Computer Application Technology P2 Nov 2017 Eng
Computer Application Technology P2 Nov 2017 Eng
SENIOR CERTIFICATE
GRADE 12
NOVEMBER 2017
MARKS: 150
TIME: 3 hours
3. Number the answers correctly according to the numbering system used in this
question paper.
SECTION A
Various options are provided as possible answers to the following questions. Choose
the answer and write only the letter (A–D) next to the question number (1.1.1–1.1.10)
in the ANSWER BOOK, for example 1.1.11 D.
A Printer
B Scanner
C Stylus
D Monitor (1)
1.2 Which CPU in the following list is the best choice for video-editing?
A i3
B i7
C Pentium
D Celeron (1)
1.3 Which storage device will be more likely to break when it is accidentally
dropped?
A HDD
B USB flash disk
C SSD
D MicroSD card (1)
A Disk Cleanup.
B System Restore.
C Task Manager.
D Disk Defragmenter. (1)
1.5 If the display on a monitor appears to be the wrong size or out of focus, it may
be corrected by changing the … of the monitor.
A position
B brightness
C resolution
D contrast (1)
1.7 Using a wizard to get data from a CSV file into an application is called …
A exporting.
B spooling.
C importing.
D compressing. (1)
1.8 Which ONE of the following devices in a LAN is more likely to have a built-in
firewall?
A Printer
B Router
C Mobile client
D Workstation (1)
1.9 A pattern of change in data over time is best described by the term …
A trend.
B process.
C thread.
D graph. (1)
1.10 Which ONE of the following processes is useful when analysing data?
A Recycling
B Cleaning
C Archiving
D Comparing (1)
[10]
COLUMN A COLUMN B
2.1 Unit of measurement applicable to A MHz
bandwidth
B eye tracking
2.2 An example of a commonly used
aspect ratio C caching
P power-saving
Q encryption
R CPU
S fibre optics
T Trojan
(10 x 1) [10]
Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false'
next to the question number (3.1–3.5) in the ANSWER BOOK. Correct the statement if
it is FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word 'NOT' to change the statement. NO mark will be awarded if
only FALSE is written down.)
EXAMPLES:
QUESTION ANSWER
Google is the world's most popular search
True
engine.
3.3 Formatting a USB flash disk will back up any data stored on it. (1)
3.5 The spreadsheet functions LEFT and RIGHT can be replaced by the
function CONCATENATE to get the same result. (1)
[5]
TOTAL SECTION A: 25
SECTION B
4.2 State TWO ways in which the GUI of a mobile app differs from the desktop
version of the same app. (2)
4.4 Suggest TWO ways to fix a mouse pointer that moves in an unpredictable
way, without replacing the mouse. (2)
4.5 Give TWO reasons why many modern notebooks no longer include an optical
drive. (2)
4.7 What should a user do when the trial period of a software product has
expired? (1)
4.8.1 State ONE advantage of using the PDF file format. (1)
4.8.2 How would you convert an office suite document to PDF? (1)
4.8.3 You receive two documents in PDF format. Both are one page long.
Explain why they have different file sizes AND why it is not possible
to do a text search in one of the two. (2)
4.9 Explain TWO ways to find a program on your computer, OTHER than using
the Start Menu. (2)
4.10 Explain how a POS device finds the price of a product after it is scanned. (2)
4.11 Name TWO features to look for in laptop computer hardware that will make
upgrades easier in future. (2)
4.12.1 Name TWO pieces of equipment one would need for VR. (2)
5.3 Give TWO reasons why a school may not want to use cloud storage for
storing large volumes of data. (2)
5.4 Name ONE type of technology that uses radio waves for data transfer. (1)
5.6 User access rights can limit what a user can do on a network.
Give TWO examples of access rights that restrict a user on a network. (2)
5.8.2 Why is it not recommended to use VoIP for emergency calls? (1)
5.8.3 Why would a user reduce the quality of VoIP calls? (1)
5.9 Suggest TWO ways in which a user can listen to music on a smartphone that
has no headphone jack (port). (2)
[15]
6.2 An Internet search returned a link from an advertiser at the top of the set of
results.
Give a reason why it may not be a good idea to follow this link. (1)
6.3 The graphs below represent the change in male and female learner numbers
over a period of time.
Males Males
Females Females
6.3.1 What conclusion can be made based on the data above? (1)
6.3.2 What type of graph would you use to combine the information in the
graphs above? (1)
6.4 How does the number of respondents affect the outcome of a survey? (1)
6.5 Give ONE reason why the values in the Name column and Marks column in
the data below were not sorted correctly.
6.6 Identify THREE problems in the wizard below that will affect the quality of data
when the import process is completed.
