MECHANICAL TECHNOLOGY
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
QUESTION | CONTENT | MARKS | TIME (minutes) |
1 | Multiple-choice questions | 20 | 15 |
2 | Safety | 10 | 10 |
3 | Tools and Equipment | 12 | 10 |
4 | Materials | 13 | 10 |
5 | Terminology | 30 | 20 |
6 | Joining Methods | 25 | 25 |
7 | Forces | 30 | 30 |
8 | Maintenance | 15 | 15 |
9 | Systems and Control | 25 | 25 |
10 | Turbines | 20 | 20 |
TOTAL | 200 | 180 |
QUESTION 1: MULTIPLE-CHOICE QUESTIONS
Various options are provided as possible answers to the following questions. Write down the question number (1.1–1.20), choose the answer and make a cross (X) over the letter (A–D) of your choice in the ANSWER BOOK.
EXAMPLE: |
1.1 Which ONE of the following safety measures applies to a power saw?
1.2 Which ONE of the following safety measures applies to a tensile tester?
1.3 A Rockwell tester is used to test the … of a material.
1.4 Which ONE of the following is a reason for a high carbon-monoxide reading on an internal combustion engine?
1.5 An austenite structure is …
1.6 The second arrest temperature (AC2) for carbon steel is …
1.7 The minimum diameter of a screw thread is measured at the … of the screw thread.
1.8 What is the gear ratio of a Cincinnati dividing head used on a milling machine?
1.9 Which ONE of the following is a common cause of incomplete penetration into a welded joint?
1.10 What does the X-ray test on a welded joint detect?
1.11 One (1) Pascal can be expressed as …
1.12 What is understood by Young's elasticity modulus?
1.13 What is represented by point D on the stress-strain graph shown in FIGURE 1.1?
FIGURE 1.1
1.14 Where is extreme pressure (EP) oil used?
1.15 What is the purpose of using cutting fluid on a lathe or milling machine?
1.16 FIGURE 1.2 below shows three gears meshing. What is the purpose of idler gear B?
FIGURE 1.2
1.17 What will the rotation frequency of pulley B be if pulley A rotates at 2 000 r/min, as shown in FIGURE 1.3 below?
FIGURE 1.3
1.18 Determine the speed ratio of the chain drive of the bicycle, as shown in FIGURE 1.4.
FIGURE 1.4
1.19 The function of a supercharger fitted to an internal combustion engine is to compress air by a/an … action.
1.20 What do you understand by the term boost in respect of turbochargers?
[20]
QUESTION 2: SAFETY
2.1 Which TWO safety precautions must be observed when working with a coil spring compressor? (2)
2.2 State THREE safety precautions that should be observed before pressing a bearing from a shaft using a hydraulic press. (3)
2.3 Thabo uses a beam-bending tester to determine the degree of deflection of a work piece. State TWO safety precautions to be considered when using the beam-bending tester. (2)
2.4 Name ONE distinct safety precaution when using EACH of the following items of testing equipment:
2.4.1 Brinell tester (1)
2.4.2 Gear and bearing puller (1)
2.4.3 Torsion tester (1)
[10]
QUESTION 3: TOOLS AND EQUIPMENT
3.1 Give TWO reasons for low fuel pressure. (2)
3.2 Which precision measuring instrument is used to measure the following accurately:
3.2.1 The depth of a blind hole (1)
3.2.2 The pitch diameter of a V-screw thread (1)
3.3 A depth micrometer reading is shown in FIGURE 3.1. The micrometer is extended with a 50–75 mm interchangeable rod. Give the complete reading with the unit.
FIGURE 3.1 (2)
3.4 Name TWO measurements that can be taken with a multimeter. (2)
3.5 Explain TWO ways in which you will detect cylinder leakages from an internal combustion engine. (2)
3.6 State TWO uses of the cooling system pressure tester. (2)
[12]
QUESTION 4: MATERIALS
4.1 Name TWO properties of EACH of the following structures of steel:
4.1.1 Cementite (2)
4.1.2 Pearlite (2)
4.2 FIGURE 4.1 shows a diagram. Answer the questions that follow.
FIGURE 4.1
4.2.1 What is the diagram in FIGURE 4.1 above called? (1)
4.2.2 Label A–E shown on the diagram. (5)
4.2.3 State TWO properties of C on the diagram. (2)
4.3 What is the lower critical temperature for carbon steel with a carbon content of 0,87%? (1)
[13]
QUESTION 5: TERMINOLOGY
5.1 A spur gear with 118 teeth must be cut on a universal milling machine. Calculate the indexing required to cut this gear with the help of a Cincinnati dividing head. (3)
5.2 Use simple line sketches to explain the difference between up-cut milling and down-cut milling on a milling machine. Indicate the work-piece feed and cutter rotation. (4)
5.3 A tapered gib-head key must be made to fit a 102 mm diameter shaft. Calculate the following key dimensions:
5.3.1 The width of the key (2)
5.3.2 The thickness of the key (2)
5.3.3 The length of the key (2)
5.3.4 The thickness of the key at the smaller end (4)
5.4 A spur gear has 60 teeth and a module of 3. Calculate the following in respect of the spur gear:
5.4.1 Addendum (1)
5.4.2 Dedendum (2)
5.4.3 Clearance (2)
5.4.4 Pitch circle diameter (2)
5.4.5 Outside diameter (2)
5.4.6 Cutting depth (2)
5.4.7 Circular pitch (2)
[30]
QUESTION 6: JOINING METHODS
6.1 What welding defect is described as non-metallic solids trapped in the weld metal? (1)
6.2 Name FOUR defects that may be observed during visual inspections. (4)
6.3 State TWO causes of incomplete penetration in a welded joint. (2)
6.4 Name TWO measures to prevent a lack of fusion in a welded joint (2)
6.5 Identify the destructive tests described below that are applied to a welded joint:
6.5.1 To determine the weld hardness and strength (1)
6.5.2 To reveal internal defects (1)
6.5.3 To determine the ductility of the deposit and the heat-affected area adjacent to the weld (1)
6.6 Explain how you will conduct a dye penetration test on a welded joint. (7)
6.7 State ONE function of EACH of the following components on the MIG/MAGS welding equipment:
6.7.1 Wire feed controller (2)
6.7.2 Welding gun (2)
6.8 What is the function of the inert gas used during the MIG/MAGS welding process? (2)
[25]
QUESTION 7: FORCES
7.1 Four pulling forces of 1,2 kN, 2 kN, 3,4 kN and 1,8 kN are acting on the same point, as shown in FIGURE 7.1 below. Determine, by means of calculations, the magnitude and direction of the resultant of the system of forces.
FIGURE 7.1 (13)
7.2 A load of 40 kN is exerted on a brass bush used in a hydraulic press. The outer and inner diameters of the bush are 98 mm and 67 mm respectively. The original length of the bush is 80 mm and Young's modulus for brass is 90 GPa.
Calculate the:
7.2.1 Stress in the bush material (5)
7.2.2 Strain (3)
7.2.3 Change in length (3)
7.3 FIGURE 7.2 below shows a uniform beam that is supported by two vertical supports, A and B. Two vertical point loads of 200 N and 600 N, together with a uniformly distributed force of 80 N/m over the total length of the beam, are acting on the beam. Determine, by means of calculations, the magnitudes of the reactions in supports A and B.
FIGURE 7.2 (6)
[30]
QUESTION 8: MAINTENANCE
8.1 Define preventative maintenance. (2)
8.2 Why is it important to ensure that a machine is switched off and locked out when doing maintenance on belt drives? (2)
8.3 What is clutch-pedal free play? (2)
8.4 What is meant by the term viscosity index? (1)
8.5 Give TWO reasons why the clutch plate in a motor vehicle's clutch assembly is replaced. (2)
8.6 Why does grease have a very high viscosity? (2) 8.7 What is cutting fluid? (2)
8.8 Give a reason why the viscosity of a cutting fluid should be low. (2)
[15]
QUESTION 9: SYSTEMS AND CONTROL
9.1 FIGURE 9.1 below shows a gear-drive system. Driver gear A on the shaft of the electric motor has 18 teeth that mesh with gear B, with 36 teeth, on a countershaft. There is another driver gear, C, with 16 teeth, on this countershaft, which meshes with a gear D, with 46 teeth, on the output shaft.
