NAME OF LEARNER: | |||||||
TOTAL QUESTION 1: | TOTAL QUESTION 2: | TOTAL QUESTION 3: | TOTAL QUESTION 4: | TOTAL | |||
/40 | /40 | /40 | /30 | /150 | |||
QUESTION 1: GENERAL PROGRAMMING SKILLS | MAX. MARKS | MARKS ACHIEVED | |||||
1.1 | Button [1.1 Display Club name]
| 6 | |||||
1.2 | Button [1.2 Process]
| 16 |
MAX. MARKS | MARKS ACHIEVED | ||
1.3 | Button [1.3 Test for leap year]
else
else
else
Alternative solution using a Boolean flag:
else
else
else
| 12 | |
1.4 | Button [1.4 Pattern]
| 6 | |
TOTAL QUESTION 1 | 40 |
QUESTION 2: OBJECT-ORIENTATED PROGRAMMING | MAX. MARKS | MARKS ACHIEVED | |
2.1.1 | Constructor Create:
| 5 | |
2.1.2 | Function calculatefunds : real
| 6 | |
2.1.3 | Procedure addnumber;
| 7 | |
2.1.4 | Function tostring: string;
| 8 | |
2.1 Subtotal: Object class | 26 | ||
2.2.1 | Button [Q2.2.1]
| 6 | |
2.2.2 |
| 8 | |
2.2 Subtotal: Form class | 14 | ||
TOTAL QUESTION 2 | 40 |
QUESTION 3: DATABASE PROGRAMMING | MAX. MARKS | MARKS ACHIEVED | |
3.1.1 | Button: [3.1.1] | 4 | |
SQL: select MaterialType from Material order by MaterialType DESC | |||
Concepts:
| |||
3.1.2 | Button: [3.1.2] | 5 | |
SQL: Select MaterialType from Material where MaterialType like ' + quotedstr('%' + SLINE + '%') | |||
Concepts:
| |||
3.1.3 | Button: [3.1.3] | 5 | |
SQL: Select Datedisposed, MaterialType from Material where Month(DateDisposed) = 10 | |||
Concepts:
| |||
3.1.4 | Button: [3.1.4] | 4 | |
SQL: update Disposal set Employees = Employees + Employees*10/100 | |||
Concepts:
| |||
3.1.5 | Button: [3.1.5] | 7 | |
SQL: Select sum(Quantity) As Total_Quantities, DisposalMethod from Material, Disposal where Material.Disposalcode = Disposal.Disposalcode group by DisposalMethod | |||
Concepts:
| |||
3.1 Subtotal: SQL | 25 |
3.2.1 | Button: [3.2.1]
| 7 | |
3.2.2 | Button: [3.2.2]
| 8 | |
3.2 Subtotal: Code constructs | 15 | ||
TOTAL QUESTION 3 | 40 |
QUESTION 4: PROBLEM SOLVING | MAX. MARKS | MARKS ACHIEVED | |
4.1 | Combobox option [Total weight of All waste]
| 4 | |
4.2 | Combobox option [Total weight of RECYCLED waste]
| 5 | |
4.3 | Combobox option [Percentage of RECYCLED waste]
| 3 | |
4.4 | Combobox option [TOTAL weight of EACH waste product]
| 18 | |
TOTAL QUESTION 4 | 30 |
QUESTION 1
QUESTION 3
QUESTION 4
INSTRUCTIONS AND INFORMATION
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1 Give the correct computer term for each of the following descriptions. Write only the term next to the question number (1.1.1–1.1.10) in the ANSWER BOOK.
1.1.1 A method in object-oriented programming used to build an object in memory (1)
1.1.2 The combination of more than one field to uniquely identify a record (1)
1.1.3 A set of electrical paths etched on the motherboard, used to transfer data between different parts of a computer (1)
1.1.4 The gap between people that have access to computers and technology and people that do not (1)
1.1.5 Programs that are part of the system software and maintenance and administrative tasks (1)
1.1.6 Total amount of data that can be transferred from one point to another in a given period of time (1)
1.1.7 The type of crime when someone steals your details in order to pretend to be you (1)
1.1.8 A single complete working CPU circuit (1)
1.1.9 Contracting specialist businesses to run aspects of your own business that are essential for proper functioning, but do not fall within your own area of expertise (1)
1.1.10 A web application that is designed to deliver the functions and features of a traditional desktop application (1)
1.2 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question number (1.2.1–1.2.5) in the ANSWER BOOK, for example 1.2.6 D.
1.2.1 The conversion of hexadecimal number A13 to a decimal number is …
1.2.2 What will the value of iNum be when the following statement is executed?
iNum := 7 + 5 * 9 div 3 – sqrt(49);
1.2.3 Software that translates programming instructions into machine code one line at a time is called …
1.2.4 … refer to businesses that use groups of low paid workers whose work is to repetitively click on links to fake high web traffic.
1.2.5 A sequence of one or more characters used to specify the boundary between separate independent regions in plain text is called …
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
The reality is that there is no single specification that determines the speed or performance of a computing device. Instead, a whole lot of different components and specifications all play a role in determining the overall performance of the machine.
2.1 In today’s modern times, mobility and portability have become the norm in terms technology.
2.1.1 Mobile technology is driven by ease of access, user experience, the need, the desire to be always on and always connected.
2.1.2 If you had to carry around multiple devices, no matter how powerful they are, you would become irritated and frustrated because you would be overloaded with devices and forget to bring the device you need.
2.2 Things tend to decay and descend into chaos when you just leave them to themselves – this also applies to computing devices and data. The simple answer to this problem is that we need to manage our computing devices.
2.2.1 Briefly explain in simple terms the importance to manage our computers. (1)
2.2.2 List the THREE important factors that drive or influence computer management. (3)
2.2.3 Name THREE things you need to do, which will assist you quickly and economically to rebuild a system, if your hard drive crashes. (3)
2.2.4 It is essential to have a firewall when using the Internet. Explain what a firewall is and what function it performs. (2)
2.3 Study the following dialogue box and answer the questions below.
2.3.1 What do we mean when we say the disk is fragmented? (1)
2.3.2 Why does a fragmented disk slow down a computer? (1)
2.3.3 Explain the concept disk defragmentation. (1)
2.4 There are lots of campaigns done by banking industries and the government about a variety of methods to deal with scams and malware.
2.4.1 Give TWO general tips related to the use of anti-virus software. (2)
2.4.2 Mention TWO items or points that should be included in a good password policy besides changing passwords on a regular basis. (2)
TOTAL SECTION B: 23
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
Connecting devices in a network brought a whole new dimension to the use of computers and technology.
3.1 Configuring a network covers a wide range of concepts – from choosing or buying hardware and software, to planning and implementing user rights and permissions.
3.1.1 List and briefly explain THREE different permissions that can be granted in a network. (3)
3.1.2 There are two main groups of users on a network. List and explain the TWO main groups of users on a network and the role played by each group. (4)
3.2 BitTorrent is a peer-to-peer protocol used to transfer and share large files across a network such as the Internet. To use a BitTorrent you need to install a client software.
3.2.1 List TWO examples of BitTorrent client software. (2)
3.2.2 Briefly explain the concept seeders and describe the role played by seeders in BitTorrent. (2)
3.3 Remote access technology is divided into TWO groups.
3.3.1 List and briefly explain TWO groups of remote access technologies. (4)
3.3.2 List TWO third-party software used by ONE of the groups. (2)
3.4 When the usage of the Internet expanded to include e-commerce, anonymity became a huge problem. Solutions had to be found that would allow users to trust businesses, banks etc. Digital certificates and digital signatures are the solutions currently in use.
3.4.1 Briefly explain what a digital signature is and the function it performs. (2)
3.4.2 Give TWO examples of Certificate Authorities (CAs) tasked with issuing digital certificates. (2)
3.5 A consequence of appification is that browsing and browser-based discovery of sites is decreasing and search engines are struggling to make money because of appification.
3.5.1 Explain what appification is. (1)
3.5.2 Give THREE reasons why the apps have become so popular on mobile devices. (3)
3.6 What is the term used to describe the concept that more and more devices, objects are being connected to the Internet, with the ability to communicate with other devices and objects and to take intelligent decisions based on the input received. (1)
3.7 Name the TWO web data storage models and briefly outline the main difference between these two models. (2)
TOTAL SECTION C: 28
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
Traditionally, data was organised in file formats. DBMS was a new concept then, and all the research was done to make it overcome the deficiencies in the traditional style of data management.
4.1 Briefly explain what a DBMS is (the meaning of the acronym is not required). (1)
4.2 Briefly explain the concept transaction. (1)
4.3 Distinguish between Commit/Post and Purge/Consolidate. (2)
4.4 Data redundancy covers two concepts. Briefly describe these two concepts. (2)
4.5 Parallel data set is a buzzword associated with databases.
4.5.1 Explain what a parallel data set is and what it is used for. (2)
4.5.2 Give the main disadvantage of implementing parallel data sets. (1)
4.5.3 Why should a parallel data set be kept in separate places? (1)
4.6 Differentiate between overflow and truncation. (2)
4.7 A database table has been setup containing details about all the movies and studios.
4.7.1 The table is not normalised. What is the general aim of normalisation in a database? (1)
4.7.2 Normalise the above table (Movies). Indicate the primary keys and foreign keys for each table. Create the relationship between tables. (7)
4.7.3 Use the tables in QUESTION 4.7.2 to design an ER diagram and show the relationship that exist between entities. (4)
TOTAL SECTION D: 24
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
A common problem-solving method among programmers is to break a large problem into a series of smaller problems and then to solve each of the smaller problems. |
5.1 Computers, however, cannot make mistakes. Mistakes are made by humans. The user of the program either enter incorrect or invalid data or the programmer did not write programs with built-in measures to handle invalid operations or the correct logic was not applied when writing the programming code.
5.1.1 What is the programming tool called that allows the programmer to control how a program responds to abnormal or erroneous data and allows the program to continue running by building in a code to solve the error? (1)
5.1.2 What is another name of an error in programming called? (1)
5.1.3 Define the concept step-and-watch in programming. (2)
5.1.4 What is a tool called that is used to identify logical errors, by working through the program manually step by step and recording the results of each step in a table? (1)
5.2 All programming languages have structures available to store data.
5.2.1 Explain what a data structure is and give TWO examples of data structures. (3)
5.2.2 Which example of data structure in QUESTION 5.2.1 is classified as a temporal data structure? (1)
5.2.3 Write the output of the following program statements:
Var
Name, sLine : string;
Long, iPos : integer;
sLine := ‘I just LOVE Delphi’;
5.3 UML is designed to help plan and design classes and objects. It is a powerful and complex modelling tool. A class diagram is one of the UML tools which is divided into three sections (class name section, attributes section and methods section).
5.3.1 Explain the purpose of a constructor in classes and objects. (2)
5.3.2 To remove the object from memory, we use the keyword:
ObjectName. .......................................... OR ObjectName. .................................................... (2)
5.4 Study the following code and answer the question that follows:
procedure TForm1.btnEnterValuesClick(Sender: TObject);
var
Value1, Value2, Value3, Value4, Value5 : integer; begin
Copy the trace table provided below into your ANSWER BOOK and complete to determine output. Assume that 12 and 6 are entered in an inputbox as Value2 and Value3 respectively.
Line No | Value1 | Value2 | Value3 | Value4 | Value5 | Screen Output |
1 | ||||||
2 | ||||||
3 | ||||||
(12 ÷ 2) (6)
TOTAL SECTION E: 24
SECTION F: INTEGRATED SCENARIO
QUESTION 6
ICT has revolutionised the way in which people use media to communicate socially. ICT has changed the workplace in terms of employment practices and the physical nature of the space. |
6.1 Electronic devices become increasingly smart and versatile, security cameras that previously supplied raw video data are now also able to analyse data. This enables you to alter your product ranges.
