0% found this document useful (0 votes)
559 views12 pages

CAT P2 GR11 MEMO NOVEMBER 2022 - English

The document provides a marking guideline for a Grade 11 Computer Applications Technology paper 2 exam. It consists of multiple choice questions, matching items, true/false questions and longer answer questions on topics like systems technologies, internet and network technologies, and information management.

Uploaded by

Asemahle Mkiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
559 views12 pages

CAT P2 GR11 MEMO NOVEMBER 2022 - English

The document provides a marking guideline for a Grade 11 Computer Applications Technology paper 2 exam. It consists of multiple choice questions, matching items, true/false questions and longer answer questions on topics like systems technologies, internet and network technologies, and information management.

Uploaded by

Asemahle Mkiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

NATIONAL

SENIOR CERTIFICATE

GRADE 11

NOVEMBER 2022

COMPUTER APPLICATIONS TECHNOLOGY P2


MARKING GUIDELINE
(EXEMPLAR)

MARKS: 150

These marking guidelines consist of 12 pages.


2 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

SECTION A: SHORT QUESTIONS

QUESTION 1: MULTIPLE-CHOICE

1.1 D✓ (1)
1.2 B✓ (1)
1.3 D✓ (1)
1.4 A✓ (1)
1.5 D✓ (1)
1.6 D✓ (1)
1.7 A✓ (1)
1.8 C✓ (1)
1.9 B✓ (1)
1.10 B✓ (1)
[10]

QUESTION 2: MATCHING ITEMS

2.1 J✓ (1)
2.2 E✓ (1)
2.3 A✓ (1)
2.4 K✓ (1)
2.5 F✓ (1)
2.6 C✓ (1)
2.7 I✓ (1)
2.8 D✓ (1)
2.9 O✓ (1)
2.10 M✓ (1)
[10]

QUESTION 3: TRUE/FALSE

3.1 True ✓ (1)

3.2 False – aspect ✓ (1)

3.3 True ✓ (1)

3.4 False-diagonally ✓ (1)

3.5 False – archiving ✓ (1)


[5]

TOTAL SECTION A: 25

Copyright reserved Please turn over


(EC/NOVEMBER 2022) COMPUTER APPLICATIONS TECHNOLOGY P2 3

SECTION B

QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 CPU / Processor ✓


Hard drive / Storage ✓
Memory / RAM ✓ 3 3
4.2 Any TWO benefits:
• Prevents data loss ✓
• Protects hardware against power surges / spikes ✓
• Gives time to save work and shut down properly (in case of load
shedding, etc.) (Any 2) 2 2
4.3 Any TWO disadvantages / limitations:

• Data input / typing is not fast or easy (compared to physical


keyboard) ✓
• Touch screen can become dirty / oily / smudged ✓
• Does not work well on a desktop device or in office environment,
but is good on portable / handheld devces
• On-screen keyboards reduce screen display area whilst in use
• Some touch screens need extra pressure to work and may seem
unresponsive
• Quality of the ‘touch experience’ depends on operating system
being used (Any 2) 2 2
4.4 4.4.1 Printed version of a file (paper) ✓ 1
4.4.2 Additional hardware: scanner ✓
Additional software: OCR software ✓ 2 3
4.5 • Refers to the use of unique biological / physical
characteristics ✓
• for security / identification / authorisation purposes ✓ 2 2
4.6 The maximum number of pages that can be printed in a month ✓
without the printer failing / breaking. ✓ 2 2
4.7 Typical installations: the components of the software that most
users
want ✓
Custom – you can choose which components to install ✓ 2 2
4.8 Any TWO advantages:
• Accessible wherever there is internet access ✓
• Accessible from / via a variety of devices ✓
• Backup and security handled by the service provider
• Saves space on local storage
• Allows for files to be synchronised across multiple devices
• Promotes easier sharing of files
• Do not lose data if computer is damaged / stolen, etc. (Any 2)
(Note to marker: Do not accept answers related to cost savings.) 2 2
4.9 • Faster speed ✓ (faster access to drive)
• Less loading time ✓ (retrieves files faster)
(Note to marker: Also accept – reorganises part of files on a disk.) 2 2
Copyright reserved Please turn over
4 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

4.10 4.10.1 Blogs are online publishing tools. ✓ 1


4.10.2 Bloggers make money through:

• advertising ✓
• sponsorship ✓
• subscription (Any 2) 2 3
4.11 Any TWO functions:

• Provides slots for connecting / adding components / adapters ✓


• Provides power to connected components ✓
• Allows for communication / data exchange between connected
components
• Provides connection for external devices via ports, etc.

