with a highly skilled committee that consist of people from all over the province.

SCENARIO John is een van die beste fietsry-afrigters in Mpumalanga. Hy is ook die organiseerder van „n prestige fietsry gebeurtenis waar die top 10 fietsry-klubs teen mekaar meeding. Die organisasie van so „n gebeurtenis het baie verskillende aspekte wat gedek moet word. John werk met „n hoogs opgeleide kommittee wat bestaan uit lede van regoor die provinsie.

SECTION B: SYSTEM TECHNOLOGIES [30] AFDELING B: STELSELTEGNOLOGIE [30]

8

QUESTION 4 VRAAG 4 4.1 John found the above description of an app that he

wants to use for coaching. Study the extract and answer the following questions.

4.1 John het die volgende beskrywing van „n toepassing („app‟) wat hy wil gebruik vir afrigting. Bestudeer die uittreksel en beantwoord die volgende vrae.

4.1.1 What is an “app” in computer terms? (2)

4.1.1 Wat is „n „app‟ in rekenaar terme? (2)

4.1.2 What kind of operating system would John need to be able to run this specific app on his phone? (1)

4.1.3 Why is it necessary for all computing devices to have

an operating system? (2) 4.1.4 It is said that this App is using a processing

technique called multithreading. Explain what multithreading is. Give an example. (3)

4.1.2 Watter tipe bedryfstelsel sal John nodig hê om hierdie spesifieke „app‟ op sy slimfoon te gebruik?(1)

4.1.3 Hoekom is dit nodig dat alle rekenaartoestelle „n

bedryfstelse moet hê? (2) 4.1.4 Daar word gesê dat hierdie TOEP „App‟ „n

Multidraadverwerking („multi-threading‟)-verwerkingstegniek gebruik. Verduidelik wat multidraadverwerking is. Gee „n voorbeeld. (3)

4.1.5 Name TWO other processing techniques AND

explain when it will be used. (4)

4.1.5 Noem TWEE ander verwerkingstegnieke EN

verduidelik wanneer dit gebruik sal word. (4)

4.2 To be able to run applications on a computer, RAM is needed.

4.2.1 Why is RAM so essential? (2) 4.2.2 Without buying new RAM, how can you overcome the

problem when more RAM is needed than what is currently available? (1)

4.2.3 What is the characteristics RAM? (4)

4.2 Om toepassings-programme(„applications‟) op „n rekenaar te gebruik, word RAM benodig.

4.2.1 Hoekom is RAM essensieel? (2) 4.2.2 Hoe kan jy die probleem oorkom as meer RAM

nodig is as wat tans beskikbaar is, sonder om nuwe RAM te koop? (1)

4.2.3 Wat is die eienskappe van RAM? (4)

4.3 The computers that are used during the cycling event

for all the administrational work and input of data after each event, needs to be upgraded.

4.3.1 Examine the following extract below showing the

specifications of one of the computers: Name TWO hardware components that need to be upgraded. (2)

4.3 Die rekenaar wat gedurende die fietsry gebeurtenis

(„event‟) gebruik word vir administratiewe werk en toevoer van data na elke gebeurtenis, moet opgegradeer word.

4.3.1 Bestudeer die volgende skermskoot onderstaande wat

die spesifikasies van een van die rekenaars toon: Noem TWEE hardeware komponente wat opgegradeer moet word. (2)

9

4.3.2 John is considering buying a Solid State Drive (SSD) instead of a traditional hard drive (HHD) for his notebook. Differentiate between the SSD and HDD according to the following characteristics: (6/2)= (3)

4.3.2 John oorweeg dit om „n Vastetoestand-Skyfaandrywer („Solid State Drive‟) (SSD) eerder as „n hardeskyf (HHD) vir sy Notebook te koop. Differensieer tussen die SSD en HDD volgens die volgende eienskappe: (6/2)= (3)

Characteristic/Eienskappe HDD SSD (a) Capacity/Kapasiteit

(b) Noise/Geraas

(c) Cost/Koste 4.3.3 The staff doing the administrative work on the

computers, can despite the most sophisticated hardware and security systems, (often unsuspecting) cause huge damage in terms of data loss. Name THREE common „human errors‟ that can be caused. (3)

4.3.4 Give THREE reasons why social networking sites

are so prone to social engineering. (3)

TOTAL SECTION B: 30

4.3.3 Die personeel wat die administratiewe werk op die

rekenaars doen, kan ten spyte van gesofistikeerde apparatuur en sekuriteitstelsels, groot skade in terme van dataverlies aanrig. Noem DRIE algemene probleme wat deur „menslike foute‟ veroorsaak word. (3)

4.3.4 Gee DRIE redes waarom sosiale netwerktuistes so vatbaar is vir sosiale manipulasie. (3)

TOTAAL AFDELING B: 30

10

SECTION C: Communications and network technologies [30] QUESTION 5

To make sure everything is covered for the cycling event, regular meetings with the committee is important. The best way for them to stay connected is through the Internet.

