INFORMATION TECHNOLOGY PAPER 2
GRADE 12
NATIONAL SENIOR CERTIFICATE EXAMINATIONS
MAY/JUNE 2019

INSTRUCTIONS AND INFORMATION

  1. This question paper consists of SIX sections:
    SECTION A: Short Questions (16)
    SECTION B: Systems Technologies (24)
    SECTION C: Communication and Network Technologies (22)
    SECTION D: Data and Information Management (23)
    SECTION E: Solution Development (25)
    SECTION F: Integrated Scenario (40)
  2. Answer ALL the questions.
  3. Read ALL the questions carefully.
  4. The mark allocation generally gives an indