Computer Application Technology P2 May-June 2017 Eng PDF
Computer Application Technology P2 May-June 2017 Eng PDF
2017
MARKS: 150
TIME: 3 hours
3. Number the answers correctly according to the numbering system used in this
question paper.
SECTION A
Various options are provided as possible answers to the following questions. Write
down the question number (1.1–1.10), choose the answer and make a cross (X) over
the letter (A–D) of your choice in the ANSWER BOOK.
EXAMPLE:
1.11 A B C D
A Permanent
B Temporary
C Multi-core
D Part of CPU (1)
1.3 Which ONE of the following devices allows a computer to safely shut down in
the event of a power failure?
A USB
B GPU
C PSU
D UPS (1)
1.4 Which ONE of the following data transmission technologies does NOT belong
with the others?
A Wi-Fi
B 3G
C Fibre
D LTE (1)
1.5 The same application can be used to open the file types …
A less advertising.
B a decrease in processing speed.
C a slowing down of the economy.
D telecommuting. (1)
A Hardware
B Ergonomics
C Hacking
D Biometrics (1)
1.10 Which ONE of the following formulas gives the output in cell C2 below:
A =CONCATENATE(RIGHT(A2,2),B2)
B =CONCATENATE(LEFT(B2,2),A2)
C =CONCATENATE(LEFT(A2,2),B2)
D =CONCATENATE(MID(A2,2,2),B2) (1)
[10]
COLUMN A COLUMN B
2.1 A program in an office suite where the A ICASA
copy-down/auto-fill feature is more likely
to be used B CPU
Q firewall
R FTP
T ISP
(10 x 1) [10]
Indicate whether the following statements are TRUE or FALSE. Choose the answer
and write 'true' or 'false' next to the question number (3.1–3.5) in the ANSWER BOOK.
Correct the statement if it is FALSE. Change the underlined word(s) to make the
statement TRUE. (You may not simply use the word 'NOT' to change the statement.
NO mark will be awarded if only FALSE is written down.)
EXAMPLES:
QUESTION ANSWER
Google is the world's most popular search
True
engine.
3.4 Reducing the size of attachments and not typing in capital letters are phishing
rules. (1)
3.5 A minus operator before a key word will exclude search results containing
that word. (1)
[5]
TOTAL SECTION A: 25
SECTION B
4.1 What is the difference in function between the Ctrl-X and Ctrl-C keyboard
shortcuts? (1)
4.2 What is the function of the Recycle Bin on the desktop? (1)
4.5 Name TWO devices that allow a computer to communicate with other
computers. (2)
4.7 Create a strong password by applying at least FOUR rules. (Do NOT explain
what these rules are.) (4)
4.8 There are different ways to connect a monitor to a computer. Study the
picture below and answer the questions that follow.
4.8.1 What is the name of the component on which one will find the three
ports shown above? (1)
4.9 What type of input device is used to capture natural handwriting? (1)
4.10 Where would you commonly find new apps for a mobile device? (1)
4.11 You have downloaded an app that asks permission to access some data and
features on your mobile device.
Motivate why you would NOT grant an app certain permissions. (2)
4.13 State TWO criteria, other than the name of the file, which can be used in
Windows Explorer when searching for a file. (2)
4.14 Explain the purpose of system utilities and give an example. (2)
[25]
5.1 Name the device that connects a LAN to the Internet. (1)
5.3 Name TWO types of network technologies that notebook computers support. (2)
5.4 You have two switches, each with four Ethernet ports.
How would you go about connecting six computers in a network, using only
these switches? (2)
5.5 Why would a 10 Mbps ADSL line be unsuitable for someone who needs an
upload bandwidth of 10 Mbps? (2)
5.7.2 Give TWO reasons for broken hyperlinks on a web page. (2)
5.8 What is the minimum number of participants in a chat room, given its
purpose? (1)
5.9 How is the Internet different from the World Wide Web? (1)
[15]
6.1 Why must one include the URLs of websites used for research in your
bibliography? (1)
Task 1
Name and
Grade
Surname 40
marks
Lungisa Mbongwe 12 35
Songela Dumisa 12 12
Hendrik Williams 12 16
Zodwa Cele 12 42
John Mokoena 12 36
Average 12 28.2
Identify TWO errors in the record sheet above which affect the quality of the
information. (2)
