0% found this document useful (0 votes)
103 views

Computer Applications Technology P2 May-June 2023 Eng

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

Computer Applications Technology P2 May-June 2023 Eng

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

SENIOR CERTIFICATE EXAMINATIONS/

NATIONAL SENIOR CERTIFICATE EXAMINATIONS

COMPUTER APPLICATIONS TECHNOLOGY P2

2023

MARKS: 150

TIME: 3 hours

This question paper consists of 17 pages.

Copyright reserved Please turn over


Computer Applications Technology/P2 2 DBE/2023
SC/NSC

INSTRUCTIONS AND INFORMATION

1. This question paper consists of:

SECTION A (25)
SECTION B (75)
SECTION C (50)

2. Answer ALL the questions.

3. Number the answers correctly according to the numbering system used in this
question paper.

4. Start EACH question on a NEW page.

5. Do NOT write in the right-hand margin of the ANSWER BOOK.

6. Leave a line after EACH subquestion.

7. Generally, one mark is allocated per fact; therefore, a 2-mark question would
require TWO facts, etc.

8. Read the questions carefully. DO NOT give more answers than the question
requires as it will NOT be marked.

9. All answers MUST be related to Computer Applications Technology.

10. Unless otherwise specified, answers such as 'cheaper', 'slower'/'faster', etc.


will NOT be accepted.

11. Do NOT use brand names in your answers, unless specifically required.

12. Write neatly and legibly.

Copyright reserved Please-turn-over


Computer Applications Technology/P2 3 DBE/2023
SC/NSC

SECTION A

QUESTION 1: MULTIPLE-CHOICE QUESTIONS

Various options are given as possible answers to the following questions. Choose the
answer and write only the letter (A–D) next to the question numbers (1.1 to 1.10) in the
ANSWER BOOK, e.g. 1.11 D.

1.1 A router is categorised as a/an … device.

A storage
B input
C communication
D output (1)

1.2 … is the unit of measurement used for the speed of an internet connection.

A KB
B Mbps
C GHz
D MHz (1)

1.3 A firewall is used to stop … from accessing a computer.

A approved programs
B Trojans and worms
C unauthorised programs
D wireless fidelity (Wi-Fi) (1)

1.4 A user entered the following search string in a search engine:

"OS"–windows

This search engine will return a list of websites that refer to …

A the word 'OS' but not the word 'windows'.


B both the word 'OS' and the word 'windows'.
C the word 'windows' but not the word 'OS'.
D neither the word 'windows' nor the word 'OS'. (1)

1.5 OCR may fail to recognise alphabetical characters in a scanned document


because …

A the electronic files are too large.


B a poor quality scanner was used.
C the scanner malfunctioned.
D a Wi-Fi scanner was used. (1)

Copyright reserved Please-turn-over


Computer Applications Technology/P2 4 DBE/2023
SC/NSC

1.6 … is a concept which refers to technology that can learn and make decisions.

A Augmented reality
B Internet protocol
C Virtual reality
D Artificial intelligence (1)

1.7 Which ONE of the following spreadsheet functions will identify the middle
number in an ordered list?

A MEDIAN
B MID
C AVERAGE
D MODE (1)

1.8 A type of internet attack that crashes a website by flooding it with requests:

A Spoofing
B Denial of service
C Click-jacking
D Social engineering (1)

1.9 … is a disadvantage of having electronic access to the personal information


of people.

A Copyright infringement
B Limited freedom of expression
C Encrypted communications
D Invasion of privacy (1)

1.10 A system utility that can be used to check the performance of a CPU:
A Task Manager
B System Restore
C Disk Management
D Disk Cleanup (1)
[10]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 5 DBE/2023
SC/NSC

QUESTION 2: MATCHING ITEMS

Choose a term/concept from COLUMN B that matches the description in COLUMN A.


Write only the letter (A–T) next to the question numbers (2.1 to 2.10) in the ANSWER
BOOK, e.g. 2.11 U.