FIGURE 9.1
Calculate the:
9.1.1 Rotation frequency of the output shaft if the electric motor rotates at 1 660 r/min (3)
9.1.2 Velocity ratio between the input shaft and output shaft (2)
9.2 FIGURE 9.2 shows a belt-drive system with a 230 mm driver pulley. The belt speed of the 12 mm thick V-belt is 36 m.s-1. The tensile force in the slack side is 110 N and the ratio between the force in the tight side and the force in the slack side is 2,5.
FIGURE 9.2
9.2.1 Rotation frequency of the driver pulley in r/min (revolutions per minute) (4)
9.2.2 Power transmitted (4)
9.3 A hydraulic system is represented diagrammatically inFIGURE 9.3.
FIGURE 9.3
Calculate the:
9.3.1 Fluid pressure in the hydraulic system when in equilibrium (4)
9.3.2 Effort force needed on piston A to lift the load of 700 kg with piston B (4)
9.4 What is the purpose of the anti-lock brake system (ABS) in a vehicle? (2)
9.5 Explain why a seat belt in a vehicle is described as an 'active' safety feature. (2)
[25]
QUESTION 10: TURBINES
10.1 Name TWO types of impulse turbines. (2)
10.2 FIGURE 10.1 shows a water turbine driving a generator. Answer the questions that follow.
FIGURE 10.1
10.2.1 Identify the type of turbine shown in FIGURE 10.1 above. (1) 10.2.2 Label A–F. (6)
10.2.3 State TWO advantages of the turbine shown in FIGURE 10.1 above. (2)
10.3 State TWO advantages of EACH of the following:
10.3.1 Supercharger (2)
10.3.2 Steam turbine (2)
10.3.3 Gas turbine (2)
10.4 Explain the term turbo lag in terms of a turbocharger. (3)
[20]
TOTAL: 200
INFORMATION TECHNOLOGY
PAPER 1
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
Do the following:
Once extracted, the following list of files will be available in the folder DelphiDataENGMarch2017/JavaDataENGMarch2017:
DELPHI FILES | JAVA (NETBEANS) FILES |
Question1: | Question1: |
Question1_P.dpr | Question1.form |
Question1_P.dproj | Question1.java |
Question1_P.res | Type1.PNG |
Question1_U.dfm | Type2.PNG |
Question1_U.pas | |
Type1.PNG | |
Type2.PNG | |
Question2: | Question2: |
CardHolder_U.pas | CardHolder.java |
DataJanuary2017.txt | DataJanuary2017.txt |
Question2_P.dpr | Question2.form |
Question2_P.dproj | Question2.java |
Question2_P.res | |
Question2_U.dfm | |
Question2_U.pas | |
Question3: | Question3: |
Question3_P.dpr | Question3.form |
Question3_P.dproj | Question3.java |
Question3_P.res | |
Question3_U.dfm | |
Question3_U.pas |
SCENARIO Loyalty cards are often used to create profiles for customers. It is also a popular way of motivating customers to visit shops that regularly award loyalty points for purchases made. |
SECTION A
QUESTION 1: GENERAL PROGRAMMING SKILLS
An applicant must complete an application form to obtain a loyalty card. |
Do the following:
Example of graphical user interface (GUI):
1.1 Button [Question 1_1]
A label called lblWelcomeMessage has been created and set to be not visible. Write code to validate the information entered by the user as follows:
If the contents in both fields are valid, the label displaying the welcoming message must be set to visible.
Example of message if no space was entered in the name-surname field:
Example of message if the ID number field was left blank:
Example of message if the ID number that was entered does not consist of 13 digits:
(14)
1.2 Buttons with images [Question 1_2]
A customer must select the preferred type of loyalty card. The images on the buttons in this section of the GUI show two types of loyalty cards. When a specific image is selected (button clicked), the program must do the following:
NOTE: Only the label for the currently selected button must appear in bold. If the user selects the other type of loyalty card, the label of the previously selected loyalty card must NOT appear in bold. (6)
1.3 Button [Question 1_3]
The final purchase amount for today must be entered in the text box.
The program must grant the following benefit towards the holder of the type of loyalty card selected in QUESTION 1_2:
Display a message describing the benefit granted depending on the type of loyalty card.
Example of output if the code of the loyalty card is DI and the purchase amount R1 200:
NOTE: The discount amount must be displayed as a currency with two decimal digits.
Example of output if the code of the loyalty card is CH and the purchase amount R230:
(15)
1.4 Button [Question 1_4]
The customer's ID number entered in QUESTION 1_1 and the type of loyalty card selected in QUESTION 1_2 are required to compile the customer's loyalty card number. A loyalty card number consists of three parts. Each part of the number must be compiled as follows and displayed in the components provided:
Part 1:
The first part of the loyalty card number consists of either the letter B if the business card check box was selected or the letter P if the business card check box was not selected, followed by the first three digits of the customer's ID number.
Part 2:
A string called charString, which contains the following 10 characters, has been supplied as part of the code provided:
! @ # $ % ] & * ^ ~
Each character contained in the string represents a digit (0–9). This means that the first character (!) represents the digit 0, the second character (@) the digit 1, and so on.
This part of the loyalty card number must consist of the last digit from the customer's ID number, followed by the character from charString that represents that digit.
Example of this part of the loyalty card number if the customer's ID number is 8802128756084:
4%
Part 3:
This part of the loyalty card number consists of the code representing the type of loyalty card (DI or CH) established in QUESTION 1_2.
Example of the loyalty card number of a customer with the following profile:
(13)
|
TOTAL SECTION A: 48
SECTION B
QUESTION 2: OBJECT-ORIENTATED PROGRAMMING
The local supermarket has a loyalty card system where customers can receive rewards depending on the number of visits, the number of loyalty points gathered and the percentage of health food bought.
Do the following:
Delphi programmers | Java programmers |
|
|
2.1 The given incomplete object class (TCardHolder/CardHolder) contains the declaration of five attributes, the toString() method and an incomplete isCorrect() method.
The given attributes of the CardHolder object:
NAMES OF ATTRIBUTES | DESCRIPTION | |
Delphi | Java | |
fCardNumber | cardNumber | A unique number for the card holder |
fCellNumber | cellNumber | The cellphone number of the card holder |
fNumVisits | numVisits | The number of times the card holder visited the shop during the month |
fLoyaltyPoints | loyaltyPoints | The total number of loyalty points received on this card up to now |
fHealthLevel | healthLevel | A character indicating the health level of the card holder, based on the amount of health food bought during the month: S – Silver (Lowest level) |
Complete the code in the given CardHolder class (TCardHolder/CardHolder) as described in QUESTION 2.1.1 to QUESTION 2.1.6 below.
2.1.1 Write code for a constructor method to receive the card number, cellphone number and loyalty card points already received, as parameter values. Assign these values to the relevant attributes. The lowest code for the health food level (S) must be assigned to the attribute for the health level. The attribute for the number of visits must be set to 0. (5)
2.1.2 Write a mutator method to be able to set the attribute for the number of visits to a value received as a parameter. (2)
2.1.3 Write code for a method called increaseLoyaltyPoints that receives the total amount spent for this month as a parameter and increases the current number of loyalty points based on the amount received.
Use the following criteria:
2.1.4 Write code for a method called updateHealthLevel that will receive the total amount spent for this month and the amount spent on health food for this month as parameters. Calculate the percentage that was spent on health food and set the attribute for the health level according to the criteria provided in the table below.
Level code | Percentage indication |
S | Less than 10% |
G | 10% or more, but less than 40% |
P | 40% or more |
(7)
2.1.5 An access code is required to be able to update a customer's loyalty points. The customer's cellphone number has been used to compile the access code.