5.1 Wired media consists of physical cables that

connect devices thereby allowing them to communicate. Name and describe two types of cabling that is currently used. (4)

5.2 The easiest way to send out minutes and

agendas is through mobile e-mail. 5.2.1 Mobile e-mail Apps are designed to streamline

the process of sending e-mails simpler and faster. Describe the following:

a) Notifications, b) “Push” technology, c) alternative input. (6) 5.2.2 Name the protocol used for sending e-mail via the

Internet. (1) 5.3 Describe the term topology and “star” topology.

(5) 5.4 Working from home most of the time, John needs

to connect all his computing devices, including his Smartphone, iPad, printer and desktop computer, to a network.

5.4.1 What do we call this type of network? (1) 5.4.2 How does John go about to set the WiFi at his

home for the first time? (2) 5.5 In order to have Internet access, Peter uses an

ADSL modem. 5.5.1 How does an ADSL modem work? (2) 5.5.2 What device does he need to allow all his devices

to connect to his wired network wirelessly? (1) 5.6 Most people nowadays are making use of mobile

technology. Describe THREE ways to improve your cellphone’s battery life. (3)

5.7 VOIP allows John to make a phone call over LAN,

WAN and the internet. Name three advantages and two disadvantages of using VOIP software. (5)

TOTAL SECTION C: 30

AFDELING C: Kommunikasie- en netwerktegnologieë [30] VRAAG 5

Om te verseker dat alles vir die fietswedren hanteer is, moet gereelde vergaderings deur die komitee plaasvind. Die beste manier om met mekaar in kontak te bly is deur middel van die Internet.

5.1 Wired media bestaan uit fisiese kabels wat

toestelle aan mekaar koppel met gepaardgaande kommunikasie. Noem en beskrywe twee tipes kabels wat huidiglik beskikbaar is. (4)

5.2 Die maklikste manier om notules en agendas te

versend is deur middel van mobiele e-pos. 5.2.1 Mobiele e-pos Apps word ontwerp om die proses

om e-pos te versend en te ontvang te ver-gemaklik. Beskryf die volgende:

a) Kennisgewings, b) “Push” tegnologie, c) Alternatiewe toevoermetodes. (6) 5.2.2 Noem die protokol wat vir die versending van e-

pos gebruik word. (1) 5.3 Beskryf die term topologie en “ster” topologie (5) 5.4 John werk die meeste tyd van sy huis af en het

die behoefte om al sy rekenaartoestelle, insluitend die Slimfoon, die iPad, drukker en die tafelmodel rekenaar aan ’n netwerk te verbind.

5.4.1 Wat noem ons hierdie soort netwerk? (1) 5.4.2 Hoe gaan John te werk om die WiFi vir die eerste

keer by sy huis op te stel? (2) 5.5 Om toegang tot die Internet te verkry, gebruik

John ’n ADSL modem. 5.5.1 Hoe werk ’n ADSL modem? (2) 5.5.2 Watter toestel moet hy kry om hom in staat te stel

om koordloos met die netwerk te skakel? (1) 5.6 Deesdae maak die meeste mense gebruik van

mobiele tegnologie. Beskrywe DRIE maniere om jou selfoonbattery se leeftyd te verbeter (3)

5.7 VOIP maak dit vir John moontlik om ’n

telefoonoproep oor LAN, WAN en die Internet te maak. Noem drie voordele en twee nadele van die gebruik van VOIP programmatuur. (5)

TOTAAL AFDELING C: 30 [30]

11

SECTION D: SOLUTION DEVELOPMENT [35] QUESTION 6:

AFDELING D: OPLOSSINGONTWIKKELING [35] VRAAG 6:

6.1 Cycling South Africa has bursaries for successful Grade 12 learners. An applicant must be medically fit, 18 years or older, fluent in English, matriculated with Maths and English with at least a D symbol in both subjects and prepared to work shifts. (The number 1 means that an applicant satisfies the criteria) Write an if-statement which should be used to determine if an applicant qualifies for a bursary. (6)

6.1 Cycling South Africa het beurse vir suksesvolle graad 12-leerders. 'n Aansoeker moet medies geskik wees, 18 jaar of ouer, vlot in Engels, gematrikuleer met Wiskunde en Engels met minstens 'n D-simbool in albei vakke en moet bereid wees om skofte te werk. (Die nommer 1 beteken dat 'n aansoeker voldoen aan die kriteria) Skryf 'n if-stelling wat gebruik kan word om te bepaal of 'n aansoeker kwalifiseer vir 'n beurs. (6)

