CAT GR 11 P2 Nov 2018-Unlocked
CAT GR 11 P2 Nov 2018-Unlocked
SENIOR CERTIFICATE
GRADE 11
NOVEMBER 2018
NOVEMBER 2011
MARKS: 150
TIME: 3 hours
3. Number the answers correctly according to the numbering system used in this question
paper.
7. In general, a mark is allocated per fact. A 2-mark question would therefore generally
require TWO facts, etc.
SECTION A
COLUMN A COLUMN B
2.6 An e-mail that promises the school principal that he will receive a large
amounts of money if he forwards this e-mail to at least 10 people is
called a ….
A worm
B trojan
C hoax
D advertisement (1)
2.7 Which ONE of the following components will probably improve the
performance of a PC the most?
A Adding another HDD
B Adding a DVD drive
C Stable Internet connection
D Adding more memory (1)
2.8 Which ONE of the following Internet websites does NOT require a
password and/or pin in order to use its functions?
A Facebook
B Internet banking site
C Web-based e-mail such as Gmail
D Online shoppingsite (1)
2.9 Which database object would be the best to enter or edit data in a
database, by a user not familiar with a database application such as
Microsoft Access?
A Query
B Report
C Form
D Table (1)
2.10 Which function would you use to count only certain numbers in a
range?
A COUNTIF
B COUNTA
C SUM
D COUNT (1)
(10 x 1) [10]
Computer Applications Technology/P2/Gr 11 6 NW/Nov 2018
NCS
Indicate whether the following statements are TRUE or FALSE. Choose the answer and
write ‘true’ or ‘false’ next to the question number (3.1-3.5) in the ANSWER BOOK. Correct
the statement if it is FALSE. Change the underlined word(s) to make the statement TRUE.
(You may not simply use the word ‘NOT’ to change the statement.)
EXAMPLE:
QUESTION ANSWER
3.4 Operating system software is more important than application software. (1)
3.5 Function keys enable you to change the action of another key when the
keys are pressed at the same time. (1)
(5x1) [5]
TOTAL SECTION A: 25
Computer Applications Technology/P2/Gr 11 7 NW/Nov 2018
NCS
SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES
4.1.1 List any TWO types of scanners AND the advantages of their
use. (4)
4.1.5 Touch screens have become very popular for input on mobile
devices. Name TWO possible reasons for this. (2)
4.3.2 Why would computer users need more secondary storage than
primary memory? (2)
4.4.1 What is the difference between a service pack and a patch? (2)
[25]
Computer Applications Technology/P2/Gr 11 8 NW/Nov 2018
NCS
5.2 Give TWO instances where a WLAN is better than a LAN. (2)
100/1000
Supports 802.11
5.3.1 What is the maximum data transmission speed that this item can
support? Also give the unit in which this speed is measured in
your answer. (1)
[10]
Computer Applications Technology/P2/Gr 11 9 NW/Nov 2018
NCS
6.2 You recently completed your PAT. What is the purpose of the task
definition and why is it a good idea to express the task definition in (2)
your own words?
[10]
Computer Applications Technology/P2/Gr 11 10 NW/Nov 2018
NCS
7.1 Explain what metadata is and give a suitable example of metadata in your
answer. (2)
7.2 Provide the general term used to describe the situation where we have so
much information available that it becomes difficult to take in and process
all the data. (1)
7.3 Describe why creating a contact group in your e-mail program can help you
work more efficiently.
(1)
7.4 The more computers are used, the more they are used for crime.
Briefly explain why increasing use of Internet has had a negative effect on (1)
some businesses. You may use an example to illustrate your answer.
[10]
Computer Applications Technology/P2/Gr 11 11 NW/Nov 2018
NCS
8.1.1 All the learners’ names are listed in a field in a database table.
8.2 Learners are using the CAT centre to complete school projects.
8.2.1 One of the learners said that his teacher said they must use
footnotes.
8.3 The teachers where selling lollipops. They made use of a spreadsheet to
keep track of who bought the sweets and how many they sold for a
research project.
