IT March 2013 Paper 2
IT March 2013 Paper 2
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
FEBRUARY/MARCH 2013
MARKS: 180
TIME: 3 hours
5. Number the answers correctly according to the numbering system used in this
question paper.
6. ONE diagram sheet for QUESTION 5.1.3 is attached at the end of this
question paper. Write your centre number and examination number on this
sheet in the spaces provided and insert the sheet inside the back cover of
your ANSWER BOOK.
QUESTION 1
Various options are given as possible answers to the following questions. Choose the
answer and write only the letter (A–D) next to the question number (1.1–1.10) in the
ANSWER BOOK.
1.1 Which term applies when a person behaves offensively towards another
member of an e-mail news group, thereby inciting argumentative behaviour?
A Flaming
B Phishing
C Lurking
D Spamming (1)
1.2 Which shaded area in the diagram below represents a cluster of disk space?
A extreme programming.
B GUI programming.
C modular programming.
D sequential programming. (1)
1.5 Which part of the URL below is referred to as the domain name?
http://www.sars.gov.za/server1/documents/irp/instructions.html
A www
B sars.gov.za
C http
D instructions.html (1)
1.7 Which ONE of the statements below is TRUE regarding embedded operating
systems?
A Digital certificate
B Digital divide
C Digital handshake
D Digital signature (1)
1.9 Which ONE of the following represents a set of operating systems for
smartphones?
TOTAL SECTION A: 10
SCENARIO
Blue Crane Tours is a business offering sightseeing tours all over South Africa.
They have offices in each of the major cities as shown in the map below. The head office
is situated in Cape Town and all the other offices are electronically connected to the head
office.
The Cape Town head office has a main server to which the servers at the other branches
connect. Custom software was developed and is used from this location. A database
which stores information about tours and clients is managed here.
Blue Crane Tours also has their own website (www.bluecranetours.co.za) which is used
for information and bookings.
QUESTION 2
2.1 The senior manager at the head office complained about the performance of
his computer and wanted it to be replaced. A quotation with specifications for
a new computer system refers to a 266 MHz FSB.
(a) List the THREE types of buses that the internal bus system
comprises. (3)
2.2 The diagram below is an extract from the device manager of the computer
currently used by the senior manager.
2.2.1 Name the manufacturer of the chipset of this computer system. (1)
2.2.3 Name the TWO different types of data that is stored in a CMOS
memory chip. (2)
2.2.5 Give TWO reasons why the PS/2 port has been replaced with a
USB port on modern motherboards. (2)
2.3 The graphic designer at the head office wants a new computer with an
Intel i7 CPU. The i7 is a quad-core hyperthreading 64-bit processor with the
following features:
2.3.4 List FOUR steps the CPU repeats for every instruction it has to
execute, which is also known as the machine cycle. (4)
2.3.5 The senior manager is not sure about the significance of cache
memory in a computer system.
2.4 The senior manager wants to know more about the management of RAM.
2.4.1 State TWO aspects regarding RAM that the operating system has
to manage. (2)
2.4.2 Virtual memory is often used while managing RAM. Explain what
virtual memory is. (2)
2.4.3 The use of virtual memory can result in thrashing. Explain what
thrashing is. (2)
2.6.1 The senior manager needs to print documents but the printer does
not display in the print dialog box. State how this problem can be
solved. (1)
2.6.2 A new colour inkjet printer and an external hard drive have been
delivered to his office. Plug-and-play and hot-swapping should
allow him to use these hardware devices without assistance from
the IT department.
(b) Is it correct to say that with plug-and-play you don't need any
driver programs? (1)
2.7 The computers used by volunteer staff at the Johannesburg branch were
donated to the company. The computers' hard disk drives were already
partitioned and formatted by the previous owners.
2.7.1 What does it mean when we say that a hard disk has been
partitioned? (1)
2.8 The cabinet housing the network server in Bloemfontein also contains a
router.
2.9 The senior manager is concerned about several complaints from users about
different messages that are displayed on the screen during the boot-up
process of their computers.
2.9.1 Give ONE possible reason why the message 'Non-system disk'
appears on the screen during the boot-up process. (1)
TOTAL SECTION B: 47
QUESTION 3: e-COMMUNICATION
Blue Crane Tours uses a number of online tools to manage their business.
3.1 The company uses online banking to receive and make payments.
3.1.1 A lock symbol appears in the browser interface when using the
online banking website to indicate security.
(a) How else could you tell whether the website is secure? (1)
3.1.4 Online users often receive hoax e-mails. Give TWO pieces of
advice on how to respond to a hoax. (2)
3.2 Why is it advisable to have a firewall installed at the head office? (1)
[10]
Blue Crane Tours has been confronted with some ethical issues regarding the use of
ICT.
4.1 While going through the log of sent items on the e-mail server, the office
manager saw an e-mail that the secretary had sent to her husband. Her
husband is an estate agent selling holiday flats. A list of all the e-mail
addresses of the company's clients from the company's database was
attached to the e-mail.
4.1.1 These e-mail addresses can be used to send spam. Explain what
spam is. (2)
4.1.2 Name TWO ethical issues regarding the e-mail that was sent by
the secretary (excluding the possibility of spamming people). (2)
4.1.3 The office manager incorrectly refers to the sending of the e-mail
as identity theft. Explain what identity theft is. (2)
4.2 Due to the increasing availability of online information, such as travel blogs
and forums, the tourism industry might find itself out of business.