6.2 Write down the result of the following functions. Assume that: sString := „I love Cycling‟

a) iPOs := pos(„e‟, sString); b) sWord := copy(sString,3,8); c) delete(sString,2,6); d) sWord := uppercase(sString); (4)

6.2 Skryf die resultate van die volgende funksies neer. Neem aan dat: sString := „I love Cycling‟

a) iPOs := pos(„e‟, sString); b) sWord := copy(sString,3,8); c) delete(sString,2,6); d) sWord := uppercase(sString);

(4) 6.3 Given:

Var sNote : string; iValue : integer; rValue : real; cSymbol : char; Are the following call statements valid or invalid? If they are invalid give a reason for your answer.

a) sNote := inc(2); b) Dec(iValue);

c) Concat(sNote, cSymbol); (3)

6.3 Gegee: Var sNote : string; iValue : integer; rValue : real; cSymbol : char; Is die volgende stellings geldig of ongeldig? Gee 'n rede vir jou antwoord indien ongeldig.

a) sNote := inc(2); b) Dec(iValue); c) Concat(sNote, cSymbol);

(3) 6.4 Study the given procedure and write down the output.

procedure TForm2.Button1Click(Sender: TObject); var iCount : integer; iFirst : real; begin iFirst := 2; iCount := 0; while iFirst <= 100 do begin inc(iCount); Memo1.Lines.Add(FloatToStr(iFirst)) ; iFirst := power(iFirst,3); end; Memo1.Lines.Add(IntToStr(iCount)); end; (5)

6.4 Bestudeer die gegewe prosedure, skryf dan die afvoer neer. procedure TForm2.Button1Click(Sender: TObject); var iCount : integer; iFirst : real; begin iFirst := 2; iCount := 0; while iFirst <= 100 do begin inc(iCount); Memo1.Lines.Add(FloatToStr(iFirst)) ; iFirst := power(iFirst,3); end; Memo1.Lines.Add(IntToStr(iCount)); end; (5)

6.5 Define validation rules for the following data: a) A character is an alphabet letter. b) A number is even. c) The achievement level in a subject for a Grade 12

learner. (The number associated with the percentage achieved in a subject.)

d) The gender of an employee. e) An ID number consists of 13 characters. (5)

6.5 Definieer validasiereëls vir die volgende data: a) „n Karakter is „n alphabet letter. b) „n Getal is ewe. c) Die prestasie vlak in 'n vak vir 'n graad 12-leerder.

(Die aantal wat verband hou met die persentasie behaal in 'n vak.)

d) Die geslag van 'n werknemer. e) 'n ID nommer bestaan uit 13 karakters. (5)

12

6.6 The following incomplete Delphi program generates an array called Letters, which will contain the letters of the alphabet in reversed order. Complete the program segment by writing down the missing parts of statements (a) to (f).

Var M : integer; arrLetters : __(a)___; k : __(b)___; begin M := __(c)___; For k := __(d)___ downTo __(e)___do Begin __(f)___ := k; M := M+1; (6) end;

6.6 Die volgende onvolledige Delphi program genereer 'n skikking met die naam Letters, dit bevat die letters van die alfabet in omgekeerde volgorde. Voltooi die programsegment deur die ontbrekende stellings (a) tot (f) in te voeg. Var M : integer; arrLetters : __(a)___; k : __(b)___; begin M := __(c)___; For k := __(d)___ downTo __(e)___do Begin __(f)___ := k; M := M+1; end; (6)

6.7 A part of a program has to read a text file of names and addresses exported from the accounting system and it must format a new file for import into the workshop management system.

(a) What kind of loop would you use to read the data from

the textfile? Explain your choice. (2) (b) If you needed to sort the data, what type of data

structure would you need to read the data into? (2) TOTAL SECTION D: 33

6.7 'n Deel van die program moet 'n tekslêer met name en adresse lees wat gestuur word vanaf die rekeningsisteem, 'n nuwe lêer moet gevorm word wat teruggestuur word in die werkswinkel se bestuurssisteem.

(a) Watter tipe herhalingstruktuur sal jy gebruik om die data uit die tekslêer te lees? Verduidelik jou keuse. (2)

(b) As jy die data moes sorteer, in watter tipe datastruktuur sou jy die data moes inlees. (2)

TOTAAL AFDELING D: 33

13

SECTION E INTEGRATED SCENARIO [32] On the day of the cycling event everything needs to run smoothly. As the administration officials are placed at different stations around the track they need to be connected in a way. Some are placed at the finishing line, receiving the times after each sector and others are sitting on the other side of the finishing Line, in a double story building – processing the data and creating report sheets that has to be send to the medal table next to the finishing line. 7.1 Explain the difference between data and information.

Support your explanation with an appropriate example according to the scenario above. (2)

7.2 It is obvious that a network will be needed between the

different administration officials. 7.2.1 Define a network. (3) 7.2.2 Every device in a network has to have a Network

Interface Controller (NIC) to allow it to communicate with the network.