(3)
[10]
7.1 Name the computer crime that has to do with posting false information/
accusations about another person online. (1)
7.2 Suggest TWO rules for an acceptable use policy (AUP) in a school computer
centre that has Internet access. (2)
7.3 While installing software, you were not required to enter a product key.
Suggest TWO guidelines for the company to ethically manage client data. (2)
7.5 Study the picture below and answer the questions that follow.
NOTE: Assume that BANKZA is the name of a legitimate South African bank.
7.5.1 Identify the type of scam represented in the picture above. (1)
7.5.2 State TWO ways in which a user can identify this as a scam. (2)
[10]
8.1 Why would one turn on the formatting symbols, as is done in the screenshot
below?
(1)
8.2 Look at the screenshot of a table below and answer the questions that follow.
8.2.1 What is the current width of the page without the margins? (1)
8.2.2 Suggest a way to reduce the number of cells in the table WITHOUT
deleting any text. (1)
8.2.3 State TWO general ways to configure the spell checker to get rid of
the automatic underline. (2)
8.2.4 The table in the screenshot above is too wide to display correctly.
Suggest ONE way to make the table fit on the page. (1)
This image should display smaller when the following HTML code is
executed:
8.3.1 How does the image size specified in the HTML code affect the
original size of the image saved on a disk? (1)
8.3.3 Comment on the accessibility of the image in the web page for blind
users. Motivate your answer. (2)
8.4 Look at the screenshot of a spreadsheet below and answer the questions that
follow.
8.4.1 Give the term for the feature that was applied to give the
'Value error' dialog as a result. (1)
8.4.2 What is the purpose of the dropdown buttons next to the column
headings in the image? (1)
Which field would you choose as a primary key? Explain the reason
for your choice. (2)
[15]
TOTAL SECTION B: 75
QUESTION 9
The local municipality asked you to use your knowledge of ICTs to help them
implement an effective water-saving campaign.
9.1 They want to create an information booklet with images for the campaign.
9.1.1 Name an application that can be used to design such a booklet. (1)
9.1.2 Why would A2 size paper be a bad choice for printing the booklet? (1)
9.1.3 Suggest TWO ways to save ink when printing a project. (2)
9.1.5 A digital camera will be used to take photographs for the booklet.
Name TWO types of storage media one can use with the digital
camera for saving the photographs. (2)
9.2 The municipality will publish an online list of citizens who saved or wasted the
most water for the month.
9.2.2 Identify a field in the list below in which the same data has to be
entered repeatedly AND suggest a property that one can set to
avoid manual capturing of duplicate data.
9.2.5 Discuss TWO implications of posting the names of the top ten
offenders online. (2)
9.2.6 Name TWO design principles that would make the municipal website
easy to use. (2)
9.2.7 How can a hacker force the municipal website to go offline? (1)
9.3.1 State TWO problems regarding the use of the question below that
appeared in the survey.
(2)
9.3.2 State TWO methods to conduct this water awareness survey. (2)
9.3.3 What are the implications for the survey findings if the same people
can submit more than one survey response? (1)
[25]
QUESTION 10
10.1.2 Give TWO reasons for using an SSD rather than a traditional hard
drive on laptop computers for the officers. (2)
10.1.3 Give a specification of the laptop computer screen that will affect its
use in sunlight. (1)
10.2 Local government wants to develop an app that people can use to report an
incident as soon as it happens. They will rely on the community to fund the
project.
10.3 People may have to leave their homes when disaster strikes. They will be
accommodated in community halls or churches.
10.3.1 State an advantage of using RFID tags for people that have been
displaced as a result of a disaster. (1)
10.3.4 What service can the municipality set up at the venues to provide
free wireless Internet access to the people accommodated there? (1)
10.3.5 State TWO precautions one should take when using a public
computer. (2)
10.4 The following message appears on a computer that was made available in
one of the venues:
We're sorry, but we encrypted (scrambled) ALL the files on your computer.
To make your computer work again, please pay 3 Bitcoin to the provided
account.
We thank you.
10.4.1 What type of software is to blame for the message above? (1)
10.4.3 State an advantage of being paid in Bitcoin for the authors of the
message. (1)
10.4.4 What action can the municipal IT department take to react to this
threat? (1)
10.5 An example spreadsheet with natural disaster survivor details was drafted
as follows:
10.5.2 The following function will be used to calculate the average age of
the survivors:
=AVERAGE(D2:D200)
Why would it not give the average age of the survivors? (1)
10.5.3 State TWO ways to fully display the word 'Age_Group' in cell E1. (2)
[25]
TOTAL SECTION C: 50
GRAND TOTAL: 150
Copyright reserved *