0% found this document useful (0 votes)
39 views13 pages

Information Technology P2 May-June 2022 MG Eng

test

Uploaded by

Johan Riese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views13 pages

Information Technology P2 May-June 2022 MG Eng

test

Uploaded by

Johan Riese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SENIOR CERTIFICATE EXAMINATIONS/

NATIONAL SENIOR CERTIFICATE EXAMINATIONS

INFORMATION TECHNOLOGY P2

2022

MARKING GUIDELINES

MARKS: 150

These marking guidelines consist of 13 pages.

Copyright reserved Please turn over


Information Technology/P2 2 DBE/2022
SC/NSC – Marking Guidelines

SECTION A: SHORT QUESTIONS

QUESTION 1

1.1 1.1.1 B - Bluetooth  (1)

1.1.2 D - cookie  (1)

1.1.3 A - Expert system  (1)

1.1.4 C - extremely high volumes of traffic that request data from the (1)
website. 

1.1.5 D - ytoje  (2)

1.2 1.2.1 K Cyberbullying (1)

1.2.2 F iOS (1)

1.2.3 E RSI (1)

1.2.4 A Algorithm (1)

1.2.5 H Spam (1)

1.2.6 D Hyperlink (1)

1.2.7 R Machine Cycle (1)

1.2.8 C Machine code (1)

1.2.9 L GIGO (1)

TOTAL SECTION A: 15

Copyright reserved Please turn over


Information Technology/P2 3 DBE/2022
SC/NSC – Marking Guidelines

SECTION B: SYSTEMS TECHNOLOGIES

QUESTION 2

2.1.1 a) DIMM slot  (1)

b) Any TWO functions of a motherboard: 


 Houses components (also accept specific components)
 Connects components / communication
 Provides power/distributes power to components (2)

c) Increased use of virtual memory will result in data being accessed at a


slower/lower rate 
Instructions and data are fetched at a slower rate from storage than from
RAM 

OR

Decreased use of virtual memory/more instructions and data can be


stored in RAM
Instructions and data are fetched faster from RAM than from storage  (2)

2.1.2 A core is a single/separate processor on a CPU chip (1)

2.1.3 Any ONE type of storage device used to increase storage space: 
 SD card / memory card (1)

2.1.4 Why would device C would be the most suitable device to scan QR codes:

Mobility/portability 
Access to camera/ front and rear facing camera/built in camera  (2)

2.1.5 Central Processing Unit (CPU)  (1)

2.1.6 Any ONE motivation for having a dedicated graphics card: 


 Needed for graphics intensive applications (Video editing / CAD)
 Improve overall performance
 Reduce the processing load on the CPU
 Crypto mining (1)

2.2.1 Any ONE for what is modular design: 


 Computer is built up from separate modules/ parts
 An indication that the computer consists of individual components  (1)

2.2.2 Any ONE reason for using modular design: 


 Components can be combined according to your needs
 Easy to upgrade/replace
 Easy to repair (1)

Copyright reserved Please turn over


Information Technology/P2 4 DBE/2022
SC/NSC – Marking Guidelines

2.3.1 Any TWO properties of CPU cache memory: 


 High speed memory/static memory
 Memory on the CPU
 Stores frequently used instructions/stores instructions likely to be used
next (2)

2.3.2 Any TWO other types of caching that is used on a computer system:

Web caching 
Disk caching  (2)

2.4.1 A Trojan is malware disguised as useful software 


A user is tricked into installing  the Trojan with the assumption that they are
installing useful/legitimate software

CONCEPTS:
 Malware disguised as useful/legitimate software
 Activated by action from the user (installing/downloading) (2)

2.4.2 A firewall monitors/controls/filters traffic  (incoming & outgoing) on a


network/internet and prevents unauthorised communication/access  (2)

2.5 Difference between software update and patch:

An update fixes code/adds new features/enhances security to software 


A patch removes software bugs/replacing incorrect code/removes
vulnerabilities in code  (2)

2.6 Any TWO ways to free up storage space: 


 Use a disk clean-up tool/example of disk clean-up
 Remove duplicate files
 Uninstall/remove unused software/applications
 Empty the recycle bin
 Compress data not frequently used
 Archive files/data
 Move data/files to cloud storage/external device (2)