Write code to complete the isCorrect method provided. The method must test whether the access code received as a parameter is correct by applying the following instructions on the attribute for the cellphone number:
2.1.6 Write code for a method called identifyStarShopper that will return a string to indicate whether the card holder is a STAR shopper or not. A card holder is a STAR shopper if the following applies:
The string to be returned must either be 'STAR shopper' or an empty string. (6)
2.2 Information on the visits and purchases of card holders is saved for one month only in a text file. The text file called DataJanuary2017.txt contains the transactions made by four of the card holders during January.
The contents of text file is as follows:
Example of the first 12 lines of the text file DataJanuary2017.txt:
B921-3$-DI
1459.30
72.30
B870-4%-CH
899.80
22.50
P730-7*-DI
299.30
62.85
B870-4%-CH
869.30
182.55
Do the following to complete the code for each button in the main form unit (Delphi)/GUI class (Java), as in the section that follows.
NOTE: The object objCardHolder has been declared globally as part of the provided code.
2.2.1 Button – [2.2.1 – Check access code]
The user is required to select a card number from the four card numbers provided in the combo box.
Once a card number has been selected in the combo box, the cellphone number of the card holder and the number of loyalty points already earned from previous purchases are displayed with the provided code.
The user must enter the correct access code for the selected card number to allow the program to process the data of the card holder saved in the text file.
Write code to do the following:
If the correct access code has been entered, use the data in the DataJanuary2017.txt text file to determine the following regarding the purchases of the card holder:
Use this information and the relevant methods from the object class to update the number of loyalty points, the health level code and the number of times the card holder visited the shop for purchases.
Enable the button for QUESTION 2.2.2.
If the access code is NOT correct, display a message to indicate that the login was not successful and clear the access code text box.
The data in the table below can be used for testing purposes.
Card number | Access code |
B921-3$-DI | 188 |
B870-4%-CH | 41 |
P730-7*-DI | 338 |
B810-2#-DI | 170 |
(24)
2.2.2 Button – [2.2.2 – Display card holder details]
Write code to use the toString method to display the card holder object data in the output area provided.
The method created in QUESTION 2.1.6 must be used to indicate if the card holder is a STAR shopper.
Example of output for card number B921-3$-DI:
Example of output for card number B870-4%-CH: (3)
|
TOTAL SECTION B: 65
SECTION C
QUESTION 3: PROBLEM-SOLVING PROGRAMMING
SCENARIO A social media companion app called Dine-Is-Fine has been designed specifically for the 10 restaurants at your local mall. You and your friends are registered users of this app. The app can be used to share your location with other registered users. |
Do the following:
Supplied GUI:
Supplied data:
You are provided with a two-dimensional array called arrMall filled with characters that represent the layout of the mall. The characters A to J represent 10 restaurants that you and your friends regularly visit.
Output area:
Decide on a suitable output component to be placed in the output area provided to display the content of the two-dimensional array.
NOTE:
3.1 Button [Display layout]
The program must display the layout of the mall. Write code to use the data supplied in the two-dimensional array to display the layout in neat columns.
Example of output: (5)
Explanation of the data in the array:
NOTE: You will always remain in the same position for the purpose of this question.
3.2 Combo box with restaurant codes
You are requested to select a restaurant from the combo box where one of your friends will dine.
Write code to replace the X placeholder at the selected restaurant with a hashtag symbol (#) to indicate that a friend is at the restaurant and display an updated layout of the mall.
Example of output if two of your friends are dining at restaurant C and F respectively: (13)
3.3 Button [Locate nearest friend(s)]
The program must determine at which restaurant(s) in the mall your friends currently are and how far they are from where you are. Every vertical or horizontal movement on the matrix represents a distance of 4,5 metres. From the restaurant(s) where your friends are, determine and display the restaurant(s) closest to where you are.
Example of output if your friends are dining at restaurants C and F:
Example of output if your friends are dining at restaurants C, F and H:
NOTE: You cannot move diagonally on the matrix.
MARK ALLOCATION FOR QUESTION 3.3
Locate the friends | 3 |
Determine the name of the restaurant | 4 |
Calculate the distance | 6 |
Find the nearest friend(s) | 3 |
Output to indicate position of friend(s) and distance | 2 |
Correct format of output for the nearest friend(s) | 1 |
TOTAL | 19 |
|
TOTAL SECTION C: 37
GRAND TOTAL: 150
INFORMATION TECHNOLOGY
PAPER 2
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1 Various options are provided as possible answers to the following questions. Write down the question number (1.1.1–1.1.10), choose the answer and make a cross (X) over the letter (A–D) of your choice in the ANSWER BOOK.
EXAMPLE:
1.1.11
1.1.1 Which ONE of the following does NOT conform to sound network etiquette?
1.1.2 Which ONE of the following is a technique that is classified as social engineering?
1.1.3 Which ONE of the following has the largest storage capacity?
1.1.4 Which ONE of the following represents access speed in descending order?
1.1.5 A software company requires '1 GB RAM minimum and 2 GB RAM recommended' for its new operating system. Which ONE of the following will be the likely outcome of attempting to install the operating system on a computer with 1 GB RAM?
1.1.6 The acronym for the connection on the motherboard between the CPU and the RAM is …
1.1.7 Which ONE of the following icons represents a network drive?
1.1.8 The correct conversion of D416 to a decimal number is …
1.1.9 Which ONE of the following logic statements can be used to do a search for blue cars owned by a person with the surname Thomas or Moore?
1.1.10 Which ONE of the following statements will calculate the bonus of a staff member correctly, if all staff members get a R100 bonus and a further 2% of their salary for each year of service?
1.2 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question number (1.2.1–1.2.5) in the ANSWER BOOK.
1.2.1 Copyright license that allows you to use, copy and distribute parts of published work for non-profit purposes (1)
1.2.2 An international community that develops open standards to ensure the long-term growth of the Web (1)
1.2.3 Companies that pay workers to repeatedly click on website elements to artificially increase or boost the status of a product or web page (1)
1.2.4 Increasing the speed of the system bus/clock, hence increasing the speed of all components of a computer system to enhance the performance (1)
1.2.5 The execution of physical tasks by computer-controlled machines rather than by human beings (1)
TOTAL SECTION A: 15
SCENARIO The IT class will be hosting a computer games evening as part of a fundraising campaign for the school. The gamers will be required to bring in their own computers and other devices for the evening. The computers and other devices used for the evening must meet certain basic hardware and software requirements to be used effectively for the selected games. |
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1 One of the gamers enquired whether or not his computer had sufficient capacity to be used for a specific game.
In the task manager of the computer system the performance of the CPU is indicated with the image below. Answer the questions that follow based on the information in the image.
2.1.1 Briefly explain what 'Threads' refers to in terms of processing when a program is executed. (2)
2.1.2 At the time when the image was captured, the operating system managed 71 active processes. Explain what process management, as executed by the operating system, entails. (2)
2.1.3 The speed of the processor with two cores is 1.58 GHz. Does the presence of two cores mean that tasks will be processed at double the speed of the CPU, that is 3.16 GHz? Explain your answer. (2)
2.1.4 The image indicates the sizes of L1 and L2 cache memory.
2.2 One of the gamers asked your opinion on the upgrading of the hard drive of his computer. He wants you to explain the image below, which was part of an advertisement.
2.2.1 What does the abbreviation SSD stand for? (1)
2.2.2 Explain why the following will be features of an SSD:
2.2.3 All the system software, programs, data and more than one TB of music and videos are saved on the gamer's current hard disk.
He plans to keep the current hard drive and to add an SSD.
Suggest, with reasons, the best way to configure the computer to use the disks optimally. (4)
2.3 Gamers were advised to update the antivirus software on their computers. Why is it necessary to always keep the antivirus software up to date? (2)
2.4 The motherboards of the computers normally used by gamers have high-performance video cards slotted into the expansion slots.