6.1.1 It is fair to say that every human activity has some greater or lesser impact upon the environment. Reasonably this means that ICT also has an environmental impact.
6.1.2 Preserving power is another form of encouraging green computing. Briefly explain the term green computing. (1)
6.2 Computer criminals always seem shrouded in mystery and cloaked with some sort of cyber-superpower. In movies and on television they are able to do amazing things with just a few lines of code or magical mouse clicks and they always seem to be able to keep one step ahead of the law.
6.2.1
6.2.2 Cyber-crime is any crime committed by using ICT as a tool. Name THREE advantages to the criminals of using ICT as a tool to commit crime. (3)
6.2.3 What do criminals use to control computing devices to commit crime? (1)
6.2.4 What is the name of the computer that is compromised in a network used to commit crime? (1)
6.3 Computers are essential tools in managing projects of national and international importance for government, academic research and business enterprises.
6.3.1 Name TWO computer-based systems that can help us to make informed decisions. (2)
6.3.2 Name THREE general applications for distributed computing. (3)
6.3.3 Name a specific example of distributed computing in practice. (1)
6.4 Concentration is a valuable asset. You need the ability to focus if you are to work effectively, be productive and achieve your goals.
6.4.1 Explain TWO advices/tips that you can apply to manage social networking to improve your concentration and make you more productive. (2)
6.4.2 Almost all social networking tools, sites and apps encourage you to share information. The problem is that you are encouraged to share and you are told of the benefits of sharing but you are not made aware of the possible negative consequences. Name TWO things you need to be aware of before publishing or sharing information on the Internet. (2)
6.5 People keep discovering new ways to extract information from databases and new ways to store and process data. What does TPS stand for? (1)
6.6 Describe the concept Software as a Service. (1)
6.7 Automatic encryption is something that happens without you consciously choosing to use the software to encrypt data. Name TWO places where automatic encryption is used. (2)
6.8 Hackers may steal data either because they want to sell it or they want to use it themselves or to blackmail someone. Explain the concept backdoor in terms of theft of data. (1)
6.9 Criminals place a skimmer and a video camera on an ATM machine. Explain the purpose of the skimmer and a video camera in this context. (2)
6.10 The way we behave and the things we do change the way in which society operates. When crime changes our behaviour and habits, it has a set of consequences on how our society operates. Name TWO effects or societal consequences of cybercrime. (2)
TOTAL SECTION F: 36
GRAND TOTAL: 150
INSTRUCTIONS AND INFORMATION
Once extracted, the following list of files will be available in the folder DataSept2020:
Question 1:
Question1_u.pas
Question1_u.dfm
Question1_p.dpr
Question1_p.res
Question 2:
Trees.jpg
Question2ClassDefinition.pas
Question2_u.pas
Question2_u.dfm
Question2_p.dpr
Question2_p.res
Question 3:
dbConnection_u.pas
WasteDisposal.mdb
WasteDisposalBackup.mdb
Question3_u.pas
Question3_u.dfm
Question3_p.dpr
Question3_p.res
Question 4:
waste.txt
Question4_u.pas
Question4_u.dfm
Question4_p.dpr
Question4_p.res
QUESTION 1: GENERAL PROGRAMMING SKILLS
Do the following:
Your school has created a club to provide information and conduct research on various environmental issues. Complete the program for the club by using the instructions below.
1.1 Button [1.1 Display Club name]
Write code in the Q1.1 event handler to do the following:
Example of output:
1.2 Button [1.2 Process]
Your school has collected paper, plastic and glass for recycling. The program in the Question 1 folder contains components to keep track of how much the monetary value is for each type of waste material that has been collected. A user will choose a waste material type and then enter the weight for that product. The refund value in Rands for each waste material type must be added up and displayed on the panels provided for paper, plastic and glass.
Write code to do the following:
The total price paid for each waste material must be calculated as follows:
Use the following data to test your solution:
Material | Weight in g | Weight in kg | Monetary value |
Paper | 356 | 0 | R 0 |
Paper | 1785 | 1 | R 25 |
Paper | 2356 | 2 | R 50 |
Plastic | 3500 | 3 | R 105 |
Plastic | 7854 | 7 | R 245 |
Glass | 1000 | 1 | R 40 |
Glass | 3745 | 3 | R 120 |
Example of output after entering the data in the table above: (16)
1.3 Button [1.3 Test for leap year]
A leap year has 366 days instead of 365 days. Write code in the onclick event of Q1.3 button to test if a year entered is a leap year.
To check whether a year is a leap year or not, you need to check the following 3 conditions:
Do the following:
Example of output:
Data to test your solution:
Leap years from 2004 to 2044:
2004
2008
2012
2016
2020
2024
2028
2032
2036
2040
2044
(12)
1.4 Button [1.4 Lucky letters]
Lucky prizes will be awarded to members of the club at a meeting.
Every third letter of the alphabet will be the first letter of the surnames of the winners, starting with the letter ‘A’.
Write code in the onclick event of Q1.4 button to display 9 letters of the alphabet, using the rule described above, in the richedit named reddisplay.
NOTE: String handling and iteration (loops) must be used.
Example of output: (6)
QUESTION 2: OBJECT-ORIENTED PROGRAMMING
A global organisation named ‘The Tree Project’ has branches around the world. A program is supplied in the QUESTION 2 folder to document the number of trees and workers as well as to calculate the monetary funds required to run this project in a particular country. |
Do the following:
The following user interface is displayed:
Complete the code for this program, as specified in QUESTION 2.1 and QUESTION 2.2.
2.1 The incomplete class (Tcountry) contains the declaration of five attributes that describe the objcountry object.
NAMES OF ATTRIBUTES | DESCRIPTION |
fcountry | The name of the country |
fleader | The name of the leader for the tree project in a country |
ftrees | The number of trees to be planted |
ffunds | The money required to run the project |
fassistants | The number of people working on the project |
Complete the code in the object class, as described in QUESTION 2.1.1 to QUESTION 2.1.4 below.
2.1.1 Write code for a constructor method named Create that will receive the name of a country and the name of a leader as parameters.
Assign these parameter values to the correct attributes and initialise the attributes for the number of trees and assistants to zero.(5)
2.1.2 Write code for a method named calculatefunds which must use the attributes named ftrees and fassistants to calculate and return the amount of funding needed for the tree project.
The funds are calculated as follows:
Example:
6 assistants and 100 trees: Cost of project = R250 + R600 + R200 = R1050 (6)
2.1.3 Write code for a method named addnumbers that will receive two integer parameters which will each represent the number of trees and the number of assistants with which you will increase the attributes of the class.
Set the value of the attributes as described below:
2.1.4 Write code for a method named tostring which must return a string.
The string must contain the attributes of the class joined together in the following format:
<country name>
<leader name> and <number of assistants > assistants
<number of trees> trees
Funds: <amount of funds required in Rands>
Example of output:
(8)
2.2 An incomplete unit Question2_u.pas has been provided.
It contains code for the object class to be accessible and has a global object variable, objcountry, already declared.
Do NOT delete or change any provided code.
Follow the instructions below to code the solution.
2.2.1 Button Q2.2.1
The user will enter a country name and a leader name in the provided edit boxes named edtcountry and edtleader.
Write code to do the following:
2.2.2 Button Q2.2.2
Write code to receive the input from the spinedits named sedtrees and sedassistants.
Use the methods of the class to do the following:
Example of output:
Joseph Mcuba as leader in South Africa starting with 30 trees and 5 assistants:
5 trees and 1 assistant added to the South African team with Joseph Mcuba as leader:
(8)
QUESTION 3: DATABASE PROGRAMMING
The database WasteDisposal.mdb contains the details of waste materials and disposal methods of a waste management company that manages the permanent removal of all waste for a city. The database contains two tables, namely Material and Disposal.
Table: Disposal
This table contains the methods of disposal of waste.
Field name | Data type | Description |
Disposalcode | Number – Long Integer | A unique number assigned to each profile |
DisposalMethod | Text (50) | The name of the method of waste disposal |
Employees | Number – Long Integer | The number of people required to carry out the disposal method |
Example of data in the Disposal table:
Disposal | ||
Disposalcode | DisposalMethod | Employees |
1 | Recycled | 120 |
2 | Reused | 320 |
3 | Landfill | 11 |
4 | Recoveredforenergy | 24 |
5 | Compostedonsite | 4 |
6 | Compostedoffsite | 10 |
Table: Material
This table contains information of all the waste materials that have been disposed of by the waste management company.
Field name | Data type | Description |
MaterialID | Autonumber | A unique number assigned to the material |
Materialtype | Text (50) | The different types of waste materials |
Datedisposed | Date/Time | Date that the last disposal took place |
Quantity | Number (long integer) | Weight in Tons that was last disposed on the date described in the Datedisposed field |
Greenhousefactor | Number (Double) | Carbon dioxide gas emissions factor for landfills. This number will be multiplied by the tonnage of the material, which results in the total carbon dioxide emission |
Disposalcode | Number (long integer) | Foreign key to connect to the Disposal table |
Example of data of the first ten records of the Material table.
Material | |||||
MaterialID | Materialtype | Datedisposed | Quantity | Greenhousefactor | Disposalcode |
1 | Plasticcontainers | 2019/10/02 | 85 | 0 | 1 |
2 | Plasticbags | 2019/09/28 | 26 | 0 | 1 |
3 | Polystyrene | 2019/07/31 | 45 | 1,8 | 3 |
4 | Glassbottlesbroken | 2019/09/18 | 74 | 0 | 1 |
5 | Glassbottlesnotbroken | 2019/07/10 | 25 | 0 | 2 |
6 | Aluminiumcanswhole | 2019/10/27 | 22 | 0 | 1 |
7 | Aluminiumcansflattened | 2019/08/13 | 14 | 0 | 1 |
8 | AluminiumcansBales | 2019/10/02 | 56 | 0 | 1 |
9 | Steelcanswhole | 2019/08/11 | 98 | 0 | 1 |
10 | Steelcansflattened | 2019/10/23 | 75 | 0 | 1 |
The following one-to-many relationship with referential integrity exists between the two tables in the database:
Do the following:
The user interface for all questions is displayed below:
NOTE:
Variable | Data type | Description |
tbldisposal | TADOTable | Refers to the table named Disposal |
tblmaterial | TADOTable | Refers to the table named Material |
3.1 In this section you may ONLY use SQL statements to answer QUESTION 3.1.1 to QUESTION 3.1.5.
Code to execute the SQL statements and display of the results of the queries is provided. The SQL statements are incomplete.
Do the following to complete the incomplete SQL statements assigned to the variables sSQL1, sSQL2, sSQL3, sSQL4 and sSQL5 per question respectively.
3.1.1 Button [3.1.1]
Write SQL code to display the MaterialType of all materials sorted in reverse alphabetical order.
Example of output of the first 13 records:(4)
3.1.2 Button [3.1.2]
The user must enter the name of a material. Code has been provided for the material name “wood” to be entered in an input box and saved in a variable named sline.
Write SQL code to display the Materialtype of all materials that contain the word stored in the variable sline.
Example of output: (5)
3.1.3 Button [3.1.3]
Write an SQL statement to display the Datedisposed and Ma materials disposed in October. (The year 2019 is the only the database.) terialtype of all year recorded in
Example of output: (5)
3.1.4 Button [3.1.4]
The waste management company is expecting an increase of 10% in the number of employees next year.
Write an SQL statement to add 10% to the number of Employees. Rounding of numbers is not required.
(Code has been written to display the successfully updated table after editing.)
Example of output: (4)
3.1.5 Button [3.1.5]
Display the total of all quantities of waste materials (Quantity) as Total_Quantities for each DisposalMethod.