How does a NIC make this communication possible? (2) 7.2.3 What type of network will be used in this scenario?

LAN, WAN, or WLAN? (1) 7.2.4 List TWO wireless technologies that can be used at the

pool. (2) 7.2.5 Inside the building, they will be making use of cabled

network. a) Give an advantage of using a cabled network over a

wireless network. (1) b) What kind of cabling would you suggest they use?

List TWO reasons why you will choose it. (3) c) List TWO weaknesses that a cable as such (6.2.5

(b)) can have. (2) 7.3 John set up an End-User AUP document. What is the

purpose of such a document? (2) 7.4 Data and information is critical to the success of the

cycling event. 7.4.1 Explain what is meant by the GIGO principle. (2) 7.4.2 „Human error‟ can create problems in terms of

accuracy and data loss. List THREE common problems in terms of „human error‟. (3)

7.5 Why should it be wise to make sure the firewalls on the computers are on? (2)

7.6 John takes precautions to ensure that if a power outage occurs damage will be minimised to the minimum.

7.6.1 What is a UPS and what is it‟s function (2) 7.7 John wants to make use of large monitors outside to

show digital results instead of making printouts. 7.7.1 What is a VODCAST? (2) 7.8 List THREE advantages of using a network compared

to stand alone computers. (3) TOTAL SECTION E: 32

AFDELING E GEÏNTEGREERDE SCENARIO [32] Op die dag van die fietswedren moet alles klopdisselboom verloop. Aangesien die administratiewe beamptes hulle op verskeie plekke langs die wedrenbaan bevind, moet hulle op ‟n sekere manier met mekaar kan kommunikeer. Sommige van hulle is langs die wenstreep, terwyl andere langs die wenstreep in ‟n dubbel-verdiepinghuis die data verwerk en die resultate weer na die medaljetafel langs die wenstreep stuur. 7.1 Verduidelik die verskil tussen data en inligting.

Gebruik ‟n gepaste voorbeeld na aanleiding van die scenario om jou voorbeeld te ondersteun. (2)

7.2 Dit is duidelik dat ‟n netwerk tussen die verskillende

beamptes noodsaaklik is. 7.2.1 Definieer ‟n netwerk. (3) 7.2.2 Elke toetsstel binne ‟n netwerk het ‟n

Netwerkkoppelvlak om kommunikasie met die netwerk te vergemaklik. Hoe bemoontlik die koppelvlak die kommunikasie? (2)

7.2.3 Watter tipe netwerk sal in hierdie scenario die

wenslikste wees? LAN, WAN, of WLAN? (1) 7.2.4 Lys twee moontlike koordlose tegnologieë wat langs

die baan gebruik kan word. (2) 7.2.5 Binne die gebou sal hulle van ‟n kabelnetwerk gebruik

maak. a) Gee ‟n voorbeeld van ‟n voordeel van ‟n

kabelnetwerk bo ‟n koordlose netwerk. (1) b) Watter soort kabel sal jy aanbeveel? GeeTWEE

redes hoekom jy die keuse vir die besluit uitoefen. (3)

c) Lys twee Swakpunte vir die gebruik van hierdie soort kabel, genoem in (6.2.5 (b)) (2)

7.3 John het ‟n Eind-Gebruiker (AUP), Aanvaarbare

Gebruikers beleid, opgestel. Wat is die doel van so ‟n dokument? (2)

7.4 Data en inligting is krities vir die sukses van die fietswedren.

7.4.1 Verduidelik wat met die GIGO beginsel bedoel word. (2) 7.4.2 „Menslike Foutering‟ kan tot gevolg hê dat

akkuraatheid en dataverlies ervaar word. Lys DRIE algemene probleme kragtens „menslike foute‟. (3)

7.5 Waarom sal dit wys om om te verseker dat firewalls op die rekenaars aangeskakel sal wees? (2)

7.6 John wil verseker dat indien ‟n kragonderbreking ontstaan geen skade tot die minimum beperk sal word.

7.6.1 Wat is ‟n UPS en wat is sy funksie? (2) 7.7 John wil gebruik maak van groot monitors buite om

onder andere die uitslae digitaal bekend te maak in plaas van gedrukte uitslae.