2.4.1 Name the expansion slot provided for a video card. (1)
2.4.2 Explain why most modern laptop computers have a built-in (or integrated) video adaptor as well as a video card. (2)
2.5 The performance of a computer used for gaming is important. When opening the performance window, the following is displayed:
2.5.1 When will the operating system use virtual memory? (1)
2.5.2 Does the availability of virtual memory mean that adding more RAM to the computer system to improve the performance is no longer necessary? Motivate your answer. (2)
TOTAL SECTION B: 25
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
Players who registered for the online gaming event can use any device and can play from any location worldwide. Below is a representation of the different ways communication could take place while playing the games.
3.1 Gamers at the school will link their desktop and laptop computers into a LAN that will be set up in the school hall.
3.1.1 Give TWO reasons why UTP cables will be the most suitable type of cable to connect the computers in the school hall. (2)
3.1.2 Explain why the school LAN would require both a router and a switch by referring to the function of each device. (3)
3.1.3 Explain the purpose of TCP/IP in a LAN setup. (2)
3.2 Different types of communication will take place using different types of media during the gaming event.
3.2.1 What type of network would use a 3G modem? (1)
3.2.2 One of the media types used for wireless communication in networks is radio waves. Name TWO other types of wireless media used in networks. (2)
3.3 Gamers will be required to locate at least one Pokémon at some stage during the gaming event. To take part in the Pokémon GO location-based augmented reality game, a mobile device with GPS technology is required.
3.3.1 What does the abbreviation GPS stand for? (1)
3.3.2 Briefly explain how a GPS can determine your physical position. (2)
3.4 Online media stores, like iTunes and Amazon, that provide the facility of media repositories, will be used to play music in the school hall during the event.
3.4.1 Explain what a media repository is in this context. (2)
3.4.2 Why is it acceptable to use this type of repository for music files, but not for video files? (2)
3.5 The IT learners have been tasked to investigate RIA as a possible feedback mechanism to evaluate the success of the event.
3.5.1 Briefly describe what an RIA is. (2)
3.5.2 Give ONE example of a well-known RIA. (1)
TOTAL SECTION C: 20
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
A database will be used to store the details of the participants and to keep a record of the games played.
The following tables have been designed for the database:
tblPlayers | ||
Key | FieldName | DataType |
PlayerID | Text | |
PName | Text | |
PSurname | Text |
tblGames | ||
Key | FieldName | DataType |
GameID | Text | |
GameTitle | Text | |
GameMaker | Text |
tblGamesPlayed | |||
Key | FieldName | DataType | Description |
GameNumber | Number | A unique number allocated for each game played in sequence starting from 1 | |
GameID | Text | The ID of the game that was played | |
PlayerID | Text | The ID of the player who played the game | |
TimePlayed | Date/Time | The starting time of the game | |
Score | Number | The score the player obtained for the game |
Example of data from the tblPlayers table:
PlayerID | PName | PSurname |
X782 | Yeng | Xu |
D901 | Marilyn | Fredriks |
F566 | Loyiso | Nkosi |
G639 | Lenny | Govender |
Example of data from the tblGames table:
GameID | GameTitle | GameMaker |
G101 | Arche Adventure | Lee Andrew |
G102 | 3D Electro Sim | Kernal Yen |
G103 | Car frenzy | Ney Abramo |
G104 | Shadow Impact | Jian Shume |
Example of data from the tblGamesPlayed table:
GameNumber | GameID | PlayerID | TimePlayed | Score |
1 | G102 | D901 | 09:45 | 156 |
2 | G104 | X782 | 10:06 | 567 |
3 | G102 | F566 | 12:57 | 233 |
4 | G103 | X782 | 13:23 | 134 |
4.1
4.1.1 What is the term given to the GameID field in the tblGamesPlayed table? (1)
4.1.2 How many games will each player be able to play per day based on the construction of the database? Choose the answer from the options (A–C) provided below.
4.1.3 The following message is displayed when attempting to delete the player with PlayerID F566 from the tblPlayers table:
4.2 Write SQL statements for EACH of the following queries, using the tables provided:
4.2.1 Display all details of the games played from 12:00 to 15:00. (4)
4.2.2 The scores for games with GameID G103 were processed incorrectly. All scores for records with this GameID must be increased by 15%. (4)
4.3 The following SQL statements were given to the administrator to interpret:
4.3.1 Explain what will be the output of the following SQL statement:
SELECT GameID, MAX(Score) as Maximum
FROM tblGamesPlayed
Group by GameID
Order by Max(Score) DESC (3)
4.3.2 Write down the output of the SQL statement given below, using the tblPlayers table and the first record from tblGamesPlayed table.
SELECT GameNumber, Left(PName,1) & Left(PSurname,1) & Right(PSurname,1) & "-" & Score AS Reference
FROM tblPlayers, tblGamesPlayed
WHERE tblPlayers.PlayerID = tblGamesPlayed.PlayerID (4)
4.4 It has been suggested that an ID number field and a date of birth field should be included in the tblPlayers table. Explain why adding the suggested fields to the tblPlayers table will result in data redundancy. (2)
4.5 The school needs to take measures to ensure that the player and game information stored in the database will not be compromised. State TWO ways of preventing an SQL injection attack on the database by hackers. (2)
TOTAL SECTION D: 25
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
The IT learners will write application programs to assist with organising the gaming event and processing information.
5.1 The following data structures can be used in the application programs:
Which ONE of the data structures above will be the most suitable to use in EACH of the following cases?
NOTE: Each data structure from the list above can be used once only as an answer.
5.1.1 A large amount of data about the participants needs to be saved to be used at a later stage. (1)
5.1.2 An alphabetically-sorted list of names of the organisers is required. (1)
5.1.3 The scores of participants need to be stored in rows and columns. (1)
5.1.4 Find the name of the player who achieved the highest score. (1)
5.2 Two object classes need to be designed: one for the players and one for the games.
5.2.1 Object-orientated programming uses encapsulation. Give the definition of encapsulation. (2)
5.2.2 State TWO advantages of using object-orientated programming when multiple developers are involved in coding an application. (2)
5.2.3 Indicate whether the following statements about object-orientated programming are TRUE or FALSE. Write down only 'true' or 'false' next to the question number (5.2.3(a) and 5.2.3(b)).
5.3 In one of the games played, the user needs to enter the number of rows of a figure. The figure is made up of a sequential list of numbers starting from the value of 1 and must contain the number of rows that was entered. Each row in the figure will have 2 x (row number) – 1 number of numbers.
Example of output if the value of 5 has been entered.
Write a solution to the problem in the form of pseudocode.
NOTE:
5.4 Another part of the game requires that a random number in the range of 4 to 50 be generated. Determine whether the number generated randomly is a perfect number, or not.
NOTE: A perfect number is when the number is equal to the sum of the factors of the number, excluding the number itself.
Example:
The number 6 was randomly generated.
The sum of the factors of 6, excluding 6, is: 1 + 2 + 3 = 6
The number 6 is therefore a perfect number.
The following pseudocode was given to solve the problem:
Row Instruction |
|
5.4.1 Use the following headings and complete the trace table with the number 4 as the randomly generated number. Show EACH step of your trace.
number | sum | Loop index | number modulus index = 0? | number = sum? | Display |
4 |
(5)
5.4.2 One of the players presented an alternative solution. The suggestion is that line 3 of the solution should read as follows:
3. Loop index from 1 to num
In order to display the same results as in QUESTION 5.4.1, one other line in the pseudocode would need to be changed as well.
Indicate the line number and the edited contents of this line to provide the same output as the given solution. (2)
TOTAL SECTION E: 27
SECTION F: INTEGRATED SCENARIO
QUESTION 6
The school will host a website and be a part of a social network to allow for players to register and to play games online. |
6.1 One of the players sent an e-mail with the following e-mail address to the organisers:
This email address is being protected from spambots. You need JavaScript enabled to view it.
