0% found this document useful (0 votes)
13 views16 pages

CAT GR 11 P2 Nov 2018-Unlocked

Computer application technology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views16 pages

CAT GR 11 P2 Nov 2018-Unlocked

Computer application technology
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

NATIONAL

SENIOR CERTIFICATE

GRADE 11

COMPUTER APPLICATIONS TECHNOLOGY P2

NOVEMBER 2018

NOVEMBER 2011

MARKS: 150

TIME: 3 hours

This question paper consists of 16 pages


Computer Applications Technology/P2/Gr 11 2 NW/Nov 2018
NCS

INSTRUCTIONS AND INFORMATION

1. This question paper consist out of:

Section A (25 marks)


Section B (75 marks)
Section C (50 marks)

2. Answer ALL the questions.

3. Number the answers correctly according to the numbering system used in this question
paper.

4. Start EACH question on a NEW page.

5. Do NOT write in the right-hand margin of the ANSWER BOOK.

6. Leave a line between sub questions.

7. In general, a mark is allocated per fact. A 2-mark question would therefore generally
require TWO facts, etc.

8. Write neatly and legibly.


Computer Applications Technology/P2/Gr 11 3 NW/Nov 2018
NCS

SECTION A

QUESTION 1: MATCHING ITEMS


Choose a term/concept from COLUMN B that matches a description in COLUMN A.
Write only the letter (A–S) next to the question number (1.1–1.10) in the ANSWER
BOOK, for example 1.11 T.

COLUMN A COLUMN B

1.1 An example of a dedicated device A. DSLR


B. 4:3
1.2 A specification used to refer to print quality
C. QR code
1.3 A criterion used to evaluate the content of a website
D. WiMax
by checking that the content is factual and that there
is no bias E. 1920 x 1440
F. #NAME?
1.4 An example of a screen resolution
G. RFID
1.5 A specification that indicates that a device supports H. Heading 1
wireless connections
I. #####
1.6 A technology that can be built into a card or tag to J. DPI
automatically identify and track objects wirelessly
K. Harvard
1.7 An operator that can be used to compile a criterion in L. Currency
an Access query
M. Linux
1.8 A style commonly used to format citations and your N. 802.11
bibliography in a Word document
O. ATM
1.9 The error message returned when = AVG(A1:B1) is P. iPad
entered in a cell in a spreadsheet
Q. Is Null
1.10 An example of software that may be freely used, R. Objectivity
modified and distributed.
S. NOT
(10 x 1) [10]
Computer Applications Technology/P2/Gr 11 4 NW/Nov 2018
NCS

QUESTION 2: MULTIPLE-CHOICE QUESTIONS


Various options are given as possible answers to the following questions. Choose the
answer and write only the letter (A–D) next to the question number (2.1–2.10) in the
ANSWER BOOK, for example 2.11 E.
2.1 Which is the most appropriate medium to use to send an urgent
three page agenda for a meeting to district committees?
A Website
B SMS
C Letter
D Fax (1)
2.2 The North West Province has 4 districts. Which ONE of the following
network types would the Education Department use to communicate
with its districts?
A LAN
B WAN
C PAN
D MAN (1)
2.3 Which ONE of the following can be classified as both an input and
output device?
A Bluetooth keyboard
B Touch screen
C Laser mouse
D Scanner (1)
2.4 Which ONE of the following would be the most suitable computer type
for processing massive amounts of information, such as a weather
forecasting?
A Tablet PC
B Server
C Laptop
D Super computer (1)
2.5 This button will download a new copy of the website being viewed:
A Stop
B Refresh
C Forward (1)
D Back
Computer Applications Technology/P2/Gr 11 5 NW/Nov 2018
NCS