Example of output: (7)
3.2 In this section, only Delphi code may be used to answer QUESTION 3.2.1 and QUESTION 3.2.2.
Use the global variables, tblmaterial and tbldisposal, provided.
NO marks will be awarded for SQL statements in QUESTION 3.2.
3.2.1 Button [3.2.1]
Write code to set the Greenhousefactor to 2 for all materials that have a
Disposalcode equal to 6.
Example of output of the last 6 records: (7)
3.2.2 Button [3.2.2]
Write code to calculate the total of all carbon dioxide emissions.
CO2 emissions are calculated by multiplying the Greenhousefactor by the Quantity (number of tons) of material waste.
Display the total by adding it to the end of the string located in the edit box named edtdisplay.
Example of output: (8)
QUESTION 4: PROBLEM-SOLVING PROGRAMMING
Do the following:
Supplied GUI:
The supplied GUI represents the interface of the program used by a waste management company to record and report on waste disposal data.
A text file named waste.txt is included which contains the waste materials, method of disposal (either recycled or used as landfill) and the weights measured in kilograms of each material that was disposed of recently by the waste management company.
The format of the text file is:
<Waste material><Disposal method><weight of waste material in kg>
Example of some of the lines in the text file named waste.txt:
Paper;Recycled#2543
Cardboard;Recycled#495
Trash;Landfill#1885
Cardboard;Recycled#398
Trash;Landfill#1657
Paper;Recycled#2754
Cardboard;Recycled#769
Trash;Landfill#2025
Timber;Landfill#2125
Pallets;Recycled#398
Rubber;Recycled#4321
Tyres;Landfill#1258
Metal;Recycled#541
Food;Landfill#774
Grass;Landfill#1142
Trees;Landfill#685
Soil;Landfill#5547
Rubble;Recycled#3984
Clay;Recycled#547
A constant array named arrtypes has been declared and filled with unique waste material types.
arrtypes: array[1..15] of string = ('Paper','Cardboard','Trash','Timber','Pallets','Rubber','Tyres','Metal','Food','Grass','Trees' ,'Soil','Rubble','Clay','Computers');
Code has been written to read the items from each line of the text file into 2 global, parallel arrays, named arrdata and arrweights.
arrdata : array[1..100] of string; arrweights: array[1..100] of integer; icount: integer;
Arrdata contains the name of each waste material joined to either the word Recycled or Landfill with a semicolon separating the two words.
Arrweights contains integers representing the weight of the corresponding waste material in kilograms.
The variable icount holds the total number of items for the two parallel arrays.
Code has been written in the OnActivate event of the form to read data from the text file into the two arrays and then display the array contents into the rich edit.
Complete the code for each question, QUESTION 4.1 and QUESTION 4.2.
NOTE:
You must write code in the onchange event of the combobox named cmbreport.
Below is a diagram of the 4 options of the combobox.
For QUESTIONS 4.1 to 4.4 you must write code for each of the combobox options.
4.1 Combobox option [Total weight of ALL waste]
Calculate and display the total weight of all waste materials collected. The total must be displayed on the panel named pnloutput.
Example of output: (4)
4.2 Combobox option [Total weight of RECYCLED waste]
Calculate and display the total weight of all recycled waste material. The total must be displayed on the panel named pnloutput.
Example of output: (5)
4.3 Combobox option [Percentage of RECYCLED waste]
The recycled weight must be divided by the total weight and then multiplied by 100 and rounded to a whole number, in order to calculate the percentage of waste that was recycled.
Display the result on the panel named pnloutput.
Example of output: (3)
4.4 Combobox option [TOTAL weight of EACH waste product]
The array named arrdata has many waste types that are duplicated, eg ‘Cardboard;Recycled’ occurs many times in the array.
The global constant array named arrtypes contains all of the unique types of waste that have been disposed of by the waste management company.
Use this information to calculate the total weights collected for each unique waste type and write the results to a text file named report.txt.
(Note: The text file named report.txt must be created using Delphi code.)
Example of the output to the text file, report.txt:
Paper = 13332 Cardboard = 6669 Trash = 22606 Timber = 5488 Pallets = 1194 Rubber = 5843 Tyres = 4643 Metal = 1624 Food = 4052 Grass = 5650 Trees = 11801 Soil = 7010 Rubble = 4872 Clay = 4986 Computers = 12640 |
(18)
[30]
TOTAL: 150
SECTION A
QUESTION 1
1.1 MULTIPLE-CHOICE ITEMS
1.1.1 B
1.1.2 C
1.1.3 A
1.1.4 A
1.1.5 D
1.1.6 C
1.1.7 B
1.1.8 D
1.1.9 C
1.1.10 A (10 x 1) (10)
1.2 MATCHING ITEMS
1.2.1 G
1.2.2 A
1.2.3 F
1.2.4 B
1.2.5 D (5 x 1) (5)
1.3 MATCHING ITEMS
1.3.1 D
1.3.2 F
1.3.3 E
1.3.4 A
1.3.5 B (5 x 1) (5)
1.4 ONE-WORD ITEMS
1.4.1 Canapé
1.4.2 Nett profit
1.4.3 Method Cap Classique
1.4.4 Demitasse
1.4.5 Chef Pâtissier
1.4.6 Baked Alaska
1.4.7 Chakalaka
1.4.8 Almonds
1.4.9 Bromelain
1.4.10 Mint (10 x 1) (10)
1.5 SELECTION
1.5.1
1.5.2
TOTAL SECTION A: 40
SECTION B: KITCHEN AND RESTAURANT OPERATIONS; HYGIENE, SAFETY AND SECURITY
QUESTION 2
2.1
2.1.1 Pest control:
2.1.2 Refuse bins:
2.1.3 Jewellery:
2.2
2.3
2.4
2.5
DISEASE | CHOLERA | GASTRO-ENTERITIS |
Causes | Drinking contaminated water / eating food which has been in contact with contaminated water, flies or soiled hands / vibrio cholera (1) | Intake of contaminated foods, drinks or chemicals / Viral / Rota virus or bacterial infection / Salmonella / Staphylococcus / Clostridium / Escherichia(1) |
Symptoms |
|
|
NOTE: NOT diarrhoea / vomiting / abdominal pain / dehydration since it is similarities. |
(6)
TOTAL SECTION B: 20
SECTION C:
NUTRITION AND MENU PLANNING; FOOD COMMODITIES
QUESTION 3
3.1
3.1.1
3.1.2
A
B
C
D
3.2
3.2.1 Cheese aigrettes / pommes dauphine (1)
3.2.2 Gougere (1)
3.3 SHORT PASTRY:
SWEET PASTRY
3.4
3.5
3.5.1 Puff pastry / Rough puff
3.5.2 Shortcrust pastry / pâté brisée
3.5.3 Phyllo / purr pastry / Strudel
3.5.4 Sweet pastry / pâté sucrée (4 x 1) (4)
3.6 3.6.1 Rack of Lamb (1)
3.6.2 Baking / frying
Reason:
3.6.3 Rib (1)
3.6.4
3.6.5
3.7
3.7.1 Fish(1)
3.7.2 Eggs (1)
3.7.3 Cheese (1)
3.7.4 Chicken (1)
3.8
3.8.1
3.8.2
3.8.3
[40]
QUESTION 4
4.1
4.1.1
4.1.2
4.1.3
4.2
4.2.1
Motivation:
4.2.2
4.3
4.3.1
4.3.2 Food item A
Food item B
4.4
CLASS | EXPLANATIONS |
French Meringue / Common meringue ü | Beat egg whites into a soft peak and gradually add sugar ü |
Swiss Meringue ü | Beat egg whites and sugar over a bain- marie until sugar is dissolved ü |
Italian Meringue ü | A hot syrup is poured onto egg whites while it is being whipped ü |
(6)
4.5
4.5.1 The mixture can lose its thickening ability and will not set. (1)
4.5.2
4.5.3
4.5.4 Freezing will cause water to ooze out of the gelatine dish / syneresis will occur. (1)
4.5.5 The egg custard will curdle. (1)
[40]
TOTAL SECTION C: 80
SECTION D: SECTORS AND CAREERS
FOOD AND BEVERAGE SERVICE QUESTION 5
5.1
5.1.1
5.1.2 His exceptional culinary creativity / his signature dish of orange-and- prickly pear sauce. (1)
5.1.3 A signature dish is a recipe that is unique and associated with an individual chef or restaurant. (1)
5.1.4
5.1.5
5.1.6
5.1.7
5.2
Revenue-generating | Non-revenue-generating |
bar | housekeeping |
banquet room | finance |
maintenance |
(5) [30]
QUESTION 6
6.1
6.1.1 To adjust the cutlery that was originally laid to meet a guest’s specific order. (1)
6.1.2
6.2
6.3
6.4
6.4.1 Sauvignon Blanc / Chenin Blanc
6.4.2 Shiraz
6.4.3 Pinotage
6.4.4 Cabernet Sauvignon
6.4.5 Port (5)
6.5
6.6 On-consumption license
Off-consumption license
6.7
[30]
TOTAL SECTION D: 60
GRAND TOTAL: 200
INSTRUCTIONS AND INFORMATION
SECTION A
QUESTION 1: SHORT QUESTIONS
1.1 MULTIPLE-CHOICE QUESTIONS
Various options are provided as possible answers to the following questions. Choose the correct answer and write only the letter (A–D) next to the question numbers (1.1.1–1.1.10) in the ANSWER BOOK, for example 1.1.11 C.
EXAMPLE:
1.1.11 A good source of proteins is …
1.1.1 Dried beans should be ... before cooking.
1.1.2 A suitable cooking method for lamb neck:
1.1.3 In South Africa red sparkling wine is made from ... grapes.
1.1.4 A fruit jelly for vegetarians will be set with ...
1.1.5 A suitable glaze for a cold strawberry tart:
1.1.6 Vegetarians can substitute meat with ... in their diet.
1.1.7 Identify a dish that is NOT suitable for a Jewish person:
1.1.8 Sorbet, as a palate cleanser, is served ...
1.1.9 The service gear a waiter needs for silver service:
1.1.10 Food service workers who suffer from Hepatitis A, should be excluded from work for ... weeks after contracting the illness.
1.2 MATCHING ITEMS
Match the snack food in COLUMN B that best suits an event in COLUMN A. Write only the correct letter (A–G) next to the question numbers (1.2.1–1.2.5) in your ANSWER BOOK, for example 1.2.6 H.
COLUMN A | COLUMN B | ||
EVENT | SNACK FOOD | ||
1.2.1 | Ladies’ book club in summer | A | Chocolate truffles |
1.2.2 | High tea | B | Samoosas |
1.2.3 | Seafood buffet | C | Spaghetti Bolognese |
1.2.4 | Indian theme evening | D | Melon kebab |
1.2.5 | Picnic basket for a fruitarian | E | Tomato soup |
F | Sushi | ||
G | Crudités |
(5 x 1) (5)
1.3 MATCHING ITEMS
Choose an example from COLUMN B that matches a marketing mix in COLUMN A. Write only the correct letter (A–G) next to the question numbers (1.3.1–1.3.5) in your ANSWER BOOK, for example 1.3.6 H.
COLUMN A | COLUMN B | ||
MARKETING MIX | EXAMPLE | ||
1.3.1 | Packaging | A | Hamburgers made from organic meat |
1.3.2 | Place | B | Clients save 20% by buying seasonal tickets |
1.3.3 | People | C | Safety measures are adhered to |
1.3.4 | Product | D | Compostable burger box |
1.3.5 | Price | E | Factory workers who want to buy lunch |
F | Mobile food truck at the entrance of large car plant | ||
G | Special opening discount for the first 3 weeks |
(5 x 1) (5)
1.4 ONE-WORD ITEMS
Give ONE word/term for EACH of the following descriptions. Write ONLY the word/term next to the question numbers (1.4.1–1.4.10) in the ANSWER BOOK.