7.7.1 Wat is a VODCAST (2) 7.8 Lys DRIE voordele van netwerk gebruik vergeleke met

enkel rekenaars. (3) TOTAL SECTION E: 32

GRAND TOTAL: 150 GROOTTOTAAL: 150

1

PROVINCIAL EXAMINATION / PROVINSIALE EKSAMENS

INFORMATON TECHNOLOGY /

INLIGTINGTEGNOLOGIE

P2 MEMO / V2 MEMORANDUM

JUNE / JUNIE 2015

GRADE 11 / GRAAD 11

MARKS: 150 PUNTE: 150 This memo consists of 9 pages / Die memorandum bestaan uit 9 bladsye

2

Vraag 1

1.1. C 1.2. C 1.3. B 1.4. D 1.5. A 1.6. D 1.7. D 1.8. B 1.9. A 1.10. C

Vraag 2

2.1. G 2.2. B 2.3. J 2.4. K 2.5. I 2.6. C 2.7. F 2.8. D 2.9. E 2.10. H

Vraag 3

3.1. F/V 3.2. F/V 3.3. T/W 3.4. F/V 3.5. T/W

3

ANSWERS QUESTION 4 ANTWOORDE OP VRAAG 4 4.1 4.1 4.1.1 What is an “app” in computer terms? (2) Software that is used to do productive work

and accomplish specific tasks.

4.1.1 Wat is „n „app‟ in rekenaar terme? (2) Sagteware wat gebruik word om produktief

te werk en spesifieke take uit te voer. 4.1.2 What kind of operating system would John

need to be able to run this specific app on his phone? (1)

iOS7 or Android or Windows Phone 8 or Blacberry OS 10✓(ONLY ONE)

4.1.3 Why is it necessary for all computing devices to have an operating system? (2)

An operating system is system software which controls all the activities that take place in a computer. ✓ (only 2)

It use a GUI to interact with the user. ✓ OS excel at the tricks and techniques

required to simultaneousaly run multiple programs with speed and efficiency. ✓

4.1.4 It is said that this App is using a processing

technique called multithreading. Explain what multithreading is. Give an example. (3)

Multithreading is the ability of the operating system ✓to allow applications /programsto split themselves into multiple tasks (or threads) ✓ that can be run at the same time as if they were separate programs.

Example: Splitting a program like Word processor into more than one part to improve effeciency – spell checking and background printing while user input and screen display✓

4.1.2 Watter tipe bedryfstelsel sal John nodig hê om hierdie spesifieke „app‟ op sy slimfoon te gebruik? (1)

iOS7 or Android or Windows Phone 8 or Blacberry OS 10✓(NET EEN)

4.1.3 Hoekom is dit nodig dat alle rekenaartoe-stelle „n bedryfstelse moet hê? (2)

„n Bedryfstelsel is stelselprogrammatuur wat al die aktiwiteite in „n rekenaar beheer. ✓ (net twee)

Dit gebruik „n GUI om met die gebruiker te kommunikeer. ✓

BS het slim maniere om „n klomp programme op dieselfde tyd, maar steeds vinnig en doeltreffend, te laat uitvoer. ✓

4.1.4 Daar word gesê dat hierdie „App‟ „n Multidraadverwerking („multi-threading‟)-verwerkingstegniek gebruik. Verduidelik wat Multidraadverwerking is en gee „n voorbeeld. (3)

Multidraadverwerking is die vermoë van „n bedryfstelsel ✓om dit vir programme moontlik te maak om hulself in „n klomp take (threads) ✓te verdeel sodat daardie take tegelyk kan uitvoer asof hulle verskillende programme is.

Bv.: Die verdeling van „n woordverwerkers-program om spelling te kontroleer, drukwerk in die agtergrond te doen terwyl die gebruiker toevoer doen en afvoer op die skerm plaasvind. ✓

4.1.5 Name TWO other processing techniques AND explain when it will be used. (4)

Multitasking ✓ When different programs are active and the

OS splits the CPU time between the active programs and give each program a few fractions of a second of access time to the CPU so that it appears to run multiple programs at the same time. ✓

Multiprocessing ✓ When the CPU consists of more than one

physical CPU, then the OS divides the programs/threads/processes between more than one physical CPU. ✓

4.1.5 Noem TWEE ander verwerkingstegnieke EN verduidelik wanneer dit gebruik sal word. (4)

Multitaakverwerking: ✓ Wanneer „n rekenaar veelvuldige

programme tegelyk uitvoer. Die bedryfstelsel verdeel die SVE-tyd tussen die aktiewe programme en gee elkeen „n paar millisekondes toegangstyd tot die SVE. ✓

Multiverwerking: ✓ Die bedryfstelsel verdeel die programme,

drade of prosesse tussen verskillende verwerkers. ✓

4

4.2 To be able to run applications on a computer, RAM is needed.

4.2.1 Why is RAM so essential? (2) All the data and instructions (like this

application) ✓have to be loaded into the RAM before the CPU can work with it. ✓

4.2.2 Without buying new RAM, how can you

overcome the problem when more RAM is needed than what is currently available? (1)

The OS can make use of virtual memory. ✓ 4.2.3 What is the characteristics RAM? (4) RAM is: Electronic / elektronies✓(only 4) Fast / vinnig✓ Volatile / vlugtig / onbestendig✓ Comparatively expensive / relatief duur✓ Limited / beperk✓

