0% found this document useful (0 votes)
32 views

'!/ A) B) C) D) A) B) C) D) A) B) C) D) : Itisa2hourpaper

Uploaded by

ezinhle2710
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

'!/ A) B) C) D) A) B) C) D) A) B) C) D) : Itisa2hourpaper

Uploaded by

ezinhle2710
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

HILLCREST H!

GH SCHOOL

MAY EXAMS 2O1O IT GRADE 10

EXAMINER: BROOKS PAPEB ONE 100 Marks

Itisa2hourpaper. Pleasewriteneatlyandclearly. Thispaperconsistsof4questionsand4pages


including this page.

SECTION A: MULTIPLE-CHOICE QUESTIONS (10 Marks - 1 per question)

QUESTION 1

Various possible options are provided as answers to the following questions. Write only the letter
(A-D) next to the question number (1.1-1.10) on the answer sheet provided.

'!/ 1.1 Which one of the following is not a typicalexample of a hardware device?
a) Scanner
b) Modem
c) Search engine
d) Flash disk
1.2 Which one of the following lists arranges the device in increasing order of Processing Power?
a) PDA, server, laptop, mainframe
b) Laptop, PDA, mainframe, server
c) Server, mainframe, PDA, laptop
d) PA, laptop, server, mainframe
L.3 A UPS is...
a) Used to provide limited alternative power in the event of a power failure
b) Stands for Universal Power Supply
c) A type of connector THAN is used for keyboards
d) Used to connect two networks
1.4 Which one of the following file extensions does not logically belong with the other three
options?
a) .JPG

b) .AVr
c) .BMP
d) .GlF
1.5 Which of the following statements about java is false
a) lt is a compiled programming language. Hillcrest High
b) lt is an object oriented language.
School
c) lt is named after a type of coffee. Please do not remove
d) lt is not a case sensitive. from library

Page | 1
...r ,.llijtl],it i

1.6 GUI is an acronym for


a) Graphical User tnterface
b) Gettable User Input
c) Graphical User lnput
d) General User lnterface
1.7 Which of the following are not examples of operating systems?
a) Microsoft Windows XP
b) Ubuntu Linux
c) Mozilla Firefox
d) Mac Osx
1.8 Which of the following devices do not fit directly on to the motherboard?
a) CPU
b) Graphics card
c) RAM
d) Monitor
\, 1.9 Which of the following are not examples of e-communication
a) E-mail
b) Forums
c) Television
d) rM
1.10 Which of the following are not social network websites?
a) www.facebook.com
b) www.myspace.com
c) www.twitter.com
d) www.telkom.co.za

TOTAL SECTION A: 10

SECTION B: HARDWARE AND SOFTWARE

QUESTION 2

2.1 Name what is arguably the two most important components of a computerl (2)
2.2 Differentiate between hardware and softwarel (4)
2.3 Sort the following list into the two headings HARDWARE, and SOFTWARE. (12)
Printer Monitor
Keyboard lnternet Explorer
Microsoft Word Windows Media player
Paint USB port
UPS RAM
Freecell MXit
2.4 Differentiate between system and application software, giving an example of each! (4)

Page | 2
2.5 Give a detailed description of how you would access an application that will allow you to
write a letterto a friend and howyou would record your letterto a removable storage
device for later usel (s)
2.6 List any three output devices found with a computer! (3)
2.7 Hard drives and CD ROMs are connected to the south bridge. Explain in detailwhat the
south bridge is and why are it is important to the computer. Make mention of any other
devices or parts that are involved in the function of the bridge. (4)
2.8 Explain the difference between RAM and ROM. (6)

TOTAL SECTION B: 40
SECTION C: E-COMMUNICATIONS AND SOCIAL ETHICS

QUESTION 3

3.1 Your father is having a problem with spam on his e-mail account.
3.1.1 Explain to him what spam isl (2\
3.1,.2 Give him three hints on how to cut down on the amount of spam he is receiving.
(3)
3.2 Can cookies damage your computer? Motivate your answer. (3)
3.3 Explain what phishing is and how to protect yourself (3)
3.4 Describe how to prevent a computer from being infected by a virus (4)
3.5 Social networking has become a way of life. Your grandmother has recently discovered
Facebook. Explain to her any dangers she may encounter using Facebook. (6)
3.6 Explain the difference is between forums and e-mail. (3)
3.7 Your ISP phoned you to say that your account has not been paid. You decide that you
really need the service they offer, and thus pay the account. Explain to your neighbour
what the service is that an ISP offers. (2)

3.8 The school newspaper has decided to go high tech. lnstead of using printed media, they
would like to go digital. However, the staff in charge of the newspaper, are very old and
are not very competent with technology. Thus they are very confused with some of the
products available to them. They have heard of blogs, forums, RSS feeds and social
networking sites. They however have no clue what they are, and have called upon you to
explain to them what they are, with examples. Furthermore, they expect you to make an
educated decision as to which e-communication tools are going to work for them | (1,2)

3.9 Cellphones have become a part of everyday life. They include access to the lnternet,
and many other features, but what has to be the most popular feature is the
introduction of cellphone based lM, namely MXit. MXit is considered a very
controversial product. Give what you believe could be valid reasons for this controversy,
using your knowledge of social ethics and computer usage. (6)

TOTAL SECTION C: 40

Page | 3
r
I
il ,'l

SECTION D:JAVA

QUESTION 4

4.1 The following lines of Java code contain an error. Correct the errors.
4.1..1. System.out.println(This line has an error); (1)

4.1..2 JOptionPane.showlnputDialog("So does this line") (1)

4.L.3 integer number = 15; (1)

4.1..4 if (number=15){} (1)

4.1.5 public void main(String[] argsX] (1)

4.2 Explain what the following code achieves, and thus give the method an appropriate
name. (5)

1. public void methodName0


2.{
v g. String input = JOptionPane.showlnputDiolog("Enter o name");
4. int age = lnteger.parselnt(JOptionPane.showlnputDiolog("Enter age of person"));
5. int year = lnteger.parselnt(JOptionPone.showtnputDialog("Enter the current year"));
6. String birthdoy = JOptionPone.showlnputDialog("Have they hod their birthday this yeor");
7. if (birthdoy.equals("yes"))
8.t
9. System.out.println("Their birthday wos in " + (yeor-oge));
1-0. ]
11. Else
12. {
13. System.out.println("Their birthdoy was in" + (year-age-1));
14. ]
ls.]

TOTAL SECTION D: 10

Page | 4

You might also like