1.4.1 A type of bite-sized hors d’œuvre consisting of a small piece of bread, puff pastry, or a cracker topped with some savoury food
1.4.2 The income you get from selling a product, minus all the expenses
1.4.3 South African sparkling wines made in the traditional French method
1.4.4 A small cup used to serve espresso coffee
1.4.5 The French term for a chef who is trained in the making of pastries, desserts, bread and other baked goods
1.4.6 Ice cream on a sponge cake base which is covered with meringue and then caramelised
1.4.7 South African vegetable relish, usually spicy, that is traditionally served with bread, pap, samp, stews or curries
1.4.8 The nut that is the main ingredient in marzipan
1.4.9 The enzyme in fresh pineapple that prevents setting
1.4.10 A jelly that is served with the classic roast leg of lamb (10 x 1) (10)
1.5 SELECTION
1.5.1 Identify FIVE food items in the list below that can cause food allergies. Write only the letters (A–G) next to the question number (1.5.1) in the ANSWER BOOK.
1.5.2 Identify FIVE ways for large hotel kitchens to save water. Write only the letters (A–G) next to the question number (1.5.2) in the ANSWER BOOK.
TOTAL SECTION A: 40
SECTION B:
KITCHEN AND RESTAURANT OPERATIONS; HYGIENE, SAFETY AND SECURITY
QUESTION 2
2.1 Elaborate on the government’s regulations regarding prevention of food contamination in Government Notice No. R918 of July 1999 regarding:
2.1.1 Pest control
2.1.2 Refuse bins
2.1.3 Jewellery (3 x 2) (6)
2.2 Animals are not permitted in areas where food is handled. Mention TWO exceptions. (2)
2.3 Explain the connection between HIV/Aids and tuberculosis. (2)
2.4 Chefs who are infected with tuberculosis will probably be absent from work quite frequently. Discuss the effect of this absence on our country’s economy. (4)
2.5 Some of the symptoms of cholera overlap with the symptoms of gastro- enteritis. Compare the differences between cholera and gastro-enteritis with regard to the causes and symptoms. Tabulate your answer as follows:
DISEASE | CHOLERA | GASTRO-ENTERITIS | |
Causes | (1) | (1) | |
Symptoms | (2) | (2) |
(6)
TOTAL SECTION B: 20
SECTION C: NUTRITION AND MENU PLANNING; FOOD COMMODITIES
QUESTION 3
3.1 Study the pictures of choux pastry dishes below and answer the questions that follow.
3.1.1 Identify each choux pastry dish above. (4)
3.1.2 Differentiate between FOUR different methods that were used to serve each dish attractively. (4)
3.2 Suggest a suitable savoury choux pastry dish that comply with the following criteria:
3.2.1 Deep fried, suitable for a lacto-ovo vegatarian (1)
3.2.2 Served as a light meal with a salad (1)
3.3 Briefly describe how the preparation of short pastry (pâté brisée) and sweet pastry (pâté sucrée) differ. (2)
3.4 Supply THREE possible solutions for the following: Phyllo pastry tend to dry out during preparation (3)
3.5 Recommend a suitable type of pastry for the following dishes:
3.5.1 Beef Wellington
3.5.2 Quiche Lorraine
3.5.3 Samoosas
3.5.4 Fruit tartlet (4 x 1) (4)
3.6 Study the picture of a lamb cut below and answer the questions that follow.
3.6.1 Identify the dish above. (1)
3.6.2 Suggest a suitable cooking method for the dish. Motivate your answer. (2)
3.6.3 Identify the meat cut used in the above dish. (1)
3.6.4 Explain the meaning of the roller mark AAA 222 on this particular meat cut. (2)
3.6.5 Motivate the chef’s instruction to ‘rest’ the roasted meat before serving. (2)
3.7 Choose from the list below ONE food item which is included in the diet of the following types of vegetarians:
cheese; beef; fish; eggs; chicken |
3.7.1 Pesco (1)
3.7.2 Ovo (1)
3.7.3 Lacto (1)
3.7.4 Pollo (1)
3.8
3.8.1 Explain what Textured Vegetable Proteins (TVP) are. (3)
3.8.2 Analyse the advantages of using Textured Vegetable Proteins (TVP) as replacement for meat. (3)
3.8.3 Compose a list of THREE possible ways to incorporate Textured Vegetable Proteins (TVP) in mincemeat dishes. (3)
[40]
QUESTION 4
4.1 Study the spreadsheet of the costing of a large exclusive banquet given below and answer the questions that follow.
Banquet: 500 people | |
COSTS | AMOUNT |
Ingredients | R100 000 |
Labour | R45 000 |
Overheads | R50 000 |
Net profit | |
Net profit % | |
Sales/ Income | R450 000 |
Gross profit | |
Gross profit % |
4.1.1 Calculate the net profit. Show ALL formulas and calculations. (4)
4.1.2 Calculate the gross profit percentage. Show ALL formulas and calculations. (4)
4.1.3 Calculate the cost of the event for each guest. (2)
4.2 Study the menu below and answer the questions that follow.
4.2.1 Identify the type of menu above. Motivate your answer. (2)
4.2.2 Adapt the menu to suit the following special needs:
4.3 Study the pictures below and answer the questions that follow.
4.3.1 A hotel kitchen’s garden produced more of the above fruits and vegetables that they were able to consume. Convince the chef to preserve these food items by stating THREE advantages of preserving food. (3)
4.3.2 Suggest TWO ways how each of the above food items can be preserved.
4.4 Classify meringues in THREE groups and explain how the preparation of each differs. Tabulate your answer as follows.
CLASS | EXPLANATION |
(3 x 2) (6)
4.5 Predict the effect of each of the following steps on the texture of a gelatine dessert:
4.5.1 The gelatine mixture boiled (1)
4.5.2 Water was substituted with orange juice (2)
4.5.3 Raw fig puree was used (2)
4.5.4 The dish was left in the freezer overnight (1)
4.5.5 Gelatine was added to hot egg custard (1) [40]
TOTAL SECTION C: 80
SECTION D:
SECTORS AND CAREERS; FOOD AND BEVERAGE SERVICE
QUESTION 5
5.1 Read the extract below and answer the questions that follow.
Pedro is a trained chef and has worked in the hospitality industry for 20 years. After many months of planning and research he decided to start his own business from home. He is used to working long hours and wants to put his energy and enthusiasm into his own pocket. He will prepare and bottle a large variety of salad dressings and sweet dessert sauces. His culinary creativity is exceptional and his products are of high quality and standard. His signature dish is his Orange-and-Prickly Pear Sauce. |
5.1.1 Identify FOUR strengths that Pedro has that can contribute to his success as an entrepreneur. (4)
5.1.2 Point out Pedro’s competitive advantage of his business. (1)
5.1.3 Explain the term signature dish. (1)
5.1.4 Give a brief summary of each of the following aspects that must be included in Pedro’s business plan:
5.1.5 Investigate THREE possible marketing forces that Pedro will have to reckon with. (3 x 2)(6)
5.1.6 Predict TWO work opportunities that can be developed from Pedro’s business.(2)
5.1.7 Criticise Pedro’s digital poster for his Facebook page as an effective marketing tool.
(5)
5.2 Classify each of the following into revenue-generating and non-revenue- generating areas of a hotel:
housekeeping; bar; finance; banquet room; maintenance |
Tabulate your answer as follows:
REVENUE-GENERATING | NON-REVENUE-GENERATING |
(5)
[30]
QUESTION 6
6.1
6.1.1 Explain what the term to correct a cover means. (1)
6.1.2 List THREE different scenarios where a waiter needs to correct a cover. (3)
6.2 Compile a list of FIVE guidelines on how to successfully respond to difficult guests during food service. (5)
6.3 Maintaining a regular client base depends on good guest relationships. Formulate FIVE guidelines for restaurant staff to follow in order to build excellent guest relations. (5)
6.4 Select from the list below a suitable wine cultivar to be served with the following dishes:
Sauvignon Blanc; Port; Cabernet Sauvignon; Pinotage; Shiraz; Chenin Blanc |
6.4.1 Fried hake and chips
6.4.2 Lamb curry stew
6.4.3 Grilled Kudu steak
6.4.4 Mature cheddar
6.4.5 Baked chocolate pudding (5)
6.5 Outline FOUR guidelines to follow when serving sparkling wine to guests. (4)
6.6 Distinguish between an on-consumption liquor licence and an off-consumption liquor licence with examples. (4)
6.7 Discuss THREE points to consider when storing wine. (3)
[30]
TOTAL SECTION D: 60
GRAND TOTAL: 200
SECTION A: SOURCE-BASED QUESTIONS
QUESTION 1: HOW DID THE PHILOSOPHY OF BLACK CONSCIOUSNESS INFLUENCE THE SOUTH AFRICAN YOUTH IN THE 1970s?
1.1
1.1.1 [Definition of historical concepts from Source 1A – L1]
1.1.2 [Interpretation of evidence from Source 1A – L2]
1.1.3 [Extraction of evidence from Source 1A – L1]
1.1.4 [Evaluate the usefulness of the evidence from Source 1C – L3]
This source is useful because:
1.1.5 [Extraction of evidence from Source 1A – L1]
1.2
1.2.1 [Extraction of evidence from Source 1B – L1]
1.2.2 [Interpretation of evidence from Source 1B – L2]
1.2.3 [Extraction of evidence from Source 1B – L1]
1.3
1.3.1 [Extraction of evidence from Source 1C – L1]
1.3.2 [Interpretation of evidence from Source 1C – L2]
1.3.3 [Interpretation of evidence from Source 1C – L2]
1.3.4 [Interpretation of evidence from Source 1C – L2]
1.4 1.4.1 [Interpretation of evidence from Source 1D – L2]
1.4.2 [Interpretation of evidence from Source 1D – L2]
1.5 [Comparison of evidence from Sources 1A and 1D – L3]
1.6 [Interpretation, comprehension and synthesis of evidence from relevant sources – L3]
Candidates can include the following aspects in their responses:
Use the following rubric to allocate a mark:
LEVEL 1 |
| Marks: 0–2 |
LEVEL 2 |
| Marks: 3–5 |
LEVEL 3 |
| Marks: 6–8 |
(8)
[50]
QUESTION 2:
HOW SUCCESSFUL WAS THE TRUTH AND RECONCILIATION COMMISSION (TRC) IN DEALING WITH THE MURDER OF AMY BIEHL?
2.1
2.1.1 [Extraction of evidence from Source 2A – L1]
2.1.2 [Interpretation of evidence from Source 2A – L2]
2.1.3 [Definition of historical concepts from Source 2A – L2]
2.1.4 [Evaluate the usefulness of the evidence from Source 2B – L3]
This source is useful because:
2.1.5 [Extraction of evidence from Source 2A – L1]
2.2
2.2.1 [Extraction of evidence from Source 2B – L1]
2.2.2 . [Extraction of evidence from Source 2B – L1]
2.2.3 [Interpretation of evidence from Source 2B – L2]
2.2.4 [Interpretation of evidence from Source 2B – L2]
2.3
2.3.1 [Extraction of evidence from Source 2C – L1]
2.3.2 [Interpretation of evidence from Source 2C – L2]
2.3.3 [Extraction of evidence from Source 2C – L1]
2.4
2.4.1 [Interpretation of evidence from Source 2D – L2]
2.4.2 Interpretation of evidence Source 2D – L2]
2.5 [Comparison of evidence from Sources 2C and 2D – L3]
2.6 [Interpretation, comprehension and synthesis of evidence from sources – L3]
Candidates could include some of the following:
Use the following rubric to assess this paragraph.
LEVEL 1 |
| Marks: 0–2 |
LEVEL 2 |
| Marks: 3–5 |
LEVEL 3 |
| Marks: 6–8 |
(8)
[50]
QUESTION 3:
WHAT MPACT DID MULTI-NATIONAL CORPORATIONS (MNC’S) HAVE ON GLOBAL CULTURES IN THE 1990s?