(Any 2) 2 2
[25]

Copyright reserved Please turn over


(EC/NOVEMBER 2022) COMPUTER APPLICATIONS TECHNOLOGY P2 5

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Any TWO differences:

• Fibre cables use light signals to transmit data, whereas UTP


cables use electrical signals to transmit data. ✓
• Fibre cables can span much longer distances while UTP cables
can only span a certain distance before the signal strength gets
weaker. ✓
• Fibre cables provide for much faster data transmission than UTP
cables.
• Fibre cable is immune to eavesdropping.
• Fibre is not affected by electromagnetic interference.

(Any 2) 2 2
5.2 5.2.1 • 3G ✓
• 4G / LTE ✓ (Any 1) 1
5.2.2 A hotspot is a location/area where people may obtain
internet access, ✓ typically using Wi-Fi technology. ✓

(Note to marker: Do not accept simply ‘access point’ without


further clarification.) 2
5.2.3 Any TWO limitations / disadvantages of:

• May have limited or slow access if area has poor


coverage ✓
• You never really escape communication – information
overload ✓
• Online privacy or security could be an issue
(Any 2) 2 5
5.3 5.3.1 Malware ✓ 1
5.3.2 A type of (spyware) software that records keystrokes as
you type. ✓

They capture passwords, usernames, account numbers,


etc. ✓ (and pass these on to a third party), to commit identity
theft. ✓ 3 4
5.4 Any FOUR criticisms:

• Poor layout – can improve by using headings / separate


paragraphs / columns / numbered and bulleted lists, etc. [Must
mention at least one relevant issue] ✓
• Use of (continuous) uppercase ✓
• Use of fonts that are difficult to read ✓
• Mixture of fonts ✓
• Hyperlink at bottom (‘Click here’) is not meaningful / easy to
understand
• Use of graphics not applicable to the content etc. (Any 4) 4 4
[15]

Copyright reserved Please turn over


6 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

QUESTION 6: INFORMATION MANAGEMENT

6.1 Any TWO advantages of:

• Easier / faster to obtain (e.g. via e-mail, SMS, portable storage,


download from www). ✓
• Do not need to retype or scan data to use or process it. ✓
• More likely to be up to date (published / distributed faster than
hard copy) (Any 2) 2 2
6.2 6.2.1 Data entered in form fields can be extracted ✓ and saved in
a separate text file, for further use.

OR

Importing into Excel. ✓ 1


6.2.2 TWO ways to change questionnaire

• Name and Surname field could be split into two separate


fields (to facilitate processing, e.g., sorting by surname)

• Response text field could be changed to a drop-down list
(to restrict responses to certain allowed values, thereby
facilitating processing). ✓ 2
6.2.3 • Blueprint / framework / skeleton for a specific type of
document. ✓
• Promotes reuse / efficiency, in that only the ‘missing’ info
is filled in (customised). ✓ 2
6.2.4 Any TWO advantages of:


Easier for working with large amounts of data (that may
be intractable for a spreadsheet). ✓
• Better for linking / relating to other data. ✓
• Better for performing (complex) queries on the data.
• Better for producing (customised) reports on the data.
• Better / faster customised data entry / editing (use of
forms, default values).
• Better data validation techniques (e.g., validation rule,
input mask, required property).
(Any 2) 2 7
6.3 Plagiarism ✓ 1 1
[10]