6.1.1 State the domain name of the e-mail. (1)
6.1.2 Name the e-mail recipients below that will not be disclosed in the e-mail to others. (1)
6.1.3 What is the general name of malware that refers to the forging of an e-mail header, so that the e-mail appears to originate from a different source? (1)
6.2 The host school has a website with SSL where participants can register and make the required payments.
6.2.1 Explain what SSL is. (2)
6.2.2 A digital certificate will be accessible to the browser to verify the website from which the school wants to download the game. State TWO pieces of information that can be found on a digital certificate. (2)
6.3 The games administrator wants to archive certain files on the server to free up disk space.
6.3.1 Explain what is meant by archiving files. (2)
6.3.2 Will more disk space be saved if archived files are moved from a physical server to a virtual server? Motivate your answer. (2)
6.4 At a previous gaming event gamers complained that too much bandwidth was used while streaming games.
6.4.1 For the current gaming event gamers were informed that they can configure the settings on their computers to optimise game play. Explain what can be done to save bandwidth while streaming. (1)
6.4.2 The gamers want to restrict the websites that can be accessed in order to reduce network traffic. Explain how a firewall could be used for this purpose. (2)
6.4.3 Why is it usually quicker to use BitTorrent protocol to download a file rather than downloading the file directly from a server? (2)
6.4.4 Someone mentioned that BitTorrent protocol should be avoided as it is illegal to use. Is this statement true? Motivate your answer. (2)
6.5 The IT learners will make gamers aware of the NFC (near field communication) feature that is available on their tablets and other hand-held devices.
6.5.1 Explain what near field communication (NFC) means. (2)
6.5.2 NFC originated from a communication standard that uses radio waves. What is this communication standard called? (1)
6.6 Separate versions of some of the gaming software applications have been developed to provide for different operating systems, such as Android and IOS.
6.6.1 Motivate why the same application needs to be programmed differently for different operating systems. (2)
6.6.2 An important feature of an operating system is backward compatibility. Use an example to explain the concept of backward compatibility. (2)
6.7 During an interview with the author of one of the games, the response to a question on the features of a successful online game was as follows:
'Scalability, fast response time, security and low cost to set up'
6.7.1 Why is scalability important when designing online games? (2)
6.7.2 Why will security be a challenge for a peer-to-peer network? (1)
6.8 'The "app-ification" of the Web' has seen many well-known websites developing apps that people can use to access the information on their websites.
6.8.1 Briefly explain what an app is. (1)
6.8.2 Give TWO reasons why gamers wanting to register for the gaming event might prefer to use an app instead of the website. (2)
6.9 One of the gamers will use the headset in the illustration below.
[Source: http://www.bestbuy.com/site/ video-games-accessories/gaming-headset]
6.9.1 Many of these types of devices contain firmware. Explain what firmware is. (2)
6.9.2
6.9.3 These types of devices normally contain sensors. Name TWO possible types of sensors found on gaming devices. (2)
6.9.4 What is the field called when a computer system simulates human decision-making and reacts on the basis of input gained from sensors? (1)
TOTAL SECTION F: 38
GRAND TOTAL: 150
INFORMATION TECHNOLOGY
PAPER 2
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
SECTION A: SHORT QUESTIONS
QUESTION 1
1.1
1.1.1 D ✔ (1)
1.1.2 B ✔ (1)
1.1.3 C ✔ (1)
1.1.4 A ✔ (1)
1.1.5 C ✔ (1)
1.1.6 B ✔ (1)
1.1.7 B ✔ (1)
1.1.8 A ✔ (1)
1.1.9 D ✔ (1)
1.1.10 D ✔ (1)
1.2
1.2.1 Creative Commons License ✔
1.2.2 World Wide Web consortium (W3C) ✔ (1)
1.2.3 Click farms ✔ (1)
1.2.4 Overclocking ✔ (1)
1.2.5 Robotics ✔ (1)
TOTAL SECTION A: 15
SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1
2.1.1 Threads are part of the same program ✔ that runs simultaneously and independently. ✔ (2)
2.1.2 Process management is the task of making sure that each process gets enough CPU time and access to memory, storage and other hardware so that it can work without interfering with, or being interfered with, by other processes.
Concepts:
2.1.3 No ✔
2.1.4
2.2
2.2.1 Solid state drive ✔ (1)
2.2.2
2.2.3 Set up the SSD as the system/primary drive on which the operating system ✔is installed for faster boot up and system performance. ✔
Set up the HDD as a secondary drive ✔ which contains all your music/video files. ✔ (4)
2.3 Any TWO ✔✔
2.4
2.4.1 PCI-E expansion slot on the motherboard ✔ (1)
2.4.2 The built-in video card is used when doing routine tasks ✔ because it uses much less power and battery life
The video adapter will be used when programs require high resolution/good graphics✔ (2)
2.5
2.5.1 Any ONE ✔
2.5.2 No, ✔
TOTAL SECTION B: 25
SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
3.1
3.1.1 Any TWO ✔✔
3.1.2
3.1.3
3.2
3.2.1 A cellular network ✔
Also accept: WAN and 4G (1)
3.2.2 Any TWO ✔✔
3.3
3.3.1 Global positioning system ✔ (1)
3.3.2 The GPS will receive signals sent by at least three satellites ✔and triangulate the position ✔using trilateration. (2)
3.4
3.4.1 It is storage space in the cloud ✔ to which you are given access once you purchased the media. ✔ (2)
3.4.2 High bandwidth ✔and a lot of data are required to watch movies online ✔ (2)
3.5
3.5.1 A Rich Internet Application is a web application ✔ that is designed to deliver the functions and features of a traditional desktop application. ✔ (2)
3.5.2 Any ONE ✔
SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1
4.1.1 Foreign key ✔ (1)
4.1.2 Answer C – any number of games per day ✔ (1)
4.1.3
4.2
4.2.1 SELECT * FROM tblGames WHERE TimePlayed >= #12:00# AND TimePlayed <= #15:00#
4.2.2 UPDATE tblGamesPlayed SET Score = Score * 1.15 WHERE GameID = "G103"
4.3
4.3.1 The highest score ✔ achieved for each game ✔ sorted from highest to lowest according to the score ✔ (3)
4.3.2
4.4 We only need the IDNumber field since the date of birth can be derived ✔ from the first six digits of the IDNumber field. ✔ (2)
4.5 Any TWO ✔✔
TOTAL SECTION D: 25
SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1
5.1.1 Text file ✔ (1)
5.1.2 One-dimensional array ✔ (1)
5.1.3 Two-dimensional array ✔ (1)
5.1.4 Variable ✔ (1)
5.2
5.2.1 Restricting access to a class's attributes ✔ by declaring the attributes as private ✔ (2)
5.2.2 Any TWO ✔✔
5.2.3
5.3
Counter ? 1 ✔
NumberOfRows? input from keyboard ✔ Any order
Loop K from 1 to NumberOfRows ✔
RowLine ? "" ✔
Loop L from 1 ✔ to 2 * K – 1 ✔
RowLine ? RowLine ✔+ Counter + " " ✔ Must be in this order
Increment (Counter) ✔
Display RowLine ✔ (10)
5.4
5.4.1 (5)
Also accept Yes for True and No for False
5.4.2 Line 6: ✔ If number = sum – number ✔ (2)
TOTAL SECTION E: 27
SECTION F: INTEGRATED SCENARIO
QUESTION 6
6.1
6.1.1 windermere.co.za ✔ (1)
6.1.2 Marlene Heyns and Kerry Mansen ✔ (1)
6.1.3 Spoofing ✔ (1)
6.2
6.2.1 Secure Sockets Layer is an encryption protocol ✔ for managing the transmission of sensitive data over the Internet. ✔ (2)
6.2.2 Any TWO ✔✔
6.3
6.3.1 Files are compressed on the same disk ✔ and the original file is deleted thereby creating space. ✔
OR
Old/unused files are usually moved to a secondary storage device (other computer/hard drive dedicated for this purpose
Concepts:
6.3.2 No, ✔
NOTE:
The first mark is only awarded if the justification is correct. (2)
6.4
6.4.1 Any ONE ✔
6.4.2 A firewall could be configured to allow specific/authorised ✔ incoming/outgoing traffic. ✔
Also accept
6.4.3 With BitTorrent parts of the file ✔are downloaded from multiple clients. ✔ (2)
6.4.4 No, BitTorrent itself is merely a file sharing protocol ✔ and is not illegal to use however the user must guard against downloading illegal software. ✔ (2)
6.5
6.5.1 NFC is a set of communication standards which allow peer-to-peer data exchanges ✔ between two closely held end points. ✔ (2)
6.5.2 RFID (Radio Frequency Identification) ✔ (1)
6.6
6.6.1 Each Operating system uses different architectures✔ and has different ways of interfacing with software ✔so a different 'version' has to be written for each OS platform. (2)
6.6.2 An example would be if a game was installed using Windows 7 ✔ it must still work if the operating system was updated to Windows 8 or Windows 10. ✔ (2)
6.7
6.7.1 The ability of the server to access more resources when required ✔ and to decrease the use when no longer required so that the game does not hang/stop when many users ✔ are playing.