COLUMN A COLUMN B
2.1 Text, numbers and images in a format A asterisk (*)
suitable for use by computers
B currency
2.2 Software used to remove malware from a
computer system C VPN

2.3 A wild card used in database queries D hashtag (#)

2.4 A type of printer that uses plastic to print E data

2.5 A file format that can be used to share F antivirus


data between applications
G PDF
2.6 A word processing option that allows you
to apply different footers in the same H spyware
document
I authority
2.7 A type of network with a very high level of
security, that can be accessed over the J 3D
internet
K service pack
2.8 The evaluation of information that
focuses on whether that information is L information
still applicable
M laser
2.9 An update that corrects a single error
found in software N adware

2.10 A type of program that infects a computer O next (header/footer)


and tracks the user's internet activities
P WAN

Q ad blocker

R patch

S section break

T CSV
(10 x 1) [10]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 6 DBE/2023
SC/NSC

QUESTION 3: TRUE/FALSE ITEMS

Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false'
next to the question numbers (3.1 to 3.5) in the ANSWER BOOK. If the statement is
true, write 'TRUE'. If the statement is false, write 'FALSE' and change the underlined
word(s) to make the statement TRUE. (Do NOT simply use the word 'NOT' to change
the statement.)

NO mark will be awarded if FALSE is written without a correct answer.

EXAMPLES:

QUESTION ANSWER

The initial start-up instructions are stored in the ROM. True

An NIC has slots for hardware components, such as


False, Motherboard
the CPU.

3.1 Orphan is the last line of a paragraph that appears by itself at the top of a
word processing page. (1)

3.2 Checking for objectivity is a method used by researchers to recognise bias or


prejudice. (1)

3.3 Absolute cell referencing is when the cell references in a spreadsheet formula
change every time the formula is copied to another cell. (1)

3.4 Phishing occurs when a user is redirected to a fake website even though the
correct URL for a legitimate website is entered. (1)

3.5 The NOW function returns both the current date and time in a spreadsheet. (1)
[5]

TOTAL SECTION A: 25

Copyright reserved Please-turn-over


Computer Applications Technology/P2 7 DBE/2023
SC/NSC

SECTION B

QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 Name TWO input devices that can be used on a point of sale system. (2)

4.2 Define the concept convergence. (2)

4.3 Why are USB ports commonly used to connect peripheral devices? (2)

4.4 Name TWO specifications you would consider when buying a monitor. (2)

4.5 Give TWO reasons why your monitor does not display anything even though
both the computer and the monitor are switched on.

NOTE: Assume the monitor is in perfect working order. (2)

4.6 Explain TWO limitations of using web-based applications. (2)

4.7 You receive an error message about insufficient disk space while you are
installing a specific program.

Suggest TWO ways to solve the problem so that you can complete the
installation. (2)

4.8 Why would you distribute educational resources on an optical disk rather than
over the internet? (1)

4.9 NFC can be used to transfer photographs from one device to another by
holding them close together, without using the internet or any cables.

4.9.1 Give ONE disadvantage of using NFC in this situation. (1)

4.9.2 Give TWO uses of NFC, other than transferring photographs. (2)

4.10 Name TWO software technologies to assist physically disabled users who
cannot use their hands to work on a computer. (2)

4.11 Which application would a network administrator use so that all the computers
in a computer centre are switched off at a certain time in the afternoon? (1)

4.12 State TWO risks associated with using flawed software. (2)

4.13 Give TWO advantages of using the Snipping Tool to make a screenshot
rather than using the Print Screen option. (2)
[25]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 8 DBE/2023
SC/NSC

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Define the concept grid computing. (2)

5.2 Name ONE communication technology that uses light to transfer data. (1)

5.3 Many people and organisations use video conferencing for meetings or
events, e.g. Zoom, Skype or Google Meet.

5.3.1 Suggest TWO good practices an organiser can implement to manage


a video conference. (2)

5.3.2 Explain TWO disadvantages of video conferencing. (2)

5.4 Give TWO reasons why users cannot access a file on a network. (2)

5.5 People in your household share the internet connection in your home.

Give TWO ways to prevent problems, such as buffering and delays, while
using the internet without having to close applications or restricting the
number of users. (2)

5.6 Give TWO reasons why instant messaging is widely used. (2)

5.7 An internet service provider (ISP) offers the following internet connectivity
options:

ACCOUNT OPTIONS
SERVICE OPTION 1 OPTION 2
Connection type Fibre Fibre
Speed 30 'meg' 30 'meg'
… Yes No
Shaped Yes No
… Yes No
Price R299.00 R599.00

Complete the table above by giving the TWO aspects of the service offered
by the ISP, taking the price of each option into consideration. (2)
[15]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 9 DBE/2023
SC/NSC

QUESTION 6: INFORMATION MANAGEMENT

6.1 Give TWO aspects that you must include in a task definition for a research
project, such as the PAT. (2)

6.2 In the PAT you are required to develop questions on different levels.

6.2.1 The table below gives examples of how the four levels of questions
may start. The purpose of a level 3 question appears in the table.