4.2 Om toepassings-programme(„applications‟) op „n rekenaar te gebruik, word RAM benodig.

4.2.1 Hoekom is RAM essensieel? (2) Alle data en instruksies✓ moet in die RAM

gelaai word voordat daarmee gewerk kan word. ✓

4.2.2 Hoe kan jy die probleem oorkom as meer RAM nodig is as wat tans beskikbaar is, sonder om nuwe RAM te koop? (1) Die bedryfstelsel kan gebruik maak van

virtual memory✓ 4.2.3 Wat is die eienskappe van RAM? (4) RAM is: Electronic / elektronies✓(slegs 4) Fast / vinnig✓ Volatile / vlugtig / onbestendig✓ Comparatively expensive / relatief duur✓ Limited / beperk✓

4.3.1 Examine the following extract showing the specifications of one of the computers: Name TWO hardware components that need to be upgraded. (2) RAM✓ CPU (Processor) ✓

4.3.1 Bestudeer die volgende skermskoot wat die spesifikasies van een van die rekenaars toon: Noem TWEE hardeware komponente wat opgegradeer moet word. (2) RAM✓ SVE / CPU (Processor) ✓

4.3.2 John is considering buying a Solid State

Drive (SSD) instead of a traditional hard drive (HHD) for his notebook. Differentiate between the SSD and HDD according to the following characteristics: (6/2) (3)

4.3.2 John oorweeg dit om „n Vastetoestand-Skyfaandrywer („Solid State Drive‟) (SSD) eerder as „n hardeskyf (HHD) vir sy Notebook te koop. Differensieer tussen die SSD en HDD volgens die volgende eienskappe: (6/2) (3)

Characteristic/Eienskappe HDD SSD (a) Capacity/Kapasiteit Typically 500 GB – 2 TB for

notebook size drives✓ Typically not larger than 512 GB for notebook size drives✓

(b) Noise/Geraas Audible clicks and spinning can be heard✓

No moving parts and as such no sound. ✓

(c) Cost/Koste Cheap✓ VExpensive✓

4.3.3 The staff doing the administrative work on the computers, can despite the most sophisticated hardware and security systems, (often unsuspecting) cause huge damage in terms of data loss. Name THREE common „human errors‟ that can be caused. (3)

Accidentally deleting files or reformatting a disk. ✓ (only 3)

Not ensuring that the regular backups are

4.3.3 Die personeel wat die administratiewe werk op die rekenaars doen, kan ten spyte van gesofistikeerde apparatuur en sekuriteitstelsels, groot skade in terme van dataverlies aanrig. Noem DRIE algemene probleme wat deur „menslike foute‟ veroorsaak word. (3)

Lêers word per ongeluk uitgevee✓ (net 3) Daar word nie gereelde rugsteun gemaak

nie✓

5

made. ✓ Entering incorrect data in a program. Losing or misplacing portable storage

devices. ✓ Allowing other unauthorised users to get

access to data by not following basic security principles such as having a secure password and changing it on a regular basis. ✓

4.3.4 Give THREE reasons why social

networking sites are so prone to social engineering. (3)

The vast number of users of social networking websites on a daily basis creates a potentially vast „target market‟✓. An „artificial‟ level of trust that is developed as „friends‟ on social networking sites can be used to cause the user to give out information that they should not. ✓ Users often publish personal details such as their cellphone numbers or names of their pets which they may have used as their passwords etc. ✓

Die verkeerde data word in „n program ingevoer. ✓

Draagbare toestelle raak weg. ✓ Basiese sekuriteitsbeginsels – soos sterk

wagwoorde en gereelde verandering daarvan – word nie gebruik nie. ✓ (ongemagtigde gebruikers kry toegang tot die data).

4.3.4 Gee DRIE redes waarom sosiale netwerktuistes so vatbaar is vir sosiale manipulasie. (3)

Duisende sosiale webtuistes word elke dag deur miljoene gebruikers besoek, wat van die gebruikers sowel as hulle rekenaars ‟n groot „teikenmark‟ maak. ✓

‟n „Kunsmatige‟ vlak van vertroue bestaan tussen „vriende‟ op sosiale netwerktuistes en kan uitgebuit word sodat gebruikers vertroulike inligting verskaf. ✓

Gebruikers vertoon dikwels hul persoonlike inligting soos selfoonnommers en hulle troeteldiere se name wat hulle dalk as hul wagwoorde gebruik het! ✓

TOTAL SECTION B: 30 TOTAAL AFDELING B: 30

6

SECTION C: Communications and network technologies [30] QUESTION 5

To make sure everything is covered for the cycling event, regular meetings with the committee is important. The best way for them to stay connected is through the Internet.