3.1
3.1.1 [Definition of historical concepts from Source 3A – L1]
3.1.2 [Extraction of evidence from Source 3A – L1]
3.1.3 [Extraction of evidence from Source 3A – L1]
3.1.4 [Interpretation of evidence from Source 3A – L2]
3.2
3.2.1 [Extraction of evidence from Source 3B – L1]
3.2.2 [Extraction of evidence from Source 3B – L2]
3.2.3 [Interpretation of evidence from Source 3B – L2]
3.2.4 Evaluate the reliability of the evidence from Source 3B – L3]
This source is reliable because:
3.3
3.3.1 [Extraction of evidence from Source 3C – L1]
3.3.2 [Extraction of evidence from Source 3C – L1]
3.3.3 [Interpretation of evidence from Source 3C – L2]
3.4
3.4.1 [Interpretation of evidence Source 3D – L2]
3.4.2 [Interpretation of evidence from Source 3D – L2]
JUSTIFIED
OR
NOT JUSTIFIED
3.5 [Comparison of evidence from Sources 3C and 3D – L3]
3.6 [Interpretation, comprehension and synthesis of evidence from sources – L3]
Candidates could include some of the following:
Use the following rubric to assess this paragraph.
LEVEL 1 |
| Marks: 0–2 |
LEVEL 2 |
| Marks: 3–5 |
LEVEL 3 |
| Marks: 6–8 |
(8)
[50]
SECTION B: ESSAY QUESTIONS
QUESTION 4: CIVIL RESISTANCE, 1970s TO 1980s: SOUTH AFRICA: THE CRISIS OF APARTHEID IN THE 1980s
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates need to indicate to what extent demonstrations, boycotts, sanctions and disinvestments by the international anti-apartheid organisations contributed to the eventual demise of the apartheid regime in the 1980’s.
MAIN ASPECTS
Candidates should include the following aspects in their response:
ELABORATION
Conclusion: Candidates should tie up their argument with a relevant conclusion.[50]
QUESTION 5: THE COMING OF DEMOCRACY IN SOUTH AFRICA AND COMING TO TERMS WITH THE PAST: NEGOTIATED SETTLEMENT AND THE GNU
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates need to critically discuss how South Africa’s road to democracy was beset with various challenges, dilemmas and obstacles, but it was the spirit of intense negotiations, resolute leadership and commitment that eventually led to the birth of a democratic dispensation in 1994.
MAIN ASPECTS
Candidates should include the following aspects in their response:
ELABORATION
Conclusion: Candidates should tie up their argument with a relevant conclusion. [50]
QUESTION 6:
THE END OF THE COLD WAR AND A NEW WORLD ORDER: 1989 TO THE PRESENT
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates need to indicate whether they agree or disagree with the statement and indicate if it was the collapse of the Soviet Union in 1989 that significantly contributed to the political transformation that occurred in South Africa.
MAIN ASPECTS
Candidates should include the following aspects in their response:
ELABORATION
Conclusion: Candidates should tie up their argument with a relevant conclusion. [50]
TOTAL: 150
QUESTION 1:
HOW DID THE PHILOSOPHY OF BLACK CONSCIOUSNESS (BC) INFLUENCE THE SOUTH AFRICAN YOUTH IN THE 1970s?
SOURCE 1A
This extract focuses on the meaning of the philosophy of Black Consciousness by Steve Biko in 1968.
Biko had a clear insight into the psychological aspect of the oppression of his time which resulted in momentary (brief) political impotence (weakness). As politics was racialised by apartheid, the movement was called Black Consciousness. His message was simple and clear: Do not be a part of your oppression. It was a crucial intervention, a fresh, youthful and distinctive voice that mobilised people when all the major political opposition was banned and their leaders were in exile or in jail. It provided a new, vital, unifying element to the ANC, as Wally Serote said, ‘oxygen and new life, which the movement desperately needed’. Black Consciousness worked with consensus decision-making. It instilled independent thinking, self-reliance, fearlessness and dignity. Biko and his contemporaries (colleagues) broke the stunned (shocked) silence of their time. The refusal of a new generation of young blacks to be subservient (obedient) or humiliated, even in the face of death, changed the nature of the struggle. Biko himself lived and died by this truth. A key catalyst (promoter) of transformation, Biko’s generation inspired a culture of fearlessness. |
[From Steve Biko by L. Wilson]
SOURCE 1B
The source below describes the influence of the Black Consciousness Movement on Veli Mbele who resided in Soweto in 1976.
I grew up in an environment in which many of my peers did not value their own lives and I consider myself fortunate to have encountered Black Consciousness at an early stage. Black Consciousness helped to transform my self-concept and self-esteem in a remarkable way. When I joined the Black Consciousness Movement, I was only 16. At the time the environment was not entirely friendly towards the BCM. Our belief in Black Consciousness was so strong we were not prepared to go into hiding purely because other forces had threatened to ‘deal’ with us or deny us employment if we didn’t abandon our political beliefs. This kind of reaction fortified (encouraged) us even more and we decided to spread the gospel of Black Consciousness even more vigorously (stronger). Thanks to Black Consciousness, many in my generation were transformed into young disciplined black men who through their community activism, earned the respect and admiration of their peers, families and the community. Ever since I came into contact with Black Consciousness, I have felt complete, content with who I am and most importantly, that I’m worthy of respect and dignity. |
[From We Write What We Like by C. Van Wyk]
SOURCE 1C
This extract focuses on the influence of the Black Consciousness Movement (BCM) on students in the 1970s.
In 1976 the Black Consciousness Movement (BCM) was very strong and black students were at the forefront of the struggle. Police arrested many student leaders and put them on trial. Through these political trials, the government wanted to show that the students were dangerous because they spread the ideas of Black Consciousness. The police said black consciousness made black people hate whites. In May, Steve got the chance to show that this was not true. He was called as a defence witness in the trial of nine young South African Student Organisation (SASO) students. A witness in a court of law can say things that are heard by everyone and reported all over the country. It was the first time Steve had spoken in public for three years. The whole world heard him talk about Black Consciousness. He showed that the movement was not trying to make black people hate whites. Black Consciousness wanted black people to be proud of their colour, not ashamed. The world listened carefully to what Steve said, but the South African government refused to listen. Anger in the township grew. On 16 June 1976 thousands of Sowetan students protested in the streets against the apartheid laws. The security forces opened fire and students were killed. |
[From Steve Biko by L. Price]
SOURCE 1D
This is a cartoon by Zapiro on commemorating Steve Biko and was published in the Daily Maverick on 19 September 2017.
[From Zapiro, Daily Maverick]
(Martyred – meaning tortured and killed)
QUESTION 2:
HOW SUCCESSFUL WAS THE TRUTH AND RECONCILIATION COMMISSION (TRC) IN DEALING WITH THE MURDER OF AMY BIEHL?
SOURCE 2A
This extract explains the reasons for the establishment of the TRC by the first democratically elected parliament in 1995.
In the year after the elections, Parliament’s Justice Portfolio Committee drafted legislation to establish a Truth and Reconciliation Commission (TRC). The seventeen- member Commission was given the task of establishing as complete a picture as possible of the causes, nature and extent of the gross violation of human rights violations committed in the period between 1 March 1960 and 1994 by conducting investigations and holding hearings. This period is seen as the most severe ‘crime against humanity’ by the apartheid regime. It also had to facilitate the granting of amnesty to persons who made full disclosure of all the relevant facts related to acts associated with a political objective. In addition, the Commission was required to restore the human and civil dignity of victims, recommend reparation measures and to compile a report of its findings and activities. They also had to recommend measures to prevent future violations of human rights. The Truth and Reconciliation Commission (TRC), as it was duly (accordingly) established, consisted of three committees. The first of these was the Human Rights Violation Committee, which had to look into the accounts of victims through hearings and investigations. The second was the Amnesty Committee, which had to evaluate amnesty applications. It had to apply the Norgard principles to determine whether an application qualified for amnesty. The third committee, the Reparation and Rehabilitation Committee, had to formulate a reparation policy to restore and rehabilitate the lives of victims and survivors of human rights violations. |
[From Country of my Skull by A. Krog]
SOURCE 2B
This source focuses on how and why Amy Biehl was murdered in Cape Town on the 25st August 1993.
Shortly before the end of the apartheid era, Amy Biehl was murdered. She was a victim of racial violence. Amy Biehl was white. She dedicated herself to ending apartheid in South Africa and was based at the University of the Western Cape and working in underprivileged communities. She also helped with voter registration in advance of the ‘Freedom Day’ elections. Amy knew Gugulethu and its people well, or thought she did. She was to be found in the township almost every day or night, could speak isiXhosa and do the phantsula. “That’s how much she fitted in here”, said Melanie Jacobs, the black woman who shared a house with Amy in Cape Town. “She loved Africa. She wasn’t just another white person”. On the evening of 25 August, 1993, Amy drove through Gugulethu township and fell prey (victim) to an angry group of black youths. They pelted (bombarded) Biehl’s car with rocks, forcing her to stop, then dragged her from her car and murdered her, yelling, ‘Kill the Settler!’. Her parents were informed that their daughter had been beaten and stabbed to death. Police arrested two teenage suspects, student members of a militant nationalist group, the Pan Africanist Congress, whose slogan is, ‘One settler, one bullet’. In Cape Town, the killing of the popular scholar has stirred a black backlash (reaction) against the militant group that promoted hatred for whites. The African National Congress offered its township network to help identify the killers. Friends and colleagues, after memorialising Miss Biehl with freedom songs, paraded through Gugulethu with placards declaring, ‘Comrades come in all colours’. |
[From https://www.nytimes.com1993/08/27/world/how-american- sister-died-in-atownship.html. Accessed on 1 September 2019.]
SOURCE 2C
This source focuses on the amnesty hearing of the murderers of Amy Biehl on the 8 July 1997 in Cape Town.
The four youths, Mzikhona Nofemela, Ntobeka Peni, Vusumzi Ntamo and Mongezi Manqina that were convicted of murdering Amy and given a prison sentence of eighteen years, applied for amnesty. The killers of Amy apologised to the parents for what a Truth Commission lawyer described as mindless savagery by a ‘pack of murderers’. The four Pan Africanist Congress (PAC) supporters were challenged on their claims before the Amnesty Committee that the mob killing was politically motivated. Biehl’s parents, Peter and Linda, shook hands with relatives of the four men at the start of the proceedings. In written affidavits submitted to the TRC’s Amnesty Committee, the four said they regretted the murder and asked Biehl’s parents for forgiveness. “I feel sorry and very down-hearted, especially today, realising the contribution Amy Biehl played in the struggle,” Peni said. However, he and his co- applicants insisted that the killing was politically motivated and inspired by the PAC’s slogan, ‘One settler, One bullet’. Peni testified Paso’s executive had ordered its members to make Gugulethu ungovernable and to assist the PAC’s armed wing, the Azanian People’s Liberation Army, in winning back black people’s land. “I regarded this as an instruction to also harm, injure and kill white people.” In 1998, Biehl’s killers were pardoned by the TRC (a decision the family endorsed) and released from prison after serving four years. The Biehls said they believe their daughter would have supported the Commission’s decision to grant amnesty. |
[From www.justice.gov.za/trc/media/1997/9707/s970708f.htm. Accessed on 1 September 2019.]
SOURCE 2D
This photograph shows the killers of Amy Biehl at the amnesty hearing on 8 July 1997 in Cape Town.
[From images amy biehl newpaper. jfif-photos. Accessed on 1 September 2019.]
QUESTION 3:
WHAT IMPACT DID MULTI-NATIONAL CORPORATIONS (MNC’s) HAVE ON GLOBAL CULTURES IN THE 1990s?
