Information Technology P2 May June 2018 Eng
Information Technology P2 May June 2018 Eng
Visit us @ www.saexampapers.co.za
SENIOR CERTIFICATE EXAMINATIONS
INFORMATION TECHNOLOGY P2
2018
MARKS: 150
TIME: 3 hours
5. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
Various options are provided as possible answers to the following questions. Choose
the answer and write only the letter (A to D) next to the question numbers
(1.1.1 to 1.1.3 and 1.2.1 to 1.2.2) in the ANSWER BOOK, e.g. 1.1.4 D.
1.1 1.1.1 The most common protocol used to send e-mail is known as …
A POP3
B FTP
C SMTP
D VoIP (1)
A Digital certificate
B Digital fingerprint
C Digital handshake
D Digital signature (1)
A String
B One-dimensional array
C Two-dimensional array
D Text file (1)
var
K : integer;
R : real;
(i) K := 25 div 4;
(ii) K := R + 2;
(iii) K := R div 5;
(iv) R := 15 mod 4;
A nfo T
B ITnfo
C nfoT
D nTfo (2)
1.3 Give ONE word/term for each of the following descriptions. Write only
the word/term next to the question numbers (1.2.1 to 1.2.10) in the
ANSWER BOOK.
1.3.3 Downloaded software that bombards the user with advertisements (1)
1.3.8 Specialised hardware and software designed to be used at till points (1)
1.3.9 E-mail sent to people that advertise products that were not
requested (1)
TOTAL SECTION A: 16
QUESTION 2
2.1.2 Name ONE component/device that could be plugged into any of the
ports in the rear of a standard desktop computer. (1)
2.1.4 Explain what CPU cache memory is and how it impacts the
processing speed of a computer. (3)
2.2 The younger generation of computer users often prefer to use mobile devices
rather than desktop computers.
2.2.1 Except for mobility, give TWO other reasons why mobile devices
may be preferred to desktop computers. (2)
2.2.2 State TWO factors that limit the use of mobile devices. (2)
2.2.3 Give TWO reasons for using an SSD instead of a conventional hard
drive in a mobile device. (2)
2.3 The use of cloud applications, such as Google Docs, as well as other types of
Software as a Service (SaaS) is popular practice nowadays.
2.3.2 Give TWO reasons for using SaaS instead of standard desktop
software. (2)
2.5 The library at the school wants to implement a backup policy to backup their
data.
TOTAL SECTION B: 24
QUESTION 3
Router/Firewall
Server
'Switch'
Administration
Wi-Fi
3.1 The computers in the cabled network are used by all staff members and the
WLAN is used by clients.
3.1.1 Give ONE reason why a wireless network is more suitable for the
clients. (1)
3.1.2 Give ONE reason why all devices must have a unique IP address. (1)
3.1.3 Give TWO possible reasons why clients using the WLAN could
experience slow connection speeds sometimes. (2)
3.2 The LAN in the administration office uses a client-server model and provides
internet access.
3.2.1 Name TWO services that can be provided by an ISP besides the
connection to the internet. (2)
3.2.3 Explain the function of the switch as part of the LAN. (2)
3.3 It is a requirement that all computers in the LAN are thin clients and that
a UPS be installed for the server.
3.3.2 Give TWO reasons why the use of thin clients is often preferred. (2)
3.4 Some staff members have access to the virtual private network (VPN) of the
business.
3.4.1 Give ONE practical example of how the staff can benefit from using
the VPN. (1)
3.4.3 Give TWO possible reasons why a staff member may encounter
problems trying to connect to the VPN. (2)
3.5 The size of an e-service can range from very small to very large.
TOTAL SECTION C: 22
QUESTION 4
4.1 A library uses a relational database to have a record of books that have been
borrowed.
4.1.3 Besides planning and creating a database, name TWO other tasks
that a database administrator has to perform as part of his/her
duties. (2)
4.2 The database of the library has two tables: tblStudents and
tblBooksBorrowed. The table tblStudents keeps record of the students who
use the services of the library. The table tblBooksBorrowed keeps record of
the books borrowed by a student.