4.2.2 Give TWO examples of how ICT can be used to assist potential
travellers in planning and organising their own holiday trips. (2)
4.3 The company has been advised to request potential tourists to register for an
online health service. Their personal medical history, for example
prescriptions, allergies and immunisation records can be stored online.
TOTAL SECTION C: 24
Blue Crane Tours uses custom software that has been developed to keep track of all
their tours in a central database. This database is available to all their branches across
South Africa.
5.1 A database named CraneDB was created with the table tblToursInfo to store
information on the different tours and their clients.
(b) Which field in this table would be most suitable to use as the
primary key field? (1)
5.1.2 The general properties for the SurnameClient1 field are shown
below.
(a) Explain what it means to specify a field size of 50 for this field. (1)
Copyright reserved Please turn over
Information Technology/P2 14 DBE/Feb.–Mar. 2013
NSC
(b) Comment on the suitability of the validation rule for this field. (1)
5.1.3 You need to normalise the tblToursInfo table to 2NF. Answer this
question on ANNEXURE A (attached) by doing the following:
(a) Separate the fields in the tblToursInfo table into two new
tables, tblTours and tblClients. (4)
5.2 The programmers developed the following algorithm to validate clients' birth
dates. The following applies:
Line
1 Current year 2012
2 Year Input year of birth (four digits)
3 Valid True
4 If Year is 4 characters long
5 If Year is greater than Current year
6 Valid False
7 Display the content of Valid
5.2.2 Standard and extreme test data are used as input to determine the
reliability of a program. Give ONE example of extreme test data
that can be entered to test the reliability of this algorithm. (1)
5.2.3 Data entered by a user should be valid and correct. Use the year of
birth to explain the difference between valid and correct data. (2)
5.2.4 There are logical errors in the given algorithm which means that it
will not always give a correct indication of whether the year of a
birth date value is valid.
(b) Explain how you could correct EACH of the errors identified in
QUESTION 5.2.4(a). (2 x 2) (4)
5.2.5 Syntax and runtime errors can occur during the development and
testing of the software.
5.3 The agency uses an online application form to capture the details of new
clients. The following GUI has been designed for this purpose:
Button
Accept data
Text fields to
enter data, for
example the
surname and
phone number
of a new client
List FOUR ways in which the layout and user-friendliness of the interface can
be improved. (4)
5.4 The programmers who created the software for the company used
object-oriented programming (OOP) principles. The following class diagram
has been designed to represent a client object. Study the class diagram
below and answer the questions that follow.
CLIENT
− ClientID
attributes
Private
− ClientFirstName
− ClientSurname
+ Constructor()
+ Constructor(ClientID)
Public methods
+ Constructor(ClientID, ClientFirstName,
ClientSurname)
+ getFirstName():String
+ getSurname():String
+ setFirstName(ClientFirstName)
+ setSurname(ClientSurname)
+ toString():String
5.4.1 Use examples from the class diagram above to explain the concept
of overloading. (2)
5.5 The programmers developed the following algorithm for users to search for
any given client in their database:
Line
1 ClientSurname Input ClientSurname
2 For loop from first to last element in arrClients
array
3 Surname Get Surname of current object in
arrClients array
4 If Surname = ClientSurname
5 Display current arrClients's object
information
6 End Loop
5.5.1 Give TWO reasons why a WHILE loop with a flag would be more
effective in this algorithm than the FOR loop. (2)
(a) Explain the ITC (initialise, test and change) concept when
using a WHILE loop with a flag. (3)
TOTAL SECTION D: 50
QUESTION 6
The computers in the different offices in the head office building need to be connected
in order to allow all the employees to have access to the company's client database.
6.1 The head office manager suggests that they create a LAN to link the
computers.
(c) State ONE advantage of using UTP cables other than cost. (1)
6.3 The head office manager is advised to install a dedicated server to provide
Internet connection.
6.3.3 Give TWO reasons for using a proxy server rather than a web
server. (2)
6.4 It is often necessary for the employees to communicate with clients. One
month, the telephone bill was too high and the office manager asked the
employees to use Skype instead as a means of communication.
6.5 The office manager has decided to create a hotspot for prospective clients to
use for research on possible destinations.
6.6 The head office in Cape Town is electronically connected to the four other
offices in the country using a VPN.
6.6.2 Give TWO reasons why a VPN can be a risk in terms of security. (2)
6.7 Clients want to access the official website of Blue Crane Tours while they are
on tour. The office manager needs to contact a professional to develop a
WAP website.
6.7.1 What will be the job title of the professional he needs to contact? (1)
6.8 The competition between different travel agencies is more intense than ever.
The Blue Crane Tours company needs to modernise their way of advertising.
6.8.2 Wikis and forums are seen as new media. Briefly explain the
difference between the two concepts. (2)
6.9 A pamphlet received from JoJo's Game Reserve contained the following
information:
98,9% of all tourists who visited South Africa in 2010 during the
Soccer World Cup, visited JoJo's Game Reserve.
6.10 A database was planned and created by the database administrator at the
Bloemfontein branch. The data on all the clients and employees were entered
into the database tables. All the employees have access to the database.
6.10.4 Besides planning and creating a database, name TWO other tasks
that a database administrator has to perform as part of his/her
duties. (2)
TOTAL SECTION E: 49
GRAND TOTAL: 180
Copyright reserved
Information Technology/P2 DBE/Feb.–Mar. 2013
NSC
ANNEXURE A
Copyright reserved