Concepts:
6.7.2 The data does not pass through any central point. ✔ (1)
6.8
6.8.1 Apps are programs designed to run on mobile devices. ✔ (1)
6.8.2 Any TWO ✔✔
6.9
6.9.1 Software ✔ that is permanently installed ✔ on a ROM chip. (2)
6.9.2
6.9.3 Any TWO ✔✔
6.9.4 Artificial Intelligence ✔ (1)
TOTAL SECTION F: 38
GRAND TOTAL: 150
INFORMATION TECHNOLOGY
PAPER 1
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
GENERAL INFORMATION:
ANNEXURE A:
SECTION A:
QUESTION 1: MARKING GRID- GENERAL PROGRAMMING SKILLS
CENTRE NUMBER: | EXAMINATION NUMBER: | |||
QUESTION | DESCRIPTION | MAX. MARKS | LEARNER'S MARKS | |
A learner must be penalised only once if the same error is repeated. | ||||
1.1 | Button - [Question 1_1] Extract name and surname from textbox✔ Extract ID number✔ If nameSurname string includes a space✔ AND ID number is not empty✔ AND ID number has 13 digits ✔ | 14 | ||
1.2 | Buttons with Icons showing type of Loyalty card | 6 |
1.3 | Button - [Question 1_3] | 15 | LEARNER'S MARKS |
1.4 | Button - [Question 1_4] Part 2: Part 1 ✔ | 13 | |
TOTAL: | 48 |
ANNEXURE B:
SECTION B
QUESTION 2: MARKING GRID - OBJECT-ORIENTED PROGRAMMING
CENTRE NUMBER: | EXAMINATION NUMBER: | |||
QUESTION | DESCRIPTION | MAX. MARKS | LEARNER'S MARKS | |
2.1.1 | Constructor: | 5 | ||
2.1.2 | Mutator method: | 2 | ||
2.1.3 | increaseLoyaltyPoints method: | 5 | ||
2.1.4 | updateHealthLevel method: | 7 |
2.1.5 | isCorrect method: (Method definition provided) Loop through the digits in the ID number ✔ remove the 0 digits ✔ from the string Initialise variable for sum✔ If even number of digits left in string ✔ Loop correct number of times ✔ Add values with 2 digits to sum variable from left hand side of string ✔ If odd number of digits left in string ✔ Add first left hand side digit from string as a one digit value to sum✔ Loop correct number of times ✔ Add two-digits values to sum variable ✔ If sum is equal to access code parameter ✔ return true✔ else return false✔ | 13 | LEARNER'S MARKS |
2.1.6 | identifyStarShopper method: Empty string variable - if not Star shopper ✔ If (loyalty points > 2000✔ AND number of visits > 10)✔ OR✔ (healthLevel is 'P') ✔ Set variable to string 'STAR shopper'✔ Return string variable | 6 |
QUESTION 2: MARKING GRID – continued
2.2.1 | Button – [2.2.1 – Check access code] Extract the card number from the combo box✔ Extract cellphone number from label ✔ Extract access code from text box ✔ Extract loyalty points from label and convert to integer✔ Instantiate object ✔ sending correct arguments in correct order✔ (6) If access code is correct Test if access code is correct ✔ using isCorrect method ✔ Read text file and process data {Delphi: AssignFile, Reset and CloseFile Java: Create object to read from file} ✔ Initialise variables for counters and sum ✔ Loop through file ✔ Read card number ✔ Read total amount spent and convert to double data type ✔ Read health amount spent and convert to double ✔ Test if it is correct card number ✔ Add total amount to sumTotal ✔ Add health amount to sumHealth ✔ Increment counter ✔ Call setVisits method ✔ Call increaseLoyaltyPoints method – send sumTotal as argument ✔ Call updateHealthLevel method – send sumTotal and sumHealth as arguments ✔ end loop Enable button for Q2.2.2 ✔ If access code is NOT correct Display message indicating that access code was incorrect ✔ Clear the access code text box ✔ (18) | 24 | LEARNER'S MARKS |
2.2.2 | Button – [2.2.2 - Display card holder details] Display object details using toString ✔ in the output area ✔ Display shopper status using identifyStarShopper method ✔ | 3 | |
TOTAL: | 65 |
ANNEXURE C:
SECTION C
QUESTION 3: MARKING GRID – PROBLEM SOLVING
CENTRE NUMBER: | EXAMINATION NUMBER: | |||
QUESTION | DESCRIPTION | MAX. MARKS | LEARNER'S MARKS | |
3.1 | Button [3.1 – Display layout] Outer loop for rows ✔ Inner loop for columns ✔ Display symbol from two dimensional array ✔ In row ✔ and in column ✔ | 5 | ||
3.2 | Combo box – Select Restaurants Extract shop as character from combo box ✔ Initialise variables for position (row and column ✔) Loop through the rows ✔ If the shop is within characters A-E (to the left)✔ Set col for shop to 0 (first column) ✔ Set col for friend to 1 (second column) ✔ If the shop is within characters F-J (to the right) ✔ Set col for shop to last col of arrMall ✔ Set col for friend to one less than col for shop ✔ Test if character at current position in array ✔ equals selected shop's character ✔ Replace X with # ✔ Update display ✔ End loop | 13 | ||
3.3 | Button [3.3 - Locate nearest friend(s)] Initialise nearest distance to a large value✔ Outer loop for rows ✔ Inner loop for columns/if for right hand side ✔ If character at position is # ✔ Determine difference in row positions ✔ as positive value ✔ Determine difference in column positions✔ as positive value ✔ Calculate newDistance ✔ If friend is in A-E or display shop name ✔ If friend is in F-J ✔ display shop name ✔ If newDistance < = nearest distance ✔ Add shop name to output message ✔ Replace nearest with newDistance ✔ Displayshop name ✔ and distance * 4.5 ✔ Display output message indicating nearest friends ✔ | 19 | ||
TOTAL: | 37 |
SUMMARY OF LEARNER'S MARKS:
CENTRE NUMBER: | EXAMINATION NUMBER: | |||
SECTION A | SECTION B | SECTION C | ||
QUESTION 1 | QUESTION 2 | QUESTION 3 | GRAND TOTAL | |
MAX. MARKS | 48 | 65 | 37 | 150 |
LEARNER'S MARKS |
HOSPITALITY STUDIES
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
SECTION A
QUESTION 1
1.1 MULTIPLE-CHOICE QUESTIONS
Various options are provided as possible answers to the following questions. Write down the question number (1.1.1–1.1.10), choose the answer and make a cross (X) over the letter (A–D) of your choice in the ANSWER BOOK.
EXAMPLE:
1.1.11 A good source of vitamin C is …
1.1.11
1.1.1 E-mails, websites and cellphones used to market products are … marketing tools.
1.1.2 A grape variety used to make wine:
1.1.3 An enzyme in raw pineapple that prevents a gelatin mixture from setting:
1.1.4 A pizza provides eight portions. The total cost of the pizza is R72,00. The cost of ONE portion is …
1.1.5 When a person suffers from diabetes, it means that the body does not produce enough …
1.1.6 A flavouring used in the preparation of desserts, which is made from cocoa beans:
1.1.7 The difference between the actual cost to produce an item and the money that it is sold for:
1.1.8 A method where meat is covered with thin slices of fat:
1.1.9 … includes activities that ensure that prospective guests are aware of the types of accommodation available at an establishment.