8.3.1 Briefly explain why some of the cells display hash tags (####) and
provide a solution to the problem. (2)
8.3.2 Write down the formula that was being used to calculate the VAT. (3)
Computer Applications Technology/P2/Gr 11 12 NW/Nov 2018
NCS
8.3.3 The teacher wanted to print the spreadsheet on one page, but in
the print preview he saw that the spreadsheet did not fit onto one
page without changing the font size. (2)
TOTAL [15]
SECTION B 75
Computer Applications Technology/P2/Gr 11 13 NW/Nov 2018
NCS
QUESTION 9
Your school wants to implement a BYOD policy in the school. BYOD stands for Bring
Your Own Device and refers to a practice whereby staff and learners can use their own
tablets, notebooks and smartphones at school to connect to the school’s network and
use them in class.
9.1 A whole range of devices and computers may possibly be used for BYOD.
9.1.1 Give TWO potential advantages of using tablets instead of laptop (2)
or notebook computers in this scenario.
9.1.2 Our school provides an open Wi-Fi network that students and (2)
teachers can access with their own devices. Is this considered
BYOD?
9.2 The devices and computers will be able to connect wirelessly to the
school’s intranet by using appropriate apps that can be downloaded from
an app store.
9.2.2 Many students will make use of a smartphone. Name TWO types (2)
or brands of operating systems that are commonly found on
smartphones.
9.2.3 Explain why the learners would not be able to download their apps (2)
from just any app store.
9.3 The principal is concerned that neighbours of the school will gain access to
the school’s Wi-Fi password and gain access to important information.
9.3.2 Which network security system will prevent neighbours from (2)
accessing school data and how does this system work?
9.3.3 Give TWO ways of preventing someone from gaining access to the
content of important files on the network.
(2)
Computer Applications Technology/P2/Gr 11 14 NW/Nov 2018
NCS
9.4 The network administrator is researching the uses of BYOD and has found
that there are numerous blogs and websites with lots of information that is
frequently updated. Many of these sites suggest storing the learners’ files
in the cloud.
9.4.1 Give TWO disadvantages of saving learners’ files in the cloud. (2)
9.4.2 Give TWO potential advantages of storing the learners' files in the
cloud (using a service such as OneDrive) as opposed to storing
them locally on the schools’ network. (2)
9.5 One of the possibilities with BYOD is that learners will also be able to print
documents directly from their computers and devices, provided they have
the correct software and drivers installed. One of the programs that can be
used is EaziPrint4M.
9.5.1 Explain what a driver is and what its function is. (2)
Explain why this beta version of the software may not be the ideal
version to use, by explaining what beta software is.
(2)
9.5.3 Software installation has been made much easier by the use of
wizards.
9.5.4 Give TWO reasons why you would advise learners to choose the
‘Typical installation’ option when installing this software. (2)
Explain what the tick symbol in the middle indicates and what the (2)
significance of this is.
Computer Applications Technology/P2/Gr 11 15 NW/Nov 2018
NCS
9.6 An online opinion survey was conducted to determine what the learners'
preferences in terms of the use of ordinary textbooks to e-books, and what
type of computer or device they would rather use in class. The data
obtained from this poll was taken to a spreadsheet. An extract of the data
is shown below.
A B C D
2 8 m E-books Notebook
3 10 f Textbooks Smartphone
4 11 m Textbooks Smartphone
5 9 f E-books Smartphone
6 8 m E-books Tablet
7 9 f E-books Tablet
8 11 m Textbooks Notebook
9 12 f Textbooks Tablet
9.6.2 It was found that the grade 8’s preferred (e-books) as opposed to
normal printed textbooks.
9.6.3 The school wants to know which ONE of the 3 devices (notebook,
smartphone or tablet) is the most preferred device.
9.7 A scanner is used by the teachers to convert hard copies of old test papers
into Word documents.
9.8 The Maths teacher wants to set up a website for her learners and has
taught herself some basic HTML. She encountered a few problems and
needs advice.
9.8.1 Explain what the following HTML code will ‘do’ when displayed in
a browser?
(2)
<title> Extra Examples </title>
9.8.2 The Maths teacher made some changes to HTML cods but none
of the changes showed when she displayed the page in the web
browser.
9.8.3 Give TWO tips that the teacher should follow in terms of the links
on the web pages so that her website is easy to navigate.
(2)
9.9 The network administrator received an e-mail from another school with the
following attachment:
9.9.1 What is the main purpose of using this type of file when sending (1)
e-mail attachments?
9.9.2 Explain what you would need to do before you could access the (1)
files contained in this attachment.
9.10 The school is concerned that the BYOD policy would lead to a lot more
usage of the Internet and place further strain on their capped ADSL line.
9.10.2 Outline TWO practical ways in which the amount of data used (2)
could be restricted.