TOTAL SECTION B: 25

Copyright reserved Please turn over


Information Technology/P2 5 DBE/2022
SC/NSC – Marking Guidelines

SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES

QUESTION 3

3.1 3.1.1 Any ONE type of cable used in wired LAN:


 UTP/Ethernet cable (CAT 5/6/7)
 Fibre (1)

3.1.2 Any ONE type of media used to transmit in WiMAX:


 Radio waves
 Electromagnetic waves (1)

3.1.3 Wi-Fi  (1)

3.2 3.2.1 VPN (Virtual Private Network)  (1)

3.2.2(a) IP address:
A unique address/code that identifies a device  on a network. (1)

3.2.2(b) Purpose of a DNS:


To obtain the correct IP-address for a specific URL/linking URL’s to
IP-addresses  (1)

3.2.3 The NIC encodes/decodes data  that is transmitted across a


network 

OR

Provides a network hardware port for the computer to allow for


data transmission over a network (2)

3.2.4 Intranet is a network similar to the Internet/browser based


network  of which the access is limited to a specific
organisation  (2)

3.3 3.3.1 Any ONE characteristic of streaming: 


 The immediate and real-time delivery of media content to a
receiving device
 The file is not saved to the storage devices media, but only
played on the device
 Live viewing/ Video on demand (1)

3.3.2 Any ONE way to prevent unauthorised viewing: 


 Use on a closed channel/do not connect to a larger network
 Use a login/password to control access the content (1)

Copyright reserved Please turn over


Information Technology/P2 6 DBE/2022
SC/NSC – Marking Guidelines

3.4 3.4.1 You will find “HTTPS” in the URL  (1)

3.4.2 (a) Changing the format of data  using a mathematical formula/key to


prevent unauthorised access

OR

Any TWO properties of encryption (SSL):


 The public key is used to encrypt the data.
 The data can only be decrypted using the specific private key.
 The private and public unique matching keys are provided by
complex mathematical algorithms.
 The private key never travels on network and therefore cannot
be intercepted. (2)

3.4.2 (b) The CA verifies that the business or organisation is valid.  (1)

3.5 Difference between functions of a router and modem:

A modem converts the format of a signal for a specific communication


medium. 
A router determines the best/correct route  for the transmission of a
message/communication between two points on a network.  (3)

3.6 3.6.1 Semantic Search  (1)

3.6.2 Purpose of using SEO:

To ensure that a search engine  will place the company’s site


higher up in the order of search results.  (2)

3.7 3.7.1 FTP (File Transfer Protocol)  (1)

3.7.2 Any ONE type of file sharing service: 


 Cloud storage
 BitTorrent
 Git/Git hub

Also accept examples of Cloud Storage like Google Drive, One


Drive etc. (1)

3.7.3 Any ONE benefit of using online file storage services: 


 accessible from many devices/places
 collaboration/sharing
 Saving on local storage space
 Servers take responsibility for creating a backup of the files (1)

TOTAL SECTION C: 25

Copyright reserved Please turn over


Information Technology/P2 7 DBE/2022
SC/NSC – Marking Guidelines

SECTION D: DATA AND INFORMATION MANAGEMENT

QUESTION 4

4.1 It is the primary key.  (1)

4.2 Primary key:


Must be unique 
Cannot be empty/have a null value/required field  (2)

4.3 IDNumber  (1)

4.4 Suitable data type for the VehicleRegNumber and motivation:


Short Text (any text data type) 
A vehicle registration number contains numbers and letters  (2)

4.5 Why should name and surname be split into two fields:
There is more than one piece of information in the field 
OR
Any indication that it might be necessary to separately work with the name
and surname values (1)

4.6 4.6.1 Data redundancy refers to the unnecessary repetition of data  (1)

4.6.2 Normalisation  (1)

4.7 4.7.1 Example of useful information extracted from the data:

Establishing the frequency of offences/most common offence/least


common offence 

Accept any relevant or correct answer of information gained from


the table (1)

4.7.2 How can step 3 & 4 in the data progression diagram be applied:

A logical solution  linked to the information obtained 


Example - Increase policing at stop signs

Also accept other correct examples based on the information from


QUESTION 4.7.1 (2)