QUESTIONS STARTING LEVEL PURPOSE OF


WITH … QUESTION
Who, What, When, Where, 1 (a) …
How many
Why, How 2 (b) …
If, What if 3 (c) Adjust, alter or predict
Would it be better if … 4 (d) …
How can I determine …
What would be the best way …

Complete the table by giving the purpose of the following:

(a) A level 1 question


(b) A level 2 question
(c) A level 4 question (3)

6.2.2 Give ONE reason for using questions on different levels when doing
research. (1)

6.3 Explain how you can avoid being guilty of plagiarism when doing research. (2)

6.4 Study the survey below and discuss TWO reasons why this survey is NOT
useful.

(2)
[10]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 10 DBE/2023
SC/NSC

QUESTION 7: SOCIAL IMPLICATIONS

7.1 Give TWO ways of reducing the possible negative impact of ICTs on the
environment. (2)

7.2 Explain TWO dangers of sharing your location online. (2)

7.3 What can you do to prevent the spread of fake news when using social
media? (1)

7.4 Discuss TWO consequences for victims of identity theft. (2)

7.5 Why is a screen lock pattern on a computing device generally considered


less secure than a strong password? (1)

7.6 Give TWO recommendations to prevent ransomware attacks. (2)


[10]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 11 DBE/2023
SC/NSC

QUESTION 8: SOLUTION DEVELOPMENT

8.1 Consider the screenshot of a word processing document below.

8.1.1 What is the purpose of using a ruler bar when working in a word
processing document? (2)

8.1.2 What type of text alignment was applied to the paragraph above
AND what is the benefit of aligning text in this way? (2)

8.1.3 Give ONE way of seeing the address referenced in the hyperlink in
the paragraph above. (1)

8.2 Study the screenshot of a spreadsheet below.

8.2.1 Which spreadsheet feature would you use to complete the list of
months in column A without having to type them in? (1)

8.2.2 Give TWO ways of formatting the number values in columns B to D


in a more meaningful way. (2)

8.2.3 Why are the values (not the formatting) in the cell range D3:D9 NOT
correct? (1)

8.2.4 Name ONE function to determine the total of the values in columns
B, C and D. (1)

Copyright reserved Please-turn-over


Computer Applications Technology/P2 12 DBE/2023
SC/NSC

8.3 Study the screenshot of a database table in Design View below.

8.3.1 Why would an input mask on the Worker_ID field be helpful? (1)

8.3.2 Suggest THREE corrections to the validation rule so that it will


accept only ages between 15 and 65 (including both 15 and 65) in
the Age field. (3)

8.3.3 Give ONE reason, other than the validation rule, why the current
design of the Age field may cause errors. (1)
[15]

TOTAL SECTION B: 75

Copyright reserved Please-turn-over


Computer Applications Technology/P2 13 DBE/2023
SC/NSC

SECTION C

QUESTION 9: INTEGRATED SCENARIO

Your school wishes to organise a Youth Day event. CAT learners will use their
ICT knowledge to assist the organising committee.

9.1 A local business donated a fully functional computer to be used for the event.
Study the specifications of this computer.

COMPUTER SPECIFICATIONS

Windows 7
1 GHz Celeron
120 GB HDD
1 GB RAM
14" LCD monitor

9.1.1 Give TWO reasons why the latest Windows operating system
cannot be installed on this computer. (2)

9.1.2 Suggest an operating system that can be installed on this computer


instead of proprietary software such as Windows. (1)

9.1.3 Give ONE reason why it would not be advisable to upgrade this
computer. (1)

9.2 Details of the event were posted on social media.

Give TWO advantages of using social media platforms to communicate with


the public. (2)

9.3 An invitation with a shortened URL was e-mailed to guests so that they could
register to attend the event.

9.3.1 The URL www.bit.ly/AgwzA1 was e-mailed.

Give TWO reasons why the guests may not trust this shortened
URL. (2)

9.3.2 Give THREE benefits of using online forms instead of using pen-
and-paper based forms to register for the event. (3)

