Grade 10 IT IEB 2022 Final Theory (Paper 2) - QP
Grade 10 IT IEB 2022 Final Theory (Paper 2) - QP
GRADE 10 IEB
A Lewis
Examiner: Date: 24 November 2022
L van der Vyver
S de Lange
Moderator: Time: 2 Hours
S van Wyk
Marks: 100
Educator: School:
TOTAL 100 %
2. This paper consists of 16 pages. Please check that your paper is complete.
4. Read each question carefully before answering. Always refer back to any given scenario,
and give specific relevant points for each mark.
7. If you make use of the extra space then please ensure that you number your answers
clearly.
2 of 16
QUESTION 1 SHORT QUESTIONS 10 MARKS
1.1 Write only the LETTER of the correct answer in the space provided below.
1.1.1 Which one of the following is NOT a valid number? (1) Commented [SDL[-WC-H1]: Please
A. FACE16 change D if C is the answer, because they
only need to know Binary, Hexa and Decimal
B. 210101022
number systems – we don’t even ask octal or
C. 28013116 any others. Maybe add base 2 and base 10 in
D. 12345 the answers.
Commented [AL[CHO2R1]: Changed
options C and D.
1.1.2 Which of the following is NOT a reason for a company to make as much use of
ICT as possible? (1)
A. To work more efficiently.
B. To decrease labour costs.
C. To work with greater accuracy when producing goods.
D. To reduce the need to communicate with clients.
1.1.3 Which of the following statements or control structures is best suited to code the
flowchart below?
(1)
A. WHILE loop.
B. DO/WHILE loop.
C. IF..THEN..ELSE statement.
D. SWITCH/CASE statement.
1.1.4 Which of the following data types is NOT a primitive data type in Java? (1)
A. double
B. char
C. String
D. long
3 of 16
1.1.5 Which of the following is NOT part of the CPU? (1)
A. Registers
B. Random Access Memory
C. Arithmetic Logic Unit
D. Control Unit
1.2 Match the description on the left with the best term on the right. Write only the LETTER
of the term in the space provided below. (5)
1.2.2 The science which deals with the design of equipment, B. USB
furniture and environment to fit the user’s capabilities and
to promote user safety.
1.2.5 The name given to the process of converting one data type E. Man-Machine interface
to another.
F. Ergonomics
G. Search engine
H. ADSL
4 of 16
QUESTION 2 HARDWARE AND SOFTWARE 28 MARKS
Data:
Information:
Function 1:
Function 2:
5 of 16
2.4 Compare the difference between primary and secondary storage, and give an example
of each. (4)
Primary:
Secondary:
2.5 “The development of SSD’s has had a disruptive influence on storage technology.”
Briefly discuss the above statement. (2)
2.6 Discuss briefly how biometric devices are better than passwords at securing data. (2)
2.7 Despite dropping significantly in price, 3D printers are not in as wide-spread use as they
were expected to be. Give ONE reason why you think this fact is true. (1)
6 of 16
2.9 State any THREE software utilities that are commonly provided by most desktop
operating systems. (3)
2.10 Briefly explain the difference between data backup and data archiving. (2)
2.11 Give ONE advantage, and ONE disadvantage of cloud storage. (2)
A network:
A switch:
A router:
7 of 16
3.2 Fibre-Optic cable is difficult to manufacture, expensive to buy, difficult to install and
extremely difficult to repair if it breaks underwater. Discuss why, despite these significant
disadvantages, fibre-optic cable is still the preferred choice to install under the sea
between countries. (3)
3.3 Give ONE advantage, and ONE disadvantage of UTP type cabling. (2)
Advantage:
Disadvantage:
3.4 Why are the individual pairs of wires in UTP cable twisted? (1)
3.5 Satellites are a common way to wirelessly transmit high speed data over long distances.
3.5.1 State the main advantage that satellites offer over Microwave transmission? (1)
3.5.2 The MNET/DSTV satellite is located approximately 35 800 km above the earth
surface. Why? (2)
8 of 16
3.6 In a client-server network configuration, compare the roles of each component. (4)
Client:
Server:
3.7 Your school is considering moving onto cloud based computing to reduce their hardware
expense. Your headmaster has asked for your advice. Why is this not a very good idea?