2.6 An e-mail that promises the school principal that he will receive a large
amounts of money if he forwards this e-mail to at least 10 people is
called a ….
A worm
B trojan
C hoax
D advertisement (1)
2.7 Which ONE of the following components will probably improve the
performance of a PC the most?
A Adding another HDD
B Adding a DVD drive
C Stable Internet connection
D Adding more memory (1)
2.8 Which ONE of the following Internet websites does NOT require a
password and/or pin in order to use its functions?
A Facebook
B Internet banking site
C Web-based e-mail such as Gmail
D Online shoppingsite (1)
2.9 Which database object would be the best to enter or edit data in a
database, by a user not familiar with a database application such as
Microsoft Access?
A Query
B Report
C Form
D Table (1)
2.10 Which function would you use to count only certain numbers in a
range?
A COUNTIF
B COUNTA
C SUM
D COUNT (1)

(10 x 1) [10]
Computer Applications Technology/P2/Gr 11 6 NW/Nov 2018
NCS

QUESTION 3: TRUE/FALSE ITEMS

Indicate whether the following statements are TRUE or FALSE. Choose the answer and
write ‘true’ or ‘false’ next to the question number (3.1-3.5) in the ANSWER BOOK. Correct
the statement if it is FALSE. Change the underlined word(s) to make the statement TRUE.
(You may not simply use the word ‘NOT’ to change the statement.)

EXAMPLE:

QUESTION ANSWER

A monitor is an example of an output True


device.

A monitor is an example of software. False. Hardware

3.1 Computer program instructions are executed by the CPU. (1)

3.2 A service pack is a collection of bugs for an application or operating


system. (1)

3.3 Propriety software is software that has no restrictions on the using


thereof and it may be distributed.
(1)

3.4 Operating system software is more important than application software. (1)

3.5 Function keys enable you to change the action of another key when the
keys are pressed at the same time. (1)
(5x1) [5]
TOTAL SECTION A: 25
Computer Applications Technology/P2/Gr 11 7 NW/Nov 2018
NCS

SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES

4.1 Data can be captured by means of different input devices.

4.1.1 List any TWO types of scanners AND the advantages of their
use. (4)

4.1.2 Define the term biometric input. (2)

4.1.3 List TWO disadvantages of biometric input. (2)

4.1.4 Name TWO examples of input devices for visually impaired


users. (2)

4.1.5 Touch screens have become very popular for input on mobile
devices. Name TWO possible reasons for this. (2)

4.2 An interactive whiteboard is a popular device to use in a classroom.

4.2.1 What is an interactive whiteboard? (2)

4.2.2 Mention ONE advantage of using an interactive whiteboard. (1)

4.3 Storage is an integral part of any computer system.

4.3.1 What is the function of the primary memory? (2)

4.3.2 Why would computer users need more secondary storage than
primary memory? (2)

4.3.3 Would the secondary storage also be used for back-ups?


Motivate your answer. (2)

4.4 Software is an integral part of any computer system.

4.4.1 What is the difference between a service pack and a patch? (2)

4.4.2 Would you expect FOSS to release any service packs?


Motivate your answer. (2)

[25]
Computer Applications Technology/P2/Gr 11 8 NW/Nov 2018
NCS

QUESTION 5: INTERNET AND NETWORK TECHNOLOGIES

5.1 Give THREE reasons for connecting computers in network. (3)

5.2 Give TWO instances where a WLAN is better than a LAN. (2)

5.3 Consider the specifications of a hardware item used for networking


computers below and answer the questions that follow:

 100/1000
 Supports 802.11

5.3.1 What is the maximum data transmission speed that this item can
support? Also give the unit in which this speed is measured in
your answer. (1)

5.3.2 What does the 802.11 specification refer to? (2)

5.4 What is the difference between a router and a switch? (2)

[10]
Computer Applications Technology/P2/Gr 11 9 NW/Nov 2018
NCS

QUESTION 6: INFORMATION MANAGEMENT

6.1 Exporting and importing data is an important part of data and


information processing. Briefly explain the difference between
these two concepts. (2)

6.2 You recently completed your PAT. What is the purpose of the task
definition and why is it a good idea to express the task definition in (2)
your own words?