Copyright reserved Please-turn-over


Computer Applications Technology/P2 14 DBE/2023
SC/NSC

9.4 The data from the online forms is stored in a spreadsheet.

9.4.1 Which mail merge option will you use to create name tags only for
selected guests stored in the spreadsheet? (1)

9.4.2 Name a spreadsheet function that can be used to select a winner in


a lucky draw. (1)

9.5 Your school considers providing free internet access to the public during the
event.

9.5.1 Give TWO possible reasons why your school should NOT offer free
access to the internet. (2)

9.5.2 Suggest TWO precautions you can take when you use free internet
access. (2)

9.6 Your school received various donations through crowdfunding.

9.6.1 Explain the concept crowdfunding. (2)

9.6.2 Name ONE crowdfunding platform. (1)

9.6.3 Name TWO spreadsheet features (not functions) that can be used
to determine the top ten amounts that were received through
crowdfunding. (2)

9.7 A past learner donated half a Bitcoin to the school for the event.

9.7.1 What form of currency does Bitcoin belong to? (1)

9.7.2 Give TWO benefits of making donations in Bitcoin. (2)


[25]

Copyright reserved Please-turn-over


Computer Applications Technology/P2 15 DBE/2023
SC/NSC

QUESTION 10: INTEGRATED SCENARIO

The school wishes to promote healthy living. They host a club for walking and running
which is open to the whole community.

10.1 The school uses e-mail communication to invite the community to participate
in the club activities and also to keep them updated on activities.

10.1.1 Which e-mail feature would the club secretary use to send an
e-mail to many people at the same time? (1)

10.1.2 How can the club secretary ensure that parents do not see each
other's e-mail addresses when an e-mail is sent to many parents at
the same time? (1)

10.1.3 Parents complain that e-mails are going directly to their spam
folder.

Give ONE way in which parents can ensure that future e-mails
from the school do not go into their spam folder. (1)

10.1.4 The club secretary tried to send out a video via e-mail. An error
message alerted the club secretary that the video attachment was
too large.

Suggest TWO ways in which the secretary can share the video
electronically. Do NOT refer to storage media. (2)

10.2 The club offers lockers with biometric locks for members to store their
valuables in, while they are running or walking.

10.2.1 Explain the concept biometric security. (2)

10.2.2 Give TWO disadvantages of using biometric locks. (2)

10.3 The club secretary set up the following database table to store the details of
the members:

FIELD NAME DESCRIPTION (OPTIONAL)


Surname Surname of the member/Lid se van
FirstName First name of the member/Lid se voornaam
CellNumber Cellphone number of the member/Lid se
selfoonnommer
DOB Date of birth/Geboortedatum
ChronicConditions ?

10.3.1 Which database feature must be applied to a new or an existing


field to uniquely identify each record? (1)

10.3.2 Suggest a data type, together with a motivation, for the field
ChronicConditions, other than 'Yes/No'. (2)

Copyright reserved Please-turn-over


Computer Applications Technology/P2 16 DBE/2023
SC/NSC

10.4 The chairperson of the club suggested that it would be more effective to
create a website that would give information about the club activities and
events.

10.4.1 Give TWO user-centred design (UCD) guidelines a web designer


should use to create a website. (2)

10.4.2 The club's website should display the following table:

The HTML code for this table is as follows:

<table border="1">
<tr>
<td rowspan=2>Distance</td>
</tr>
<tr>
<td>1</td>
<td>Marathon</td>
</tr>
<td>2</td>
<td>Half marathon</td>
</table>

Suggest TWO corrections to the HTML code so that this table will
display correctly. (2)

10.5 The club uses a drone for various activities.

10.5.1 Which technology allows a drone to create a map of the route that
the runners will use? (1)

10.5.2 Give TWO benefits of equipping a drone with a camera to follow


the runners or walkers. (2)

10.5.3 The drone pilot finds that there is not enough space on the
SD card of the camera after recording the first race.

How can this problem be solved without moving data or changing


the SD card? (1)

Copyright reserved Please-turn-over


Computer Applications Technology/P2 17 DBE/2023
SC/NSC

10.6 What category of user would want to use a computer with sophisticated
hardware to edit videos? (1)

10.7 The club members can exercise on equipment connected to AR (augmented


reality) technology in the gym.

10.7.1 Give the definition of AR technology. (3)

10.7.2 Give ONE example of where AR can be used. (1)


[25]

TOTAL SECTION C: 50
GRAND TOTAL: 150

Copyright reserved *

You might also like