5.1 Wired media consists of physical cables that

connect devices thereby allowing them to communicate. Name and describe two types of cabling that is currently used. (4)

5.1 UTP CABLES✓ – (Unshielded twisted pair) most common way of connecting computers in a LAN. Electrical pulses along copper. ✓

Fibre Optic cables✓ – Convert electrical signals to light pulses. Does not reduce in quality. Offers a larger bandwith. ✓

5.2 The easiest way to send out minutes and

agendas is through mobile e-mail. 5.2.1 Mobile e-mail Apps are designed to streamline

the process of sending e-mails simpler and faster. Describe the following:

a) Notifications, b) “Push” technology, c) alternative input. (6)

Notifications – As user you don‟t need to check for e-mail, you will be notified with a sound and a message on-screen. ✓✓ Push-technology – the server notifies the device that a new message has arrived and then downloads it to the device automatically. ✓✓ Alternative input – The input often includes the ability to dictate a reply using voice recognition. ✓✓

5.2.2 Name the protocol used for sending e-mail via the

Internet. (1) SMTP✓

AFDELING C: Kommunikasie- en netwerktegnologieë [30] VRAAG 5

OM te verseker dat alles vir die fietswedren hanteer is moet gereelde vergaderings deur die komitee plaasvind. Die beste manier om met mekaar in kontak te bly is deur middel van die internet.

5.1 Wired media bestaan uit fisiese kabels wat

toestelle aan mekaar koppel met gepaardgaande kommunikasie. Noem en beskrywe twee tipes kabels wat huidig beskikbaar (4)

5.1 UTP kabels ✓- (Unshielded twisted pair) algemene manier om rekenaars te verbind in LAN. ✓

Veseloptiese kabels✓ skakel elektriese pulse om na lig pulse Kwaliteit word nie ingeboet nie. Groter bandwydte word verkry. ✓

5.2 Die maklikste manier om notules en agendas te

versend is deur middel van mobiele e-pos. 5.2.1 Mobiele e-pos Apps word ontwerp om die proses

om e-pos te versend en te ontvang te vergemaklik. Beskryf die volgende:

a) Kennisgewings b) “Push” tegnologie c) Alternatiewe toevoermetodes (6)

Kennisgewings – As gebruiker het jy nie nodig om e-pos na te gaan nie, jy sal d.m.v. ‟n geluid/klank kennis kry en die boodskap sal op jou skerm vertoon. ✓✓ “Push”-tegnologie – die bediener stel die toestel in kennis dat ‟n nuwe boodskap ontvang is en versend dit outomaties na die toestel. ✓✓ Alternatiewe toevoermetodes – Toevoer sluit baie keer die vermoë in om d.m.v. diktering met jou eie stemherkenning te antwoord. ✓✓

5.2.2 Noem die protokol wat vir die versending van e-

pos gebruik word. (1) SMTP✓ [30]

7

5.3 Topology refers to the layout of the physical connection of the computers in the network. ✓

Every computer is connected via its own cable to a central device such as a switch. ✓

This means the central device can direct traffic from sender to receiver. ✓

IT is not broadcasted to all the devices on the network. ✓

If the communication in a single cable breaks it would mean that only that device need to be disconnected from the server. ✓ (5)

5.4.1 Wireless Fidelity (WiFi) ✓ (1) 5.4.2 The first time you connect the device to the WiFi it will

ask you to enter a password and thereafter it would connect tot the WiFi network automatically. ✓✓ (2)

5.5.1 An ADSL modem converts the data for high speed data transfer over digital telephone networks using a normal telephone Line. ✓✓ (2)

5.5.2 WI-Fi adaptor built into the ADSL modem✓ (1) 5.6

x Set the display✓ (any 3) x Minimise multitasking✓ x Minimise GPS usage✓ x Minimise Bluetooth and WI-FI connectivity✓ x Minimise Media usage as it uses the built-in

speaker and power. ✓ (3) 5.7 Advantages: (any 3) x VOIP calls are cheaper than normal telephone calls. x The software is generally free. x VOIP allows you to transfer files as well as make

video conference calls Disadvantages:(any 2) x You need to have INTERNET and both users need to

use the same software x You need to purchase credits to call telephones that

are not on the INTERNET. x The call quality may be poor if you have a slow

Internet connection. x Your data cap can be used up quickly, especially when

using video (5)

5.3 Topologie verwys na die rekenaaruitleg binne ‟n netwerk. ✓

Elke rekenaar is met ‟n kabel verbind tot die sentrale toestel d.m.v. onder andere ‟n skakelaar✓

Dit beteken dat die sentrale toestel verkeer beheer tussen sender en ontvanger. ✓

Die kommunikasie word nie na alle toestelle wat aan die netwerk verbind is versend nie. ✓