SOURCE 3A
The source below explains the meaning of globalisation.
Globalisation is a process of interaction and integration among the people, companies and government of different nations, a process driven by international trade and investment and aided by information technology. This process has effects on the environment, on culture, political systems, economic development and prosperity and on human physical well-being in societies around the world. Globalisation is not new, though. For thousands of years, people and later corporations have been buying from and selling to each other in lands at great distances. Likewise, for centuries, people and corporations have invested in enterprises in other countries. Policy and technological developments of the past decades have spurred (encouraged) increases in cross-border trade, investment and migration so large that many observers believe the world has entered a qualitatively new phase in its economic development. Since 1950, for example, the volume of world trade has increased by 20 times; from 1997 to 1999 flows of foreign investment nearly doubled, from $468 billion to $827 billion. Distinguishing this current wave (trend) from earlier ones, author Thomas Friedman has said that today globalisation is, ‘faster, cheaper and deeper’. |
[From https://www.globalisation101.org>what-is-globalisation. Accessed on 17 September 2019.]
SOURCE 3B
This source describes the impact of globalisation on the cultures of developing countries.
Globalisation has many benefits but is also detriment (disadvantage) to the culture in developing countries. Many developing countries’ cultures have been changed through globalisation and imitation others cultures such as America and European countries. Before globalisation it would not have been possible to know about other countries and their cultures. Due to important tools of globalisation like television, radio, satellite and internet, it is possible today to know what is happening in any other country. Moreover, people worldwide can know each other better through globalisation. Today we can clearly see the heavy effect that globalisation has on the young people in the different poor nations. It is very common to see teenagers wearing Nike T-shirts and sneakers, Adidas footwear, playing Hip-Hop music, using Apple iPad, eating at McDonalds, KFC and Domino’s Pizza. It looks like you can only distinguish them by their language. On the other hand, many developing countries are concerned about the rise of globalisation because it might lead to destruction of their own culture, traditions, identity, customs and their language. In many Arab countries, for example, some people wear and behave like developed nations, and only a few people wear their traditional clothes as they used to. Furthermore, globalisation leads to the disappearance of many words and expressions from local languages because many people use English. |
[From http://www.tigweb.org/youth-media/panorama/article.html?Contentl. Accessed on 10 September 2019.]
SOURCE 3C
The extract below describes how civil society protested against the multi-national company, ‘Nike’, in 1998.
Nike, a leading sportswear manufacturer, is one of the business world’s shining examples of how to clean up an image. In the 1990s, the company was plagued (troubled) by reports that it used sweatshops and child labour. Pressure grew until 1998, when Nike co-founder Phil Knight publicly committed to changing the company’s practices, and Nike spent the next decade doing just that. Now, Nike’s sweatshop problem is threatening a comeback. On July 29, students and activists around the world participated in a day of protest against Nike, organised by United Students Against Sweatshops (USAS). The demonstrators, in cities such as Boston. Washington D.C., Bangalore and San Pedro Sula, represented an escalation of allegations against Nike that have been slowly bubbling (boiling) up. Among them are claims that workers at a Nike factory in Hansae, Vietnam, that suffered wage theft and verbal abuse and laboured for hours in temperatures well over the legal limit of 90 degrees, to the point that they would collapse at their sewing machines. Nike is also accused of cutting jobs at the Hansae factory and pulling production from a factory in Honduras with a strong union presence, resulting in hundreds of workers losing vital jobs. The company has also allegedly denied the independent monitoring group, Workers Rights Consortium (WRC) access to inspect its contract factories. |
[From https://qz.com/1042298/nike-is-facing-a-new-wave--of-anti-sweatshops-protest. Accessed on 10 September 2019.]
SOURCE 3D
This poster attacks giant corporations in 1998 in Washington D.C.
[From New Generation History by S. Govender et al]
ACKNOWLEDGEMENTS
Visual sources and other historical evidence were taken from the following:
Govender, S.et.al. 2007. New Generation History (New Generation Publishers)
http://www.tigweb.org/youth-media/panorama/article.html?Content
https://qz.com/1042298/nike-is-facing-a-new-wave--of-anti-sweatshops-protest
https://www.globalisation101.org>what-is-globalisation
https://www.nytimes.com1993/08/27/world/how-american- sister-died-in- atownship.html
images amy biehl newpaper. jfif-photos
Krog. A. 1999. Country of my Skull (Vintage Publishers)
Price, L. 2013. Steve Biko (Sached Books (Pty) Ltd)
Van Wyk, C. 2007. We Write What We Like (Wits University Press)
Wilson, L. 2011. Steve Biko (Jacana Media (Pty) Ltd)
www.justice.gov.za/trc/media/1997/9707/s970708f.htm
Zapiro, Daily Maverick
INSTRUCTIONS AND INFORMATION
SECTION A: SOURCE-BASED QUESTIONS
Answer at least ONE question, but not more than TWO questions, in this section. Source material to be used to answer these questions is contained in the ADDENDUM.
QUESTION 1: HOW DID THE PHILOSOPHY OF BLACK CONSCIOUSNESS INFLUENCE THE SOUTH AFRICAN YOUTH IN THE 1970s?
Study Sources 1A, 1B, 1C and 1D and answer the questions that follow.
1.1 Refer to Source 1A.
1.1.1 Define the term Black Consciousness in your own words. (1 x 2) (2)
1.1.2 Comment on what Biko meant in his message: ‘Do not be part of your oppression’. (2 x 2) (4)
1.1.3 Why, according to the source, was Black Consciousness a crucial intervention? (1 x 2) (2)
1.1.4 How useful will the information in the source be to a historian studying the importance of the formation of the BCM? (2 x 2) (4)
1.1.5 What, according to the source, did the Black Consciousness Movement (BCM) instil in black South Africans? (4 x 1) (4)
1.2 Read Source 1B.
1.2.1 Name TWO ideas of the BCM that helped transform Veli Mbele’s thinking. (2 x 1) (2)
1.2.2 Comment on what Veli implied with his statement, ‘At the time the environment was not entirely friendly towards the BCM’. (1 x 2) (2)
1.2.3 What, according to the source, could happen to Veli and his accomplices if they did not abandon their political beliefs? (2 x 1) (2)
1.3 Study Source 1C.
1.3.1 Why, according to the source, did the government perceive the students to be dangerous? (1 x 2) (2)
1.3.2 Why, do you think, black students were at the forefront of the struggle in 1976? (2 x 2) (4)
1.3.3 Explain why Biko, for the first time in three years, could speak in public. (1 x 2) (2)
1.3.4 Why, do you think the South African government refused to listen? (1 x 2) (2)
1.4 Consult Source 1D.
1.4.1 What does the caption, ‘I write what I like’ imply about Steve Biko? (2 x 2) (4)
1.4.2 Explain what is meant by ‘the bolded fist on Biko’s chest’. (1 x 2) (2)
1.5 Compare Sources 1A and 1D. Explain how the information in Source 1A is similar to the evidence in Source 1D regarding the influence of the philosophy of Black Consciousness on black South Africans. (2 x 2) (4)
1.6 Using the information in the relevant sources and your own knowledge, write a paragraph of about EIGHT lines (about 80 words) explaining how the philosophy of Black Consciousness influenced the South African youth in the 1970s. (8)
[50]
QUESTION 2: HOW SUCCESSFUL WAS THE TRUTH AND RECONCILIATION COMMISSION (TRC) IN DEALING WITH THE MURDER OF AMY BIEHL?
Study Sources 2A, 2B, 2C and 2D to answer the following questions.
2.1 Refer to Source 2A.
2.1.1 What, according to the source, were the aims of the TRC? (2 x 1) (2)
2.1.2 Using the information in the source and your own knowledge, explain why apartheid was perceived as a crime against humanity. (1 x 2) (2)
2.1.3 Define the term amnesty in the context of the TRC. (1 x 2) (2)
2.1.4 Comment on why you would regard the information in the source as useful when researching the role of the TRC. (2 x 2) (4)
2.1.5 Identify the THREE committees that did the work of the TRC. (3 x 1) (3)
2.2 Consult Source 2B.
2.2.1 Why, according to the source, was Amy murdered? (2 x 1) (2)
2.2.2 What kind of information did Amy’s parents receive regarding the death of their daughter? (2 x 1) (2)
2.2.3 Why, do you think, the ANC assisted in finding Amy’s killers? (2 x 2) (4)
2.2.4 What do you think the PAC meant when using the slogan, ‘One settler, one bullet’? (2 x 2) (4)
2.3 Read Source 2C.
2.3.1 Name the THREE youths convicted of killing Amy Biehl. (3 x 1) (3)
2.3.2 Comment on the reasons as to why the killers apologised to Amy’s parents. (2 x 2) (4)
2.3.3 Quote evidence from the source indicating that Peni showed remorse for his actions. (1 x 2) (2)
2.4 Use Source 2D.
2.4.1 What message is conveyed by this photograph regarding the aims of the TRC? (1 x 2) (2)
2.4.2 Why, do you think, did the men appear before the Amnesty Committee? (1 x 2) (2)
2.5 Compare Sources 2C and 2D. Explain how the information in Source 2C supports the evidence in Source 2D regarding the murder of Amy Biehl. (2 x 2) (4)
2.6 Using the information in the relevant sources and your own knowledge, write a paragraph of about EIGHT lines (about 80 words) explaining how successful the Truth and Reconciliation Commission (TRC) was in dealing with the death of Amy Biehl. (8)
[50]
QUESTION 3: WHAT IMPACT DID MULTI-NATIONAL CORPORATIONS (MNC’S) HAVE ON GLOBAL CULTURES IN THE 1990s?
Study Sources 3A, 3B, 3C and 3D to answer the following questions.
3.1 Read Source 3A.
3.1.1 Define the term globalisation in your own words. (1 x 2) (2)
3.1.2 How, according to the source, is the process of globalisation driven? (2 x 1) (2)
3.1.3 Quote a sentence from the source that indicates globalisation was not new. (1 x 2) (2)
3.1.4 Explain what Thomas Friedman meant when he said that globalisation is ‘faster, cheaper and deeper’. (2 x 2) (4)
3.2 Refer to Source 3B.
3.2.1 Which countries’ cultures have been imitated by developing countries? (2 x 1) (2)
3.2.2 Name TWO important tools of globalisation which make it possible to know what is happening in any other country. (2 x 1) (2)
3.2.3 Comment on how globalisation has positively affected people’s cultures around the world. (2 x 2) (4)
3.2.4 Explain the reliability of the source to a historian studying the impact of globalisation on the cultures of developing countries. (2 x 2) (4)
3.3 Consult Source 3C.
3.3.1 How, according to the source, were Nike products manufactured? (2 x 1) (2)
3.3.2 Name TWO cities where demonstrations were held. (2 x 1) (2)
3.3.3 Use the information in the source and your own knowledge to explain why demonstrations were held against the Nike company. (2 x 2) (4)
3.4 Study Source 3D.
3.4.1 What message is conveyed by this poster regarding corporations? (2 x 2) (4)
3.4.2 Comment on whether the criticism against multi-national corporations was justified. (2 x 2) (4)
3.5 Refer to Sources 3C and 3D. Explain how the information in Source 3C supports the evidence in Source 3D regarding the reasons for demonstrations against multi-national corporations. (2 x 2) (4)
3.6 Using the information in the relevant sources and your own knowledge, write a paragraph of about EIGHT lines (about 80 words) explaining the impact
that multi-national corporations had on global culture. (8)
[50]
SECTION B: ESSAY QUESTIONS
Answer at least ONE question, but not more than TWO questions, in this section.
Your essay should be about THREE pages long.