1.1.10 Choux pastry filled with cream and stacked together with caramel is called …
1.2 MATCHING ITEMS
Choose the description from COLUMN B that matches the terminology in COLUMN A. Write only the letter (A–I) next to the question number (1.2.1–1.2.6) in the ANSWER BOOK, for example 1.2.7 J.
COLUMN A TERMINOLOGY | COLUMN B DESCRIPTION |
1.2.1 Dusting |
(6 x 1) (6) |
1.3 ONE-WORD ITEMS
Give ONE term/word for each of the following descriptions. Write only the term/word next to the question number (1.3.1–1.3.10) in the ANSWER BOOK.
1.3.1 Wine of which the alcohol has been removed before it is bottled
1.3.2 A sweet wine that is served after a meal
1.3.3 The Act that regulates the sale of alcohol
1.3.4 The term that refers to pastry shells that are pre-baked with rice or dried beans
1.3.5 Advertising a product by phoning potential customers
1.3.6 Fat distributed between the muscle fibres of a meat cut
1.3.7 A traditional sauce served with roast beef
1.3.8 Rice rolled with cooked seafood or raw fish, wrapped in seaweed sheets
1.3.9 A mixture of chopped fruit or vegetables, flavoured with spices, sugar and vinegar and cooked to a thick pulp
1.3.10 Legumes used to make textured vegetable proteins (10)
1.4 SELECTION
1.4.1 Identify TWO items that are included in overheads:
1.4.2 Identify TWO steaks cut from the fillet:
1.5 MATCHING ITEMS
Choose a description from COLUMN B that matches a dessert in COLUMN A and then match it with an example in COLUMN C. Write only the letter (A–G) and number (i–vii) next to the question number (1.5.1–1.5.5) in the ANSWER BOOK, for example 1.5.6 H (viii).
COLUMN A | COLUMN B | COLUMN C |
1.5.1 Starch-based milk dessert | A fruit dipped in a batter and shallow fried | (i) vacherin |
1.5.2 Baked custard | B several layers of ice cream moulded in a dome shape | (ii) bavarois |
1.5.3 Frozen dessert | C starch boiled with milk, placed in a pie dish, dotted with butter and baked in the oven | (iii) crème brulée |
1.5.4 Meringue | D rich egg custard topped with a crust of caramelised sugar and served in the mould | (iv) bombe |
1.5.5 Moulded cold custard | E whisked egg white added to a confectioner's custard base and baked in a bain-marie | (v) sago pudding |
F whisked egg white and sugar baked into a hard basket shape to hold whipped cream | (vi) crème pâtissiére | |
G custard base with gelatin and whipped cream, poured into a mould and chilled to set | (vii) malva pudding (5 x 2) (10) |
TOTAL SECTION A: 40
SECTION B: KITCHEN AND RESTAURANT OPERATIONS;
HYGIENE, SAFETY AND SECURITY
QUESTION 2
2.1 Study the statement below and answer the questions that follow.
Gastro-enteritis and TB are two of the reasons for the high rate of absenteeism in the food and beverage industry in South Africa. |
2.1.1 What is the incubation period for gastro-enteritis? (1)
2.1.2 Explain how a food handler may prevent gastro-enteritis from affecting others in the workplace. (5)
2.1.3 State THREE symptoms of each of the following:
2.2 Study the statement below and answer the questions that follow.
Good service differs from one restaurant to the next. |
2.2.1 Define the term good service. (2)
2.2.2 Critically discuss the statement above. (3)
2.3 A restaurant manager considers buying the system below. Study the photograph and answer the questions that follow.
2.3.1 Identify the type of system. (1)
2.3.2 Explain TWO benefits of the system above. (2)
TOTAL SECTION B: 20
SECTION C: NUTRITION AND MENU PLANNING;
FOOD COMMODITIES
QUESTION 3
3.1 Read the extract below and answer the questions that follow.
A variety of fresh and preserved cherry products are displayed at the annual Cherry Festival in Ficksburg. |
3.1.1 Name TWO methods that can be used to preserve excess cherries other than bottling. (2) |
3.1.2 Discuss step by step how you would prepare bottled cherries. (4)
The following information about a dinner held for 100 guests at the Cherry Festival was given to the organisers: Selling price of the menu: R10 000 |
3.2
3.2.1 Calculate the total net profit. (3)
3.2.2 Calculate the cost for each guest. (3)
3.2.3 Suggest FOUR important aspects that the organisers of the dinner should include on their quotation. (4)
3.3 Study the method of preparing choux pastry below and answer the questions that follow.
Method:
|
3.3.1 Give reasons for the following steps:
3.3.2 Suggest TWO toppings that may be used as decoration for the choux pastry. (2)
3.3.3 Predict the end result if the water had been boiled for too long during the preparation of the choux pastry. (2)
3.4 Differentiate between a pollo-vegetarian and a pesco-vegetarian. (4)
3.5 Give reasons for EACH of the following statements:
3.5.1 White and red speckled beans should be cooked separately. (1)
3.5.2 Do not boil dried beans without soaking. (1)
3.6 Read the extract below and answer the questions that follow.
You are planning a cocktail function for your parents' anniversary. The function will last for two hours. |
3.6.1 Determine the number of snacks to be served per person. (1)
3.6.2 Describe FOUR guidelines to follow when preparing the cocktail snacks. (4)
3.6.3 Evaluate the suitability of serving sticky ribs at the cocktail function. (3)
3.6.4 Recommend THREE sweet bite-size cocktail snacks that you may include on the menu. (3)
[40]
QUESTION 4
4.1 Study the photograph of stewed lamb shanks below and answer the questions that follow.
4.1.1 Distinguish between the characteristics of raw lamb and raw beef. (4)
4.1.2 Explain why stewing is a suitable cooking method to prepare the lamb shanks. (2)
4.1.3 Suggest a suitable accompaniment for the stewed lamb shanks. (1)
4.2 Read the extract below and answer the questions that follow.
The Savera Hotel has a kosher kitchen. The hotel has been requested to host a banquet for 100 Jewish guests. |
4.2.1 Define the term banquet. (2)
4.2.2 Name TWO departments that would be required to plan and prepare for the banquet. (2)
4.2.3 Discuss THREE requirements to consider when planning the banquet menu for the Jewish guests. (3)
4.2.4 Determine the number of waiters you will need for the function. (1)
4.3 Study the photograph of a vol-au-vent below and answer the questions that follow.
4.3.1 Identify the pastry used to make the vol-au-vent. (1)
4.3.2 State the functions of the following ingredients in the preparation of the pastry above:
4.3.3 Suggest TWO savoury fillings that may be used in the vol-au-vent. (2)
4.3.4 What are the characteristics of a successful vol-au-vent? (3)
4.4
4.4.1 Name TWO types of gelatin. (2)
4.4.2 Predict the results of the following when preparing a gelatin dish:
4.5 Study the photograph of the Christmas pudding below and answer the questions that follow.
4.5.1 Describe the technique for cooking the dessert above. (2)
4.5.2 Explain how the dessert above may be presented. (2)
4.5.3 Recommend TWO suitable sauces for this dessert. (2)
4.6 Good nutrition is vitally important for HIV positive people. Justify the statement above. (4)
[40]
TOTAL SECTION C: 80
SECTION D: SECTORS AND CAREERS;