4.7.3 Fuzzy logic deals with reasoning that works with probabilities. 

Drivers not stopping at stops are reckless drivers/there are many


reckless drivers in the community 

Also accept any other correct example (2)

Copyright reserved Please turn over


Information Technology/P2 8 DBE/2022
SC/NSC – Marking Guidelines

4.8 4.8.1 SQL injection:


A hacking technique where SQL statements are entered  into
data input fields  instead of data. (2)

4.8.2 Audit trail:


A record or 'trail' that is made to keep track of who  made
changes to a database and when  those changes were made. (2)

4.9 4.9.1 (a) Logical integrity  (1)

4.9.1 (b) Physical integrity - ensuring that data is protected against damage
from power surges, natural disasters, theft, etc.  (1)

4.9.2 Any TWO ways to ensure the date is entered in the correct
format: 
 Provide a list/component to select from/date picker/calendar
 Specify format in input component/ghost text
 Format/Data type check/applying a validation rule
 Input mask (2)

4.10 How is transaction processing used to maintain data integrity:


 In transaction processing, transactions that are dependent on one another
to work are grouped together. 
 The transaction will only be completed if all the individual transactions are
successful. 
 If any one of the parts/instructions are unsuccessful, everything will be
rolled back.  (3)

TOTAL SECTION D: 25

Copyright reserved Please turn over


Information Technology/P2 9 DBE/2022
SC/NSC – Marking Guidelines

SECTION E: SOLUTION DEVELOPMENT

5.1 5.1.1 2  (1)

5.1.2 0-9  A-F  (2)

5.2 5.2.1 Any ONE reason for using an array vs variable: 


 When working with a large number of values/variables
 An array can store multiple values
 A variable can store only one value (1)

5.2.2 Any ONE reason why names and ages cannot be stored in array
provided: 
 An array can only store values of one specific data type
 Names and ages are represented by two different data types
 The provided array can only store integer values (1)

5.2.3 Loop k index 10  down to 7  Loop k index 9 down to 6


arrNum[k]  arrNum[k-1]  OR arrNum[k+1]  arrNum[k]
arrNum[6]  92  arrNum[6]  92 (5)

5.3 5.3.1 (a) FALSE  (1)

(b) TRUE  (1)

(c) FALSE  (1)

5.3.2 An accessor returns the value of an attribute  of an object and a mutator


changes the value of an attribute  of an object. (2)

5.4 Number Factor Loop Number Factor = 1 Output


mod Loop =
0
4
0
2
True/Yes
1
3
False/No
4
True/Yes
2
False/No
4 is NOT a
prime number
    

Notes:
 Values may be placed in the same line as long as progression of
algorithm is clear.
 Mark with fault by penalising for the faulty value in that column only. (5)

TOTAL SECTION E: 20
Copyright reserved Please turn over
Information Technology/P2 10 DBE/2022
SC/NSC – Marking Guidelines

SECTION F: INTEGRATED SCENARIO

QUESTION 6

6.1 6.1.1 Crowd funding:


The practice of funding a project or venture by raising money from a
large number of people  who each contribute a small amount,
typically via the internet/social networks. (1)

6.1.2 (a) Any TWO reasons of using technology to automate the


assembly of new vehicles: 
 Safer work environment
 Fewer people employed/cost saving
 Greater precision/consistency of repetitive tasks
 Greater efficiency
 Improved productivity

Also ACCEPT other valid answers. (2)

(b) How could a learning algorithm be used to improve the


manufacturing and sale of new vehicles:

A learning algorithm observes the current processes/trends


that are followed , for example, colour preference of vehicles,
also extras that are popular, creates a set of rules based on the
observation  and creates an optimal process that can be
implemented. 