(4)
3.8 What is the purpose of the HTTPS protocol? (1) Commented [SDL[-WC-H3]: DNS is a
grade 11 term, not taught in grade 10. Maybe
ask firewall….
Commented [AL[CHO4R3]: Changed to
HTTPS
3.9 Asymmetric Digital Subscriber Line (ADSL) is a type of broadband connection often
used by home users to connect to the internet. Why is it called “asymmetric”? (1)
9 of 16
3.11 What is the name of the protocol that a web server uses to transfer data to a web
browser? (1)
3.12 “Mobile first” is a term that is often used nowadays, that refers to the process of building
websites so that they are also useable by mobile devices. State THREE things that a web
designer would need to consider when designing websites for use by mobile users. (3)
4.1 According to bankmycell.com, "… it’s estimated that 14.28% of the current world
population (1.1 billion) doesn’t have access to electricity – resulting in the fact they
couldn’t even charge [a cell phone] if they owned it.”
(Source: https://www.bankmycell.com/blog/how-many-phones-are-in-the-world)
What is the term used to describe this situation where some global citizens have access
to, and can use, digital technology, while others don't? (1)
10 of 16
4.3 Xolisa complains of a painful wrist, and you tell her that she probably suffers from Carpal
Tunnel Syndrome. Explain to her what the cause of CTS could be, and how she might
avoid it. (2)
4.4 The non-profit organisation is serious about “green computing” when buying new
hardware. Briefly discuss TWO advantages that this policy holds for the organisation. (2)
4.5 Explain briefly how cell phones and social media together have had a profound effect on
the way that news is reported and spread globally in the modern era. (3)
5.1 Use your knowledge of the binary, decimal, and hexadecimal number systems to solve
the following. (Show ALL of your working, or NO marks will be awarded)
5.1.1 Convert the decimal number 846 into a hexadecimal number. (3)
11 of 16
5.1.2 Convert the hexadecimal number 4AF16 into a decimal number. (4)
5.2.1 Let N represent students who take seven subjects, M represent students who
take AP Mathematics, C represent students who take Computers. Rewrite the
above logical statement as a function of F. (2)
5.2.2 Evaluate the logical statement above by completing the truth table below. (3)
N M C
12 of 16
5.3 A Pentax number is a type of number that has exactly five factors. A factor is a number
which divides into the original number without a remainder. The number 16 is an example
of a Pentax number as it has five factors (1, 2, 4, 8 and 16).
Study the pseudocode below that is designed to test if a number num that is entered is
a Pentax number or not.
1 counter 1
2 factors 0
6 add 1 to factors
endif
7 add 1 to counter
end while
8 if factors = 5
10 endif
5.3.1 Explain the purpose of the num > counter (line 4), by referring to the role of the
counter variable. (2)
13 of 16
5.3.3 The pseudocode currently does not produce any output if the input number num
is not a Pentax number.
Describe what changes you need to make to the pseudocode (and where in the
pseudocode) in order to produce output when the number num is not a Pentax
number. (2)
5.3.4 Complete the following trace table to determine if the algorithm will produce the
correct output when the user enters a Pentax number. Assume that the user
enters the number 16.
14 of 16
(4)
5.3.5 There is a logic error in the given pseudocode. It will not give the output that 16
is a Pentax number, even though we KNOW that 16 is a Pentax number. Indicate
the line number containing the error. (1)
5.3.6 What should the correct statement be in the line in Ques 5.3.5 above? (1)
5.3.7 It is unnecessary for the algorithm to keep testing for factors after more than 5
factors have been found, since the number num can no longer be a Pentax
number anyway.
Describe how the algorithm could be changed to make it more efficient when
working with numbers that have more than 5 factors. (2)
15 of 16
16 of 16