6.4 Study the graph below and answer the questions that follow.
80
70
60 Bachelor passes
50 Pass rate
40
Academic year
6.4.3 What do the trends, represented by the graph, show about the
quality of the school's results? (1)
6.4.4 Give ONE recommendation based on the information in the graph. (1)
[10]
7.2 Give TWO examples of a situation when the right to access information may
be more important than the right to privacy. (2)
7.3 State TWO negative implications of 3D printers, which are becoming more
common. (2)
7.4 Recommend TWO strategies to control social unrest with the use of ICTs. (2)
7.5.1 State ONE advantage for society of the withdrawal of the faulty
devices. (1)
8.2 What is the effect of using the spreadsheet feature 'Format as Table' on a cell
range? (2)
8.3 Give an example of a spreadsheet function that cuts off only the decimal
portion of a number. (1)
8.4 State TWO common problems when importing data from a CSV file into a
database. (2)
8.6 A heading that was later added to a document does not appear in the
automatic table of contents.
State TWO steps to take to ensure that this new heading will appear in the
automatic table of contents. (2)
8.7 An image on a web page you created does not display fully in the
browser.
Suggest TWO ways to ensure that the image is fully visible. (2)
8.8 The following HTML code was taken from a working HTML document:
<table>
<tr><td></td></tr>
</table>
8.8.1 How many cells should be displayed in the first row? (1)
8.8.2 Why will this code not display anything in the browser? (1)
[15]
TOTAL SECTION B: 75
QUESTION 9
Your community has established a community policing forum (CPF). The chairperson
of the forum has asked you to help with improving their ICT system.
9.1 The CPF office has three computers for administrative work. These
computers have the following specifications:
9.1.1 These computers are quite slow. Suggest TWO ways to improve
their performance. (2)
9.1.2 The mouse on one of the computers is not working. Discuss how
you would go about checking what the problem may be. (1)
9.1.4 State TWO ways in which one can know that these computers
are old. (2)
9.2 The CPF has decided to install a surveillance system using cameras around
their office. All videos will be stored on hard drives (HDDs).
9.2.1 Explain why the CPF should purchase high-capacity hard drives. (1)
9.2.2 Suggest ONE way to manage the situation when the HDDs are full,
but recording must continue. (1)
9.3 The CPF has been using social media for communication with community
members.
9.3.1 Give TWO reasons why it may not be a good idea to discuss victims
of crime on social media. (2)
9.3.2 Explain why it would be good to use WhatsApp for alerting residents
to possible threats. (2)
9.4 Give TWO reasons why it would be a good idea for the CPF to back up their
data to a cloud service. (2)
9.5.1 Name TWO database features that can be used to determine the
number of females who are older than 60 years. (2)
9.6 Study the graph on crime statistics below and answer the questions that
follow.
Burglaries
Car Theft
9.6.1 Suggest THREE ways to make the graph easier to understand. (3)
9.6.2 Why would a pie graph not be suitable to represent this information? (1)
[25]
QUESTION 10
Your friends are planning a trip to the Cango Caves. They need your advice on how to
make their experience more enjoyable with the help of ICTs.
10.1.2 How would you book a car on a mobile device without using the
rental agency website? (1)
10.1.3 State TWO ways to pinpoint the different places you visit on your
mobile device in order to view them later on a map. (2)
10.1.4 How could ICTs help you communicate with your taxi driver if he
does not speak your language? (1)
10.2 Your friends might want to visit a local coffee shop on their way to the caves.
You found directions to a coffee shop online.
10.2.2 Give TWO technical reasons why a mobile phone payment may be
unsuccessful. (2)
10.2.3 Discuss TWO ways to protect yourself from falling victim to bank
card fraud at the coffee shop. (2)
10.3.1 Give TWO reasons why the picture quality of a smartphone camera
is poorer than that of a professional camera (DSLR). (2)
10.3.2 Why can't your friends use a map app for automatic turn-by-turn
directions in the caves? (1)
10.4 Your friends want to keep in regular contact with their families.
10.4.1 State TWO advantages of using Wi-Fi hotspots for making VoIP
calls. (2)
10.4.2 Discuss TWO security issues associated with using Wi-Fi hotspots. (2)
10.4.3 Give TWO reasons why your friends should NOT consider using
satellite broadband while they are travelling. (2)
10.4.4 What can be the reason for poor video quality of a Skype call if there
are no issues with either bandwidth or connectivity? (1)
10.4.5 How could you access all the pictures of the trip on your friend's
cloud account? (2)
[25]
TOTAL SECTION C: 50
GRAND TOTAL: 150
Copyright reserved