6.3 What is the difference between an open ended question and a


closed question? (2)

6.4 Why is it important to check the quality of information from Wiki


sources? (2)

6.5 Why would it be easier to check the quality of the information


provided if the author was listed on a website? (2)

[10]
Computer Applications Technology/P2/Gr 11 10 NW/Nov 2018
NCS

QUESTION 7: SOCIAL IMPLICATIONS

7.1 Explain what metadata is and give a suitable example of metadata in your
answer. (2)

7.2 Provide the general term used to describe the situation where we have so
much information available that it becomes difficult to take in and process
all the data. (1)

7.3 Describe why creating a contact group in your e-mail program can help you
work more efficiently.
(1)
7.4 The more computers are used, the more they are used for crime.

7.4.1 Briefly describe how criminals use phishing to commit computer


crime.
(2)
7.4.2 Name TWO types of online harassments that can be experienced by
learners.
(2)
7.4.3 What type of malware is specifically focussed on capturing
confidential information such as your user (login) name and
password?
(1)
7.5 Your father has switched over to uncapped Wi-Fi connection for his
business.

Briefly explain why increasing use of Internet has had a negative effect on (1)
some businesses. You may use an example to illustrate your answer.
[10]
Computer Applications Technology/P2/Gr 11 11 NW/Nov 2018
NCS

QUESTION 8: SOLUTION DEVELOPMENT

8.1 Your CAT teacher is making use of a database.

8.1.1 All the learners’ names are listed in a field in a database table.

Which criteria would you enter in a query to extract the names of


the learners staring with an ‘M’?
(1)
8.1.2 What feature of database could be used to ensure that every
cellphone number consists of 10 numbers? (1)

8.2 Learners are using the CAT centre to complete school projects.

8.2.1 One of the learners said that his teacher said they must use
footnotes.

Explain what a footnote is and why they are used in research


projects. (2)

8.2.2 One of the learners added a table of contents to a document, but


found that one of the headings that he wanted to include was not
there.

Determine what he must do to include this heading in the table of


contents. (2)

8.3 The teachers where selling lollipops. They made use of a spreadsheet to
keep track of who bought the sweets and how many they sold for a
research project.

8.3.1 Briefly explain why some of the cells display hash tags (####) and
provide a solution to the problem. (2)

8.3.2 Write down the formula that was being used to calculate the VAT. (3)
Computer Applications Technology/P2/Gr 11 12 NW/Nov 2018
NCS

8.3.3 The teacher wanted to print the spreadsheet on one page, but in
the print preview he saw that the spreadsheet did not fit onto one
page without changing the font size. (2)

Explain TWO ways in which he can solve this problem without


changing the font size.

8.3.4 The formula in cell C2 is, =(B2*A7).

Clearly explain why incorrect results are produced when the


formula is copied down to C5, and provide a solution to the
problem. (2)

TOTAL [15]

SECTION B 75
Computer Applications Technology/P2/Gr 11 13 NW/Nov 2018
NCS

SECTION C: INTEGRATED SCENARIO

QUESTION 9

Your school wants to implement a BYOD policy in the school. BYOD stands for Bring
Your Own Device and refers to a practice whereby staff and learners can use their own
tablets, notebooks and smartphones at school to connect to the school’s network and
use them in class.

9.1 A whole range of devices and computers may possibly be used for BYOD.

9.1.1 Give TWO potential advantages of using tablets instead of laptop (2)
or notebook computers in this scenario.

9.1.2 Our school provides an open Wi-Fi network that students and (2)
teachers can access with their own devices. Is this considered
BYOD?

9.1.3 Conserving battery life will be a critical consideration. (2)

Give TWO options that could be used in power schemes of


computers to conserve or reduce power consumption.

9.2 The devices and computers will be able to connect wirelessly to the
school’s intranet by using appropriate apps that can be downloaded from
an app store.

9.2.1 Explain what an intranet is. (2)

9.2.2 Many students will make use of a smartphone. Name TWO types (2)
or brands of operating systems that are commonly found on
smartphones.

9.2.3 Explain why the learners would not be able to download their apps (2)
from just any app store.

9.3 The principal is concerned that neighbours of the school will gain access to
the school’s Wi-Fi password and gain access to important information.

9.3.1 Describe ONE other problem (besides getting access to


information) that might occur if the school’s neighbours got hold of
the WiFi password (1)

9.3.2 Which network security system will prevent neighbours from (2)
accessing school data and how does this system work?