QUESTION 4: CIVIL RESISTANCE, 1970s TO 1980s: SOUTH AFRICA: THE CRISIS OF APARTHEID IN THE 1980s
Explain to what extent demonstrations, boycotts, sanctions and disinvestments by the international anti-apartheid organisations contributed to the eventual demise of the apartheid regime in the 1980s.
Substantiate your line of argument by using relevant evidence. [50]
QUESTION 5: THE COMING OF DEMOCRACY TO SOUTH AFRICA AND COMING TO TERMS WITH THE PAST
‘South Africa’s road to democracy was beset (affected) with various challenges, dilemmas (problems) and obstacles. It was the spirit of intense negotiations, resolute (firm) leadership and commitment to democracy that eventually led to the birth of a democratic dispensation in 1994.’
Critically discuss the statement. Support your line of argument with relevant evidence. [50]
QUESTION 6: THE END OF THE COLD WAR AND A NEW WORLD ORDER: THE EVENTS OF 1989
‘It was the collapse of the Soviet Union in 1989 that significantly contributed to the political transformation that occurred in South Africa.’
Do you agree with the statement? Substantiate your line of argument by using relevant evidence. [50]
TOTAL: 150
SECTION A: SOURCE BASED QUESTIONS
QUESTION 1: HOW DID THE DEPLOYMENT OF MISSILES TO CUBA CONTRIBUTE TO COLD WAR TENSIONS BETWEEN THE SOVIET UNION AND THE UNITED STATES IN THE 1960s?
1.1
1.1.1 [Extraction of evidence from Source 1A – L1]
1.1.2 [Extraction of evidence from Source 1A – L1]
1.1.3 [Interpretation of evidence from Source 1A – L2]
1.1.4 [Evaluation of limitations of Source 1A – L3]
1.2 1.2.1 [Interpretation of evidence from Source 1B – L2]
1.2.2 [Interpretation of evidence from Source 1B – L2]
1.3
1.3.1 [Extraction of evidence from Source 1C – L1]
1.3.2 [Extraction of evidence from Source 1C – L1]
1.3.3 [Definition of a historical concept from Source 1C – L1]
1.3.4 [Interpretation of evidence from Source 1C – L2]
1.4 [Comparison of evidence from Sources 1B and 1C – L3]
1.5
1.5.1 [Extraction of evidence from Source 1D – L1]
1.5.2 [Extraction of evidence from Source 1D – L1]
1.5.3 [Interpretation of evidence from Source 1D – L2]
1.5.4 [Interpretation of evidence from Source 1D – L2]
1.6 [Interpretation, analysis and synthesis of evidence from relevant sources – L3]
Candidates can use the following points to answer the question:
Use the following rubric to assess the paragraph:
CRITERIA | MARKS | |
LEVEL 1 |
| 0–2 |
LEVEL 2 |
| 3–5 |
LEVEL 3 |
| 6–8 |
(8)
[50]
QUESTION 2:
WHY DID FOREIGN POWERS BECOME INVOLVED IN THE ANGOLAN WAR OF INDEPENDENCE?
2.1
2.1.1 [Definition of historical concepts from Source 2A – L1]
2.1.2 [Extraction of evidence from Source 2A – L1]
2.1.3 [Interpretation of evidence from Source 2A – L2]
2.1.4 [Interpretation of evidence from Source 2A – L2]
2.1.5 [Interpretation of evidence from Source 2A – L2]
2.2
2.2.1 [Extraction of evidence from Source 2B – L1]
2.2.2 [Extraction of evidence from Source 2B – L1]
2.2.3 [Interpretation of evidence from Source 2B – L2]
2.2.4 [Interpretation of evidence from Source 2B – L2]
2.3 2.3.1 [Extraction of evidence from Source 2C – L1]
2.3.2 [Interpretation of evidence from Source 2C – L2]
2.3.3 [Determining usefulness of Source 2C – L3]
Useful to a great extent
2.4 2.4.1 [Interpretation of evidence from Source 2D – L2]
2.4.2 [Evaluating the limitations of Source 2D – L3]
2.5 [Interpretation, analysis and synthesis of evidence from relevant sources – L3]
Candidates may include the following aspects in their responses:
Use the following rubric to assess the paragraph:
CRITERIA | MARKS | |
LEVEL 1 |
| 0–2 |
LEVEL 2 |
| 3–5 |
LEVEL 3 |
| 6–8 |
(8)
[50]
QUESTION 3:
WHAT WAS THE IMPACT OF BLACK POWER MOVEMENT ON AFRICAN AMERICANS IN THE 1960s?
3.1
3.1.1 [Definition of historical concepts from Source 3A – L1]
3.1.2 [Interpretation of evidence from Source 3A – L2]
3.1.3 [Extraction of evidence from Source 3A – L1]
3.1.4 [Interpretation of evidence from Source 3A – L2]
3.2
3.2.1 [Extraction of evidence from Source 3B – L1]
3.2.2 [Extraction of evidence from Source 3B – L1]
3.2.3 [Interpretation of evidence from Source 3B – L2]
3.2.4 [Interpretation of evidence from Source 3B – L2]
3.2.5 [Evaluation of evidence from Source 3B – L3]
Successful
3.3 3.3.1 [Interpretation of evidence from Source 3C – L2]
3.3 [Comparison of sources to determine similarities – L3]
3.4
3.4.1 [Extraction of evidence from Source 3D – L1]
3.4.2 [Extraction of evidence from Source 3D – L1]
3.4.3 [Interpretation of evidence from Source 3D – L2]
3.5 [Interpretation, analysis and synthesis of evidence from relevant sources – L3]
Candidates may include the following aspects in their responses:
Use the following rubric to assess the paragraph:
CRITERIA | MARKS | |
LEVEL 1 |
| 0–2 |
LEVEL 2 |
| 3–5 |
LEVEL 3 |
| 6–8 |
(8)
[50]
SECTION B: ESSAY QUESTIONS
QUESTION 4: THE COLD WAR: CASE STUDY – CHINA
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates must indicate to what extent the Great Leap Forward and the Cultural Revolution succeeded in transforming China from a backward agrarian state into an industrial state. Candidates must discuss the reasons for the implementation as well as the impact of the policies.
MAIN ASPECTS
Candidates may include the following aspects in their response:
Introduction: Candidates must indicate to what extent the Great Leap Forward and the Cultural Revolution succeeded in transforming China from a backward agrarian state into an industrial state.
ELABORATION
QUESTION 5:
INDEPENDENT AFRICA: COMPARATIVE CASE STUDY – THE CONGO AND TANZANIA
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates need to critically discuss how Nyerere and Sese Seko confronted their economic and political challenges after independence.
MAIN ASPECTS
Candidates should include the following aspects in their response:
Introduction: Candidates should critically discuss the successes and challenges facing Tanzania and the Congo with specific reference to their economic and political development after gaining independent from colonial rule.
ELABORATION
ECONOMY
POLITICAL ASPECTS
Congo:
Tanzania
QUESTION 6:
CIVIL SOCIETY PROTESTS FROM THE 1950s TO THE 1970s – THE BLACK POWER MOVEMENT IN THE USA
[Plan and construct an original argument based on relevant evidence using analytical and interpretative skills.]
SYNOPSIS
Candidates must state whether they agree or disagree with the statement. By taking a stance they need to support it with relevant historical evidence.
MAIN ASPECTS
Candidates should include the following aspects in their response:
Introduction: Candidates should indicate whether they agree with the statement or not.
ELABORATION
TOTAL: 150
QUESTION 1:
HOW DID THE DEPLOYMENT OF MISSILES TO CUBA CONTRIBUTE TO COLD WAR TENSIONS BETWEEN THE SOVIET UNION AND THE UNITED STATES IN THE 1960s?
SOURCE 1A
This source is an extract from a Soviet statement on a potential Cuban attack by the United States (11 September 1962).
The Government of the U.S.S.R. deems it necessary to draw the attention of the governments of all countries and world opinion to the provocations the United States Government is now staging, provocations which might plunge the world into the disaster of a universal world war with the use of thermonuclear weapons. War-minded reactionary elements of the United States have long since been conducting an unbridled (unchecked) propaganda campaign against the Cuban Republic, calling for an attack on Cuba, an attack on Soviet ships carrying the necessary commodities and food to the Cuban people, in one word, calling for war. The President of the United States asked Congress to permit the call-up of 150 000 reservists to the armed forces of the United States … Such a step by the United States Government cannot be assessed otherwise than a screen for aggressive plans and intentions of the United States itself and will inevitably lead to aggravating the international atmosphere. … We do not hide from the world public that we really are supplying Cuba with industrial equipment and goods which are helping to strengthen her economy and raise the well- being of the Cuban people. … It will be recalled that a certain amount of armaments is also being shipped from the Soviet Union to Cuba at the request of the Cuban government in connection with the threats by aggressive imperialist circles. The Cuban statesmen also requested the Soviet Government to send to Cuba Soviet military specialists, technicians who would train the Cubans in handling up-to-date weapons, because up-to-date weapons now call for high skill and much knowledge. It is but natural that Cuba does not yet have such specialists. The armaments and military equipment sent to Cuba are designed exclusively for defensive purposes and the President of the United States and the American military just as the military of any country know what means of defence are. How can these means threaten the United States? |
[From http://www.mtholyoke.edu/acad/intrel/precrisis.htm. Accessed on 21 November 2019.]
SOURCE 1B
The following source is a map that the USA published to indicate the impact of the nuclear missiles in Cuba.
[From https://www.gettyimages.com/photos/cuban-missile-crisis?mediatype=photography&phrase=cuban%20missile%20crisis&sort=mostpopular. Accessed on 15 December 2019.]
SOURCE 1C
This source is an extract from President John F. Kennedy’s speech to the nation on radio and television about the Soviet missiles in Cuba on October 22, 1962.
Good evening, my fellow citizens. This Government, as promised, has maintained the closest surveillance of the Soviet military build-up on the island of Cuba. Within the past week, unmistakable evidence has established the fact that a series of offensive missile sites is now in preparation on that imprisoned island. The purpose of these bases can be none other than to provide a nuclear strike capability against the Western Hemisphere. The characteristics of these new missile sites indicate two distinct types of installations. Several of them include medium range ballistic missiles, capable of carrying a nuclear warhead for a distance of more than 1 000 nautical miles. Each of these missiles, in short, is capable of striking Washington, D.C., the Panama Canal, Cape Canaveral, Mexico City, or any other city in the south-eastern part of the United States, in Central America, or in the Caribbean area. To halt this offensive build-up, a strict quarantine on all offensive military equipment under shipment to Cuba is being initiated. All ships of any kind bound for Cuba from whatever nation or port will, if found to contain cargoes of offensive weapons, be turned back ... We are not at this time, however, denying the necessities of life as the Soviets attempted to do in their Berlin Blockade of 1948. |
[From https://spartacus-educational.com. Accessed on 16 December 2019.]
SOURCE 1D
This source is a translation of a telegram from Khrushchev to Kennedy sent from the Embassy in the Soviet Union to the Department of State, Moscow, October 26, 1962.
Let us therefore show statesmanlike wisdom. I propose we, for our part, will declare that our ships, bound for Cuba, are not carrying any armaments. You would declare that the United States will not invade Cuba with its forces and will not support any sort of forces which might intend to carry out an invasion of Cuba. Then the necessity for the presence of our military specialists in Cuba would disappear. Mr President, I appeal to you to weigh well what the aggressive, piratical actions, which you have declared the USA intends to carry out in international waters, would lead to. You yourself know that any sensible man simply cannot agree with this, cannot recognise your right to such actions. If you did this as the first step towards the unleashing of war, well then, it is evident that nothing else is left to us but to accept this challenge of yours. If, however, you have not lost your self-control and sensibly conceive what this might lead to, then, Mr President, we and you ought not now to pull on the ends of the rope in which you have tied the knot of war, because the more the two of us pull, the tighter that knot will be tied. And a moment may come when that knot will be tied so tight that even he who tied it will not have the strength to untie it, and then it will be necessary to cut that knot. And what that would mean is not for me to explain to you, because you yourself understand perfectly of what terrible forces our countries dispose. Consequently, if there is no intention to tighten that knot and thereby to doom the world to the catastrophe of thermonuclear war, then let us not only relax the forces pulling on the ends of the rope, let us take measures to untie that knot. We are ready for this. |
[From https://microsites.jfklibrary.org/cmc/oct26/doc4.html. Accessed on 16 December 2019.]