4.2.1 The student number in the tblStudents table is the primary key.
4.2.4 Identify and motivate the specific relationship that exists between
the tblStudents and the tblBooksBorrowed tables. (2)
4.2.5 Referential integrity was enforced when the relationship between the
tables was created.
4.2.6 The extract of data below shows some of the records in the two
tables.
TOTAL SECTION D: 23
QUESTION 5
5.1 Give a reason for the use of EACH of the following structures in a Delphi
program:
5.2 Students can log in on the university's website or portal to access resources.
5.2.1 Below is an incomplete class diagram for an object class that was
created to record access to a website.
StudentEntry
Attributes
-fStudentCode(String)
-fStudentName(String)
-fDateOfEntry
-fTimeOfEntry
-fLoginNumber(integer)
Methods
+Constructor Create
+toString:String
(b) Suggest a suitable data type for the fDateOfEntry attribute. (1)
(d) Define a method that can be added to the class diagram that
receives a parameter and changes the login number. (1)
arrStudNumbers arrMathResults
S0001 89
S0002 42
S0003 91
S0004 65
S0005 58
: :
The following code was used to enter a student number and update
the student's result:
(a) Name the type of search technique used in the code above. (1)
5.3 The following segment of programming code was used to generate a student
code:
Line Code
1 sName := edtName.Text;
2 sCode := ''; {empty string}
3 A := 1;
4 Repeat
5 if NOT(Upcase(sName[A]) in ['A','E','I','O','U'])then
6 sCode := sCode + sName[A];
7 inc(A, 1);
8 Until (sName[A] = ' '); {space}
9 ShowMessage(sCode);
Copy and complete the trace table below to determine the output of
this program segment if the name entered into the edit box edtName is
'Mark Simon'.
TOTAL SECTION E: 25
QUESTION 6
The local university is upgrading their library and the ICT infrastructure. The
university's website can be used to check timetables and make reservations for access
to the research section of the library.
6.1 An AUP document has been compiled for the library. One of the points listed
in the document states that, where possible, electronic documents should be
used instead of printed documents.
6.2 Some of the electronic documents are stored in an online storage facility to
facilitate file syncing.
6.3.1 Name TWO skills that a web designer would need when creating
a website. (2)
6.3.2 Students can access the website from their mobile devices.
State TWO factors that a web designer must take into consideration
when designing websites to be accessible from mobile devices. (2)
6.4 Some students watch videos on their electronic devices as part of research
projects. The videos are saved with metadata on an SSD.
6.5 Schedules for short-course lectures and webinars are displayed on the
website.
6.5.2 How can the students remain informed of changes in the schedules
without visiting the website? (1)
6.6 Some students use open-source operating systems, such as Linux, while
others use proprietary systems, such as Microsoft Windows 10.
6.6.2 Give ONE reason for using a proprietary operating system rather
than an open-source operating system. (1)
6.7 The library can use RFID tags embedded in books and RFID scanners at
library exits and return points. Stock takes (audits) in a library can be
facilitated by the use of mobile RFID rack readers, enabling an inventory to be
done on an entire shelf within seconds, without a book being taken off the
shelf.
6.7.2 Explain the difference between a passive RFID tag and an active
RFID tag. (3)
6.7.3 The use of RFID student cards eliminates the need to type in
a student number. The card is scanned using an RFID reader.
6.8 Although e-mail is one of the most popular uses of the internet, users are
often frustrated by the lack of netiquette.
6.9 ICT has revolutionised the way in which people use social media to
communicate.
State ONE way in which social networking can impact negatively on cultures
around the world. (1)
6.10 University staff want to be sure that information sent over the network will be
safe and secure.
6.10.2 A yellow lock is displayed on the URL bar when the user opens the
university's website.
(b) When a user clicks on the yellow lock, the following dialogue
box is displayed:
6.11 Green computing has become a focal point in the ICT field.
6.11.2 Suggest any TWO initiatives for the library to implement green
computing. (2)
TOTAL SECTION F: 40
GRAND TOTAL: 150
Copyright reserved