Copyright reserved Please turn over


(EC/NOVEMBER 2022) COMPUTER APPLICATIONS TECHNOLOGY P2 7

QUESTION 7: SOCIAL IMPLICATIONS


7.1 TWO steps to prevent unauthorised access:
• Keep computers with valuable information in locked rooms and control
access to the room. ✓
• Ensure that the screen and keyboard are disabled when you are away
from the computer. ✓
• Make sure that the computer requires a login when starting and when
waking up from screensaver mode.
• Make sure that the computer does not have unrestricted access to the
Internet – Internet usage is controlled and monitored by utility software
such as firewalls, anti-virus and anti-spyware.
• Also ensure that not just any device can make a Bluetooth connection
to your device. (Any 2) 2 2
7.2 Any TWO disadvantages:
• Constant upgrading of skills / hardware / software needed ✓
• Increase in unemployment ✓
• Need to work longer hours
• Negative impact on environment, etc. (Any 2)
(Note to marker: Do not accept answers related to cost issues.) 2 2
7.3 Any TWO options:
• Eye tracking devices ✓
• Head movement devices ✓
• Large key keyboards
• (Large) trackballs
• Joysticks
• Foot pedal control devices
• Sip and puff devices, etc. (Any 2)
(Note to marker: Do not accept answers not related to poor motor control) 2 2
7.4 Any TWO tips on:
• Take regular breaks (stand up, look away from the screen, etc.). ✓
• Ensure correct ambient lighting in the location (enough light, not
directly on screen, no reflections, etc.). ✓
• Ensure correct brightness / contrast settings of screen.
• Use zoom / magnification features of applications.
• Use alternate input / output methods (e.g. voice recognition
software [for input], text to speech software [for output])
• If you have prescription spectacles for computer work, use them.
(Any 2) 2 2
7.5 Any TWO options:
• Reduce brightness of screen. ✓
• Specify time before computer goes into ‘sleep mode’ or ‘hibernation’. ✓
• Choose a balance between performance and power consumption.
• Switch off devices / apps not in use, e.g., GPS. (Any 2) 2 2
[10]

Copyright reserved Please turn over


8 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

QUESTION 8: SOLUTION DEVELOPMENT

8.1 8.1.1 Reason

When the formula in cell E3 is copied down (autofilled) to


cells E4, E5, etc., ✓ the cell reference of D1 will change (to
D2, D3, etc.), when it should remain constant / the same. ✓

How to fix the problem?

Use absolute addressing. ✓ 3


8.1.2 = D3 / C3
Correct cells used ✓ and divided in correct order ✓

(Note to marker: Award only 1 mark for = D3 / C3 * 100) 2


8.1.3 Store names and surnames ✓ in separate columns ✓ 2
8.1.4 Answer: 0 ✓

=COUNTA ✓ (A3:A8) 2 9
8.2 8.2.1 So that only uppercase instances of CAT ✓ (e.g. not ‘cat’)
are replaced. ✓ 2
8.2.2 So that only exact and not partial matches ✓ (e.g.
‘catalogue’) are replaced. ✓ 2 4
8.2.3 Instances of ‘CAT’ in bold would be searched for and
replaced with ‘Computer Applications Technology’ (normal
text / not bold) ✓ instead of replacing ‘CAT’ (normal text)
with ‘Computer Applications Technology’ in bold. ✓ 2 2
[15]

TOTAL SECTION B: 75

Copyright reserved Please turn over


(EC/NOVEMBER 2022) COMPUTER APPLICATIONS TECHNOLOGY P2 9

SECTION C: INTEGRATED SCENARIO

QUESTION 9

9.1 9.1.1 Any ONE example of:

LibreOffice ✓
OpenOffice (Any 1) 1
9.1.2 The source code is freely available and can be modified. ✓ 1
9.1.3 Any ONE example of (except lower hardware specs): ✓

• More difficult or even impossible to upgrade (e.g. add


RAM, replace CPU) ✓
• More costly to repair
• Keyboard and pointing device (touch pad, pointing stick)
can be awkward to use and are not designed for extensive
data entry – can contribute to RSI
• Heat dissipation can become a problem, especially over
time – must disassemble laptop completely to clean out
the dust
• More fragile and likely to be damaged (Any 1) 1 3
9.2 Any THREE suggestions of (except adding another hard drive):

• Run the Disk Cleanup utility. ✓


• Remove duplicate files / files no longer needed. ✓
• Delete ‘temp’ files (also in web browser). ✓
• Compress the drive, or selected files.
• Archive files no longer in use, to a secondary storage medium
(e.g. DVD).
• Uninstall programs no longer used, etc. (Any 3) 3 3
9.3 9.3.1 Size ✓ 1
9.3.2 Any ONE port of:

• USB 3.0 ✓
• USB 3.1
• USB Type-C (or USB-C)
• FireWire
• Thunderbolt (Any 1) 1
9.3.3 Webcam 1 3
9.4 9.4.1 Anti-virus software uses virus ‘definitions’ (available in
‘virus definition files’) to detect viruses. ✓

New viruses appear regularly, so it is necessary to update the


definition files regularly in order to detect the new viruses. ✓ 2
9.4.2 A firewall is set up only to allow or block software. ✓ It does
not rely on definition files. ✓ 2 4
9.5 9.5.1 Pop-up ✓ 1
9.5.2 Any ONE reason:
This is a hoax. ✓
More than likely there is a criminal intent to install malware /
commit identity theft / fraud, etc. (Any 1) 1 2