9.3.3 Give TWO ways of preventing someone from gaining access to the
content of important files on the network.
(2)
Computer Applications Technology/P2/Gr 11 14 NW/Nov 2018
NCS

9.4 The network administrator is researching the uses of BYOD and has found
that there are numerous blogs and websites with lots of information that is
frequently updated. Many of these sites suggest storing the learners’ files
in the cloud.

9.4.1 Give TWO disadvantages of saving learners’ files in the cloud. (2)

9.4.2 Give TWO potential advantages of storing the learners' files in the
cloud (using a service such as OneDrive) as opposed to storing
them locally on the schools’ network. (2)

9.5 One of the possibilities with BYOD is that learners will also be able to print
documents directly from their computers and devices, provided they have
the correct software and drivers installed. One of the programs that can be
used is EaziPrint4M.

9.5.1 Explain what a driver is and what its function is. (2)

9.5.2 There is a beta version of the EaziPrint4Me software.

Explain why this beta version of the software may not be the ideal
version to use, by explaining what beta software is.
(2)

9.5.3 Software installation has been made much easier by the use of
wizards.

Briefly explain what a wizard is and how it functions. (2)

9.5.4 Give TWO reasons why you would advise learners to choose the
‘Typical installation’ option when installing this software. (2)

9.5.5 When selecting a printer, the following appeared:

Explain what the tick symbol in the middle indicates and what the (2)
significance of this is.
Computer Applications Technology/P2/Gr 11 15 NW/Nov 2018
NCS

9.6 An online opinion survey was conducted to determine what the learners'
preferences in terms of the use of ordinary textbooks to e-books, and what
type of computer or device they would rather use in class. The data
obtained from this poll was taken to a spreadsheet. An extract of the data
is shown below.

A B C D

1 Grade Gender Books Device

2 8 m E-books Notebook

3 10 f Textbooks Smartphone

4 11 m Textbooks Smartphone

5 9 f E-books Smartphone

6 8 m E-books Tablet

7 9 f E-books Tablet

8 11 m Textbooks Notebook

9 12 f Textbooks Tablet

9.6.1 Give TWO advantages of doing the survey this away


(electronically) instead of using a manual ‘pen and paper’ method,
besides the fact that you save time and paper. (2)

9.6.2 It was found that the grade 8’s preferred (e-books) as opposed to
normal printed textbooks.

Give TWO advantages of using electronic textbooks (e-books) as


opposed to normal printed textbooks. (2)

9.6.3 The school wants to know which ONE of the 3 devices (notebook,
smartphone or tablet) is the most preferred device.

Briefly explain how you could determine the most preferred


device, without counting the devices manually. (2)

9.7 A scanner is used by the teachers to convert hard copies of old test papers
into Word documents.

9.7.1 What type of software is used to convert scanned images of text


into text that can be edited in a word processor?
(1)
Computer Applications Technology/P2/Gr 11 16 NW/Nov 2018
NCS

9.7.2 Give ONE disadvantage, or limitation, generally associated with (1)


scanning.

9.8 The Maths teacher wants to set up a website for her learners and has
taught herself some basic HTML. She encountered a few problems and
needs advice.

9.8.1 Explain what the following HTML code will ‘do’ when displayed in
a browser?
(2)
<title> Extra Examples </title>

9.8.2 The Maths teacher made some changes to HTML cods but none
of the changes showed when she displayed the page in the web
browser.

Explain to her the solution to this problem. (1)

9.8.3 Give TWO tips that the teacher should follow in terms of the links
on the web pages so that her website is easy to navigate.
(2)

9.9 The network administrator received an e-mail from another school with the
following attachment:

9.9.1 What is the main purpose of using this type of file when sending (1)
e-mail attachments?

9.9.2 Explain what you would need to do before you could access the (1)
files contained in this attachment.

9.10 The school is concerned that the BYOD policy would lead to a lot more
usage of the Internet and place further strain on their capped ADSL line.

9.10.1 Explain what the term capped means. (2)

9.10.2 Outline TWO practical ways in which the amount of data used (2)
could be restricted.

TOTAL SECTION C [50]

GRAND TOTAL: 150

You might also like