Indien kommunikasie in een kabel verbreek word word slegs die toestel wat verbind is ontkoppel. ✓ (5)

5.4.1 Wireless Fidelity (WiFi) ✓ (1) 5.4.2 Wanneer jy jou toestel vir die eerste keer aan die WiFI

wil koppel sal jy om jou wagwoord versoek word wat daarna deur die toestel “onthou” word. ✓✓ (2)

5.5.1 ‟n ADSL modem skakel data vir hoë spoed verwerking

oor „n digitale telefoonnetwerk deur ‟n gewone telefoonlyn. ✓✓ (2)

5.5.2 WI-FI passtuk in die ADSL modem ingebou. ✓ (1) 5.6

x Stel die beeld op die skerm✓(enige 3) x Minimeer GPS gebruik. ✓ x Minimeer Bluetooth en WI-FI koppeling✓ x Mimimeer Media gebruik aangedien dit die

ingeboue luidspreker en krag gebruik. ✓ (3) 5.7 Voordele: (enige 3) x VOIP is goedkoper as normale telefoonoproepe x Die programmatuur is gratis x VOIP laat oordrag van lêers en video-oproepe toe Nadele: (enige 2) x Beide gebruikers moet Internet hê. x Vir telefone wat nie aan die Internet gekoppel is nie

sal krediete aangekoop moet word. x N.A.V. swak konneksies sal oproepe stadig wees x Data bondel kan maklik opgebruik word veral

wanneer video‟s versend word. (5)

8

6

Question 6

(memo) 6.1 if (MedicalFit=1) and (Age>=18) and (EngFluent=1) and (Maths<='D') and (English <= 'D') and (Shifts = 1), (6) 6.2

6 a) love Del b) IDELPHI c) IDELPHI (4)

6.3 a) invalid - type mismatch

b) valid c) invalid - toekenning (3)

6.4 2 8 2 (5)

6.5 a) Karakter in [„A‟..‟Z‟,‟a‟..‟z‟] b) Uit := getal = Odd(getal); c) Persentasie <= 100 and persentasie >= 0; d) Geslag = „M‟ OR geslag = „V‟; e) Length(ID) = 13; (5)

6.6

a) Array[1..26] of char; b) char; c) „Z‟ of „z‟ d) „A‟ of „a‟ e) Letters[k] (6)

6.7 a) While loop. .N1 You do not know how many records you have to read in the

text file. .N1. (2) b) Read the data into arrays. .N1.N1 (2)

SECTION D: Solution development [35]

9

Question 7 / vraag 7 MEMO 7.1 ✓ Data is raw, unprocessed facts – the cyclists finishing times. Information is the result of the processing of data and should be useful and meaningful – the list of placings according to

times swam. ✓ (2) 7.2 7.2.1 A network is a ✓ collection of computers (or other computing devices) ✓that is connected by some sort of

communication media ✓to allow users to share hardware, software, data and information and to communicate. (3) 7.2.2 The NIC get data from the rest of the computer system and encode the data so that it can be sent over a specific medium. ✓ receives data over the medium and decodes it so that it can be understood by the rest of the computer system. ✓ (2) 7.2.3 ✓WLAN (1) 7.2.4 ✓ 3G / 4G / WiMAX (Any TWO) (2) 7.2.5 (a) ✓ The data transmission over a cabled LAN is much faster than over a WLAN. (1) (b) ✓UTP Relatively cheap ✓ Will only be used over short distances. ✓ (3) (c) (Any TWO of the following) Attenuation Eavesdropping Crosstalk Electromagnetic interference (EMI) (2) 7.3 ✓To outline the rights and ✓responsibilities of users especially in network environments. (2) 7.4 7.4.1 GIGO = Garbage In, Garbage Out This means that if incorrect data has been input, ✓then the computer will not sort it out – the output produced will also

be a „mess‟. (2) 7.4.2 (Any THREE of the following OR an acceptable example) Accidentally deleting files or formatting a disk Not ensuring that regular backups are made Entering incorrect data in a program Losing or misplacing portable storage devices Allowing other unauthorised users to get access to data by not following basic principles such as having a secure password

and changing it on a regular basis. (3) 7.5 ✓✓A firewall acts as a barrier between the computer and the internet. It checks which programs are trying to access your

computer via the Internet or are trying to access the Internet from your computer. (2) 7.6 7.6.1 ✓✓UPS= Uninterrupted Powersupply. A device that puts a battery and a management system between the computer

an the mains power supply. (2) 7.7 7.7.1 ✓A Video Podcast includes Video clips and photos and is downloaded and played as a movie. (2) 7.8 (Any THREE) Fast, efficient communication Sharing of hardware resources Centralisation of data Transfer of files Increased control and security Flexible access (Leisure) (3)

TOTAL SECTION F: 32

GROOTTOTAAL: 150 GRAND TOTAL: 150