Copyright reserved Please turn over


10 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

9.6 9.6.1 To enable you to work faster (without having to remove your
hands from the keyboard and use a mouse or other pointing
device to do the same task). ✓ 1
9.6.2 Ctrl-Z ✓ 1 2
9.7 9.7.1 USB ✓ 1
9.7.2 Any TWO advantages of (except cost factors):


Less desk space needed (than separate print / scan
devices etc.). ✓
• Only one USB port needed. ✓
• Can perform functions other than just printing (e.g.
scan, fax, copy).
• Easier / quicker to integrate functions in one location
(e.g. scan and fax a document, without transferring hard
copy to two separate devices). (Any 2) 2 3
9.8 Any TWO characteristics:

• Contains both uppercase and lowercase letters. ✓


• Contains mixture of letters and numbers / special characters. ✓
• Does not use easily identifiable / predictable words or
phrases.
• Contains at least 8 characters / the more characters the
better.
• Does not follow ‘patterns’ on the keyboard (e.g. ‘asdf’), or
repeated characters. (Any 2) 2 2
9.9 THREE reasons why not:

• Animations don’t always enhance the user experience. ✓


• It increases the loading time of a website. ✓
• Less animations help to minimise user errors. ✓
• Less animations contribute to better quality data. (Any 3) 3 3
[25]

Copyright reserved Please turn over


(EC/NOVEMBER 2022) COMPUTER APPLICATIONS TECHNOLOGY P2 11

QUESTION 10

10.1 Any TWO software features:

• Screen magnification ✓
• Text to speech (narration) ✓
• Larger mouse cursor
• Higher contrast settings
• Speech recognition for voice control of the computer (Any 2) 2 2
10.2 The program might not work, ✓ or it might work really slow. ✓ 2 2
10.3 It means that the program must have Windows 7 ✓ or any later
version installed, ✓ e.g., Windows 8 or Windows 10. 2 2
10.4 To use an application other than the one assigned/designated to
open that type of file, ✓ or if there is no default application
available to open the file ✓ (no application assigned with that type
of file). 2 2
10.5 Any two of:

• You want to send the file to someone using an older version


of the package. ✓
• You want to allow users who are using a different operating
system to access the data. ✓
• You want different programs to be able to read the data.
(Any 2) 2 2
10.6 Any TWO of:

• The name (or partial name) of the file. ✓


• The file type (file extension) as it is a video file – e.g., MP4. ✓
• The date it was saved (as it was recently downloaded), or
you could specify a date range.
• The size of the file as video files are often quite large. (Any 2) 2 2
10.7 Metadata is ‘extra information’ about a file. ✓
It helps to organise, find and understand data. ✓ 2 2
10.8 10.8.1 Any TWO consequences:

• A breakdown in user trust ✓


• A decrease in efficiency ✓
• Reduced morale or motivation
• An increased workload
• Incorrect or delayed decision-making
• Decreased product quality, etc. (Any 2) 2
10.8.2 TWO reasons:
• Data can be retrieved through methods such as:
(accept only 1 answer from the list below) ✓
• queries,
• sorting or filtering
• reports
• Database stores information more efficiently. ✓
• Database can handle volumes of information that
would be unmanageable in a spreadsheet. (Any 2) 2 4

Copyright reserved Please turn over


12 COMPUTER APPLICATIONS TECHNOLOGY P2 (EC/NOVEMBER 2022)

10.9 10.9.1 Social engineering refers to the use of deception to


manipulate or ‘con’ someone into giving out confidential
information (such as a password or account number) ✓
or into giving access to their computer or premises. ✓ 2
10.9.2 Two examples:

• E-mails telling you that you have won a competition


(that you never entered). ✓
• E-mails offering a job or investment opportunity. ✓
• E-mails telling you of a tax refund or an inheritance
due to you.
• Phishing e-mails asking you to confirm your banking
details etc. 2 4
10.10 Any THREE advantages of social networking sites:

• An easy and cost-effective method to stay in touch and


communicate with friends and family all over the world. ✓
• Allows you to send and receive messages, update your
‘status ‘and upload photos and videos. ✓
• Allows collaboration and interaction to take place. ✓
• Allows people who would normally not meet to interact and
form communities.
• You are not bound by any geographical and cultural
differences.
• Can be used as a tool to market a business, service,
product, or website. (Any 3) 3 3
[25]

TOTAL SECTION C: 50
GRAND TOTAL: 150

Copyright reserved Please turn over

You might also like