FOOD AND BEVERAGE SERVICE
QUESTION 5
5.1 Study the advertisement below and answer the questions that follow.
5.1.1 Name THREE aspects that will determine the target market for the Springbok Game Lodge. (3)
5.1.2 Determine whether promotion was used as a marketing strategy and give a reason for the answer. (2)
5.1.3 Name ONE disadvantage of using promotion as part of your marketing mix. (1)
5.1.4 Describe TWO requirements of the packaging of the snacks. (2)
5.1.5 Identify FOUR aspects that the Springbok Game Lodge could have included in their business description. (4)
5.1.6 Explain how the Springbok Game Lodge may contribute to job creation and give TWO examples. (4)
5.2
5.2.1 Classify the terms below into revenue and non-revenue-generating areas in the hospitality industry.
finance; bars; security; food and beverage; maintenance; guest rooms |
Tabulate your answer as follows:
REVENUE-GENERATING AREAS | NON-REVENUE GENERATING AREAS |
(6)
5.2.2 Explain the interrelationship between sales and marketing and the finance department. (2)
5.2.3 Identify THREE duties of the security staff. (3)
5.2.4 Name THREE entrepreneurial opportunities that may be found in the beverage sector. (3)
[30]
QUESTION 6
6.1 Study the photographs below and answer the questions that follow.
| ![]() |
A | B |
TABLE CLOTH | RED WINE GLASS |
6.1.1 Define the term opening mise-en-place. (2)
6.1.2 Identify the opening mise-en-place that should be checked for the table cloth in A. (3)
6.1.3 Explain the procedure that should be followed when cleaning the glass in B. (3)
6.1.4 Determine the suitability of serving a glass of Chardonnay with a fish starter. (2)
6.1.5 Discuss the correct position of the glass above on a cover. (3)
6.1.6 Explain how red wine bottles should be stored. (4)
6.2
6.2.1 Differentiate between on-consumption and off-consumption liquor licenses. Tabulate your answer as follows:
ON-CONSUMPTION | OFF-CONSUMPTION |
(4)
6.2.2 Discuss the procedure that should be followed for plated service. (3)
6.2.3 Motivate the use of plated service for a formal dinner. (3)
6.3 The walk-in refrigerator at a local game lodge reaches 22 °C. Determine the impact of this situation on the game lodge. (3)
[30]
TOTAL SECTION D: 60
GRAND TOTAL: 200
HOSPITALITY STUDIES
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
SECTION A
QUESTION 1
1.1 MULTIPLE-CHOICE QUESTIONS
1.1.1 | C√ |
1.1.2 | A√ |
1.1.3 | B√ |
1.1.4 | A√ |
1.1.5 | D√ |
1.1.6 | C√ |
1.1.7 | A√ |
1.1.8 | D√ |
1.1.9 | B√ |
1.1.10 | A√ |
(10)
1.2 MATCHING ITEMS
1.2.1 | I√ |
1.2.2 | F√ |
1.2.3 | A√ |
1.2.4 | B√ |
1.2.5 | C√ |
1.2.6 | G√ |
(6)
1.3 ONE-WORD ITEMS
1.3.1 | De-alcoholised√ |
1.3.2 | Hanepoot√/Jeripigo√/Muscadel√ |
1.3.3 | Liquor Act√ |
1.3.4 | Baking blind√ |
1.3.5 | Tele-marketing√ |
1.5.6 | Marbling √ |
1.3.7 | Horseradish/gravy/jus√ |
1.3.8 | Sushi√ |
1.3.9 | Chutney√ |
1.3.10 | Soya√ |
(10)
1.4 SELECTION
1.4.1 | A √D√ |
1.4.2 | B√ C√ |
(4)
1.5. MATCHING ITEMS
1.5.1 | C√ (v) √ |
1.5.2 | D √ (iii) √ |
1.5.3 | B√ (iv) √ |
1.5.4 | F√ (i) √ |
1.5.5 | G√ (ii) √ |
(10)
TOTAL SECTION A: 40
SECTION B: KITCHEN AND RESTAURANT OPERATIONS. HYGIENE, SAFETY AND SECURITY
QUESTION 2
2.1
2.1.1 24–48 hours√ (1)
2.1.2
2.1.3
2.2
2.2.1 Good service is meeting customers’ needs timely√, by professional people√ in a pleasant environment√/in the way they want and expect them to be met√ (Any 2) (2)
2.2.2
2.3
2.3.1 Point of sale system (POS)√ (1)
2.3.2 The system will assist restaurant employees to complete their daily tasks that include : food and beverage orders,√ communication of tasks to the kitchen√, guest bill settlement√, credit card processing√, and charges posted to guest accounts in the hotel√ (Any 2) (2)
TOTAL SECTION B: 20
SECTION C: NUTRITION:
MENU PLANNING AND FOOD COMMODITIES
QUESTION 3
3.1
3.1.1
3.1.2
3.2
3.2.1 Net profit: selling price-total cost (food cost + overhead cost)√
3.2.2 Cost per person= Selling price/number of people
3.2.3
3.3
3.3.1
3.3.2
3.3.3 Too much water will evaporate√ resulting in too little steam√ and the final product will be reduced in volume√ (Any 2) (2)
3.4 (4)
POLLO VEGETARIAN | PESCO VEGETARIAN |
|
|
3.5
3.5.1 White beans will take on the colour of the red speckled beans√ (1)
3.5.2 It takes longer to cook√, and the beans may break or separate from the skins√ (Any 1) (1)
3.6
3.6.1 3-5 cocktail snacks√ (1)
3.6.2
3.6.3 Unsuitable√
3.6.4
[40]
QUESTION 4
4.1
4.1.1 (4)
BEEF | LAMB |
Colour: bright red to cherry red√ Texture: smooth, fine and firm√ Fat: creamy or yellow colour √ Bones: Whiter and harder√ (Any 2) |
|
4.1.2
4.1.3
4.2
4.2.1 A banquet is a formal meal to which a group of guests will be invited to celebrate an event, to honour special guests or any other type of special occasion√ (2)
4.2.2
4.2.3
4.2.4 8-10 waiters√ (1)
4.3
4.3.1 Puff pastry√ (1)
4.3.2
4.3.3
4.3.4
4.4
4.4.1
4.4.2
4.5
4.5.1
4.5.2
4.5.3
4.6
4.6.1
[40]
TOTAL SECTION C: 80
SECTION D: FOOD AND BEVERAGE SERVICE
QUESTION 5
5.1
5.1.1. The target market will be determined by:
5.1.2
5.1.3 It is expensive√ because you are getting only one amount for two people√. (1)
5.1.4.
5.1.5
5.1.6 Springbok Game lodge contributes to job creation by:
5.2
5.2.1 (6)
REVENUE GENERATING AREAS | NON-REVENUE GENERATING AREAS |
|
|
5.2.2 These two departments depend on each other because sales and marketing is responsible for making potential customers aware of the products and services that the establishment offers√. They ensure that customers make use of the products and services which provides an income for the business√. The financial department ensures that the income is spent according to the budget and needs of the establishment√. (Any 2) (2)
5.2.3
5.2.4
[30]
QUESTION 6
6.1
6.1.1 Refers to getting equipment (cutlery, crockery) and tablecloths ready before meal is served√./ to put in place√/pre-preparation√ (2)
6.1.2 Check to see if the table cloth is:
6.1.3
6.1.4 Chardonnay is suitable√ because white meat (fish) goes well with white wine√
6.1.5 The red wine glass must be positioned 2.5cm√ from the tip of the main course knife√ and at 45° angle to the left of the white wine glass√ White wine glass first and red wine glass second√ M159 F 52 (2) (Any 3) (3)
6.1.6
6.2
6.2.1 (4)
ON-CONSUMPTION | OFF-CONSUMPTION |
Allows the liquor to be consumed where it is bought√, liquor not taken off the premises√ | Allows liquor to be bought but consumed elsewhere√/ removed from premises√ |
6.2.2 In plated service food is plated directly onto individual plates√ in the kitchen or at a service point√ and then served to customers√ on the right hand side√ (3)
6.2.3
6.3
TOTAL SECTION D: 60
GRAND TOTAL: 200
ENGINEERING GRAPHICS AND DESIGN
PAPER 1
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
ENGINEERING GRAPHICS AND DESIGN
PAPER 2
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017
INSTRUCTIONS AND INFORMATION
ENGINEERING GRAPHICS AND DESIGN
PAPER 2
GRADE 12
NSC PAST PAPERS AND MEMOS
FEBRUARY/MARCH 2017