CONCEPTS:
 Studying/observing current processes/trends
 Creating a set of rules
 Creating an optimal process (3)

6.2 6.2.1 Radio Frequency Identification  (1)

6.2.2 Any TWO ways how passive tags work: 


 Energy from reader’s radio signal at tollgate powers the tag
 Tag sends a signal that the reader uses to identify the specific
tag
 Amount is automatically deducted from tag holder’s account (2)

6.2.3 (a) GPS  (1)

(b) Any ONE reason why active tags will be needed for satellite
tracking: 
 The signal needs to be transmitted over longer distances
 Stronger signal needed to communicate with satellite
 Signal needs to be transmitted continuously (1)

Copyright reserved Please turn over


Information Technology/P2 11 DBE/2022
SC/NSC – Marking Guidelines

6.3 6.3.1 Uncapped:


Unlimited amount of data that can be used in a month 
OR
No limit on amount of data used. (1)

6.3.2 Any ONE reason for installing fibre rather than mobile LTE: 
 Fixed location internet has a lower cost per GB than mobile LTE
 Fibre might have faster connection speeds depending on the
speed of the package
 Using a lot of data

Also ACCEPT other valid answers. (1)

6.3.3 Router/ONT  (1)

6.3.4 Will the 70GB Night Surfer Data hold a benefit for the company:
Yes, backup/update procedures can be done overnight 
OR any other applicable motivation

OR

No. Outside office hours


OR any other applicable motivation (2)

6.4 6.4.1 (a) Rootkit:


Software designed to obtain administrator rights to a computer
for unauthorised access.  (1)

(b) Any ONE risk to data due to rootkit: 


 Opens the computer for hacking/illegally accessing data
files
 Creating backdoors for other malware
 Used as a bot for launching attacks on other computers
and networks.

Also ACCEPT other valid answers. (1)

6.4.2 Social engineering:


An attempt to manipulate or con someone  into installing malware
or giving out sensitive personal information.  (2)

6.4.3 Any ONE way that anti-virus software identifies malware: 


 The anti-virus software scans the files to identify known threats
using virus signatures/definitions
 Looks for pieces of code that is unique to specific viruses. (1)

Copyright reserved Please turn over


Information Technology/P2 12 DBE/2022
SC/NSC – Marking Guidelines

6.5 6.5.1 Any TWO ways that AI can be used when working with big data: 
 Find possible connections among datasets
 Recognize knowledge using natural language processing
 Can be used to automate and accelerate data preparation tasks
 Can learn common human error patterns
 Detect and resolve potential flaws in information
 Can learn by watching how the user interacts with an analytics
program
 Can identify data types
 It can alert users to anomalies or unexpected patterns in data
 Identify potential threats from system logs or social networking
data

Also ACCEPT other valid answers. (2)

6.5.2 With the duplication model, each separate site has a complete copy
of the entire database stored. 
With the partitioning model, each site stores and manages only the
part of the database it works with.  (2)

6.5.3 (a) Purging:


Deleting/removing records  permanently from a database. (1)

(b) Any ONE reason why records will need to be purged: 


 To limit the size of the database file.
 Remove obsolete/redundant/outdated records
 Improve the performance of the database (1)

6.6 6.6.1 Virtualisation is the use of software  to create an entity that only
exist for as long as the software is being run.  (2)

6.6.2 Any ONE benefit of virtualisation: 


 Saving on hardware
 Can run software written for other platforms
 Convenience of not having to keep multiple devices (1)

6.6.3 Is it compulsory for the company to pay for the additional


proprietary operating system:

Yes,  the user must pay for the operating system to avoid
committing piracy  (2)

6.6.4 TWO ways in which virtualisation is applied to make scalability of


services possible:

Combining the resources of many machines into one powerful


service 
Sharing the resources of one powerful machine between many
users  (2)

Copyright reserved Please turn over


Information Technology/P2 13 DBE/2022
SC/NSC – Marking Guidelines

6.7.1 Any ONE reason to frequently change a password: 


 For security reasons
 Prevent access to your account due to password leaks

Also ACCEPT other valid reasons. (1)

6.7.2 Any TWO reasons why mfundi is not a strong password: 


 Password too short/must be more than 8 digits
 Only lowercase characters/must contain an uppercase and lowercase
letter, number and special character
 Can easily be guessed/do not use personal information (2)

6.7.3 (a) How can Quantum computing can be used in the statistical process of
preventing the spread of a virus:

It is used to easily query, monitor, analyse and act on data ,


regardless of the source. (1)

(b) Any TWO problems of cloud computing which are solved using Edge
computing: 
 Bypasses the latency caused by cloud computing.
 Acts as mini data centres which cloud computing lacks.
 Used to process time-sensitive data in remote locations with limited
or no connectivity to a centralised location. (2)

TOTAL SECTION F: 40
GRAND TOTAL: 150

Copyright reserved

You might also like