QUESTION 2:
WHY DID FOREIGN POWERS BECOME INVOLVED IN THE ANGOLAN WAR OF INDEPENDENCE?
SOURCE 2A
This source explains the power struggles that erupted after Angola became independent in 1974.
Three main military movements had been fighting for Angolan independence since the 1960s. The Popular Movement for the Liberation of Angola (MPLA) was a Marxist organisation centred in the capital, Luanda, and led by Agostinho Neto. The National Front for the Liberation of Angola (FNLA) led by Holden Roberto, was based in the north of the country and had strong ties to the US ally (friend), Mobutu Sese Seko, in neighbouring Zaire. The National Union for the Total Independence of Angola (UNITA), an offshoot of the FNLA, was by Jonas Savimbi and supported by the country’s largest ethnic group, the Ovimbundu. Following the Portuguese coup (revolution), these three revolutionaries met with representatives of the new Portuguese government in January 1975 and signed the Alvor Agreement that granted Angolan independence and provided for a three-way power sharing government. However, trust quickly broke down among the three groups, and the country descended (fell) into civil war as each vied (competed) for sole (total) power. The crisis in Angola developed into a Cold War battleground as the superpowers and their allies delivered military assistance to their preferred clients. The United States supplied aid and training for both the FNLA and UNITA while troops from Zaire assisted Holden Roberto and his fighters. China also sent military instructors to train the FNLA. During the summer of 1975, the Soviet-supported MPLA was able to consolidate power in Luanda and oust the U.S.-supported FNLA from the capital, but the FNLA continued to attack. |
[From https://history.state.gov/milestones/1969-1976/angola. Accessed on 05 April 2020.]
SOURCE 2B
The source below outlines the reasons for South Africa’s involvement in Angola during the 1970s.
SA’s first intervention of Angola seems to have resulted from the need to secure and protect its own interests. The government was severely anti-communist at this time, as the notion of the ‘total national strategy’ against the ‘total onslaught’ of communism became the all-encompassing factor that determined foreign policy. SA’s détente politics toward Africa at this time was pursued rather successfully prior to the Angolan intervention in order to establish buffer zones, which would hopefully protect SA from the increasing communist threat. In addition, SA was becoming increasingly worried about this possible threat as the USSR and Cuba were enlarging their support to the MPLA after the coup in Portugal in 1974. The concentration of SWAPO insurgents on the southern Angola border furthermore endangered SA’s interests in SWA, as SWAPO was one of the MPLA’s biggest African allies. Both the MPLA and SWAPO were seen as Soviet proxies during the Cold War. In addition, SA was pressured by some in the international community to get involved in Angola for the first time. The USA, like SA, was also strongly anti-communist and supported SA’s initial involvement to some extent. France also had concerns. SA also saw its limited initial involvement as an opportunity to establish a less hostile government in Angola, than what was already established in Mozambique. The FNLA, UNITA and several African and international actors such as Zaire and even Zambia made similar requests. South Africa decided that it would be in its own as well as the region’s best interest to intervene in the Angolan conflict. |
[From South Africa’s Intervention in Angola: Before Cuito Cuanavale and Thereafter file:///E:/Angola%202/labuschagne_south_2009.pdf. Accessed on 05 April 2020.]
SOURCE 2C
The extract below indicates how the United States of America supported UNITA during the Angolan Civil War.
The Central Intelligence Agency (CIA) made its first major weapons shipment to the FNLA in July 1975. Thus, like the Russians and Chinese, the United States was giving aid to one side of Angolan Civil War on a level far greater than it had ever provided during the struggle against Portuguese colonialism. The United States was directly involved in the civil war to a marked (noticeable) degree. In addition to training Angolan combat units, US personnel did considerable flying between Zaire and Congo carrying out reconnaissance (investigation) and supply missions, and the CIA spent over a million dollars on an ambitious mercenary (hired soldiers) programme. Several reports appeared in the US press stating that many American guerrillas were fighting in Angola against the MPLA from ‘scores’ to ‘300’ and that many others were recruited and trained in the United States to join them. But John Stockwell, the head of CIA’s Angola task force, puts the number of American mercenaries who actually made it to Angola at only 24. The CIA was also directly financing the arming of British mercenaries (fighting in Angola). Subsequently (later) the Secretary of the State, Henry Kissinger, informed the Senate that ‘the CIA is not involved’ in the recruitment of mercenaries for Angola. … Through recruited journalists representing major news service, the Agency (CIA) was able to generate international coverage of false reports for Soviet advisers in Angola. One CIA story, announced to the press by UNITA, was that 20 Russians and 35 Cubans had been captured. Another fabrication (lie) concerned alleged rapes committed by Cuban soldiers in Angola; this was elaborated to include their capture, trial and execution … |
[From http://williamblum.org/chapters/killing-hope/angola. Accessed on 7 March 2020.]
SOURCE 2D
This poster depicts President Agostinho Neto and Fidel Castro after Angolan independence celebrations.
[From https://mrdivis.wordpress.com/2016/12/02/remembering-fidel-castros-impact-in-southern-africa/.
Accessed on 7 March 2020.]
QUESTION 3:
WHAT WAS THE IMPACT OF THE BLACK POWER MOVEMENT ON AFRICAN AMERICANS IN THE 1960s?
SOURCE 3A
The extract below outlines Stokely Carmichael’s explanation regarding the philosophy of Black Power.
The Black Power Movement grew out of the Civil Rights Movement that had steadily gained momentum through the 1950s and 1960s. Although not a formal movement, the Black Power Movement marked a turning point in black-white relations in the United States and in how blacks saw themselves. The movement was hailed (welcomed) by some as a positive and proactive force aimed at helping blacks achieve full equality with whites, but it was reviled (hated) by others as a militant, sometimes violent faction whose primary goal was to drive a wedge (division) between whites and blacks. In truth, the Black Power Movement was a complex event that took place at a time when society and culture were being transformed throughout the United States, and its legacy reflects that complexity. Blacks still faced lower wages than whites, higher crime rates in their neighbourhoods, and unspoken but palpable (deep) racial discrimination. Young blacks in particular saw the Civil Rights Movement as too mainstream to generate real social change. What they wanted was something that would accelerate (quicken) the process and give blacks the same opportunities as whites, not just socially but also economically and politically. Perhaps more important, they felt that the Civil Rights Movement was based more on white perceptions of civil rights than black perceptions. By the mid-1960s, dissatisfaction with the pace of change was growing among blacks. The term 'black power' had been around since the 1950s, but it was Stokely Carmichael, head of the Student Non-violent Co-ordinating Committee (SNCC), who popularised the term in 1966. |
[From http://www.encyclopedia.com/social-sciences-and-law/sociology-and-social- reform/socialreform/black-power-movement. Accessed on 18 November 2019.]
SOURCE 3B
The source below explains the reasons why the Black Panther Party launched their breakfast programme.
In 1969, a group of children sat down to a free breakfast before school. On the menu: chocolate milk, eggs, meat, cereal and fresh oranges. The scene wouldn’t be out of place in a school cafeteria these days – but the federal government wasn’t providing the food. Instead, breakfast was served thanks to the Black Panther Party. At the time, the militant Black Nationalist party was vilified (criticised) in the news media and feared by those intimidated by its message of black power and its commitment to ending police brutality and subjugation (suppression) of black Americans. But for students eating breakfast, the Black Panther’s politics were less interesting than the meals they were providing. “The children, many of whom had never eaten breakfast before the Panthers started their program,’’ The Sun reporter wrote, “think the Panthers are ‘groovy’ and ‘very nice’ for doing this for them.’’ The program may have been groovy, but its purpose was to fuel revolution by encouraging black people’s survival. From 1969 through the early 1970s, the Black Panthers’ Free Breakfast for School Children Program fed tens of thousands of hungry kids. … School officials immediately reported results in kids who had free breakfast before school. “The school principal came down and told us how different the children were’’, Ruth Beckford, a parishioner who helped with the program, said later. “They weren’t falling asleep in class, they weren’t crying with stomach cramps.’’ … Food wasn’t the only part of the BPP’s social programs; they expanded to cover everything from free medical clinics to community ambulance services and legal clinics. |
[From //www.hist.com/news/free-school-breakfast-black-panther-party. Accessed on 07 March 2020.]
SOURCE 3C
This photograph shows members of the Philadelphia Black Panthers organisation, serving breakfast to children.
[From https://www.cbsnews.com/pictures/inside-the-black-panthers-photographer-stephen-
shames/16/. Accessed on 21 November 2019.]
SOURCE 3D
The source below is an extract of an article written by Mary Philips called Power of the First-person narrative: Ericka Huggins and the Black Panther Party.
Born Ericka Cozette Jenkins on January 5, 1948, in Washington, DC, Huggins joined the BPP in 1967 in Los Angeles. As a college student at Lincoln University in Pennsylvania, she was involved in the Black Student Congress (BSC), a campus organisation, despite the fact that the BSC was resistant to female membership: “They didn’t appreciate women joining the Black Student Congress as it was called then but they did let me join” (Interview by the author, July 20, 2011). In college, she read a Ramparts magazine article on charges against Huey P. Newton for the murder of an Oakland police officer. Moved by the inhumane treatment of Newton after his arrest, Huggins mentioned the picture in that Ramparts magazine article showed Huey without a shirt strapped to a hospital gurney, with a bullet wound in his stomach. The white police officer was obviously guarding the camera. Inspired by the image and the story, she and her lover, John Huggins, decided to leave school, move to California, and join the BPP. She later married Huggins and they had a daughter, Mai. In the BPP, Ericka Huggins served in many capacities, including working as editor of the BPP newspaper, The Black Panther, also known as The Black Panther Intercommunal News Service. When her husband was murdered by COINTELPRO agents, Huggins moved to her hometown and opened a BPP branch in New Haven, Connecticut. After her arrest, trial, and release in 1971, she served as director of the BPP’s Oakland Community School (OCS), maintaining its daily affairs from 1973 to 1981. She co-wrote the curriculum as well as grants for the school, in addition to supervising and managing staff members. While serving as director, she travelled the country delivering presentations on the school’s pedagogy. |
[From https://www.erickahuggins.com/resources. Accessed on 21 November 2019.]
ACKNOWLEDGEMENTS
Visual sources and other historical evidence were taken from the following:
http://www.mtholyoke.edu/acad/intrel/precrisis.htm
https://www.gettyimages.com/photos/cuban-missile- crisis?mediatype=photography&phrase =cuban%20missile%20crisis&sort=mostpopula
https://spartacus-educational.com.
https://microsites.jfklibrary.org/cmc/oct26/doc4.html
https://history.state.gov/milestones/1969-1976/angola
South Africa’s Intervention in Angola: Before Cuito Cuanavale and Thereafter file:///E:/Angola%202/labuschagne_south_2009.pdf.
http://williamblum.org/chapters/killing-hope/angola
https://mrdivis.wordpress.com/2016/12/02/remembering-fidel-castros-impact-in- southern-africa/.
http://www.encyclopedia.com/social-sciences-and-law/sociology-and-social- reform/socialreform/black-power-movement
www.hist.com/news/free-school-breakfast-black-panther-party.
https://www.cbsnews.com/pictures/inside-the-black-panthers-photographer-stephen- shames/16/.
https://www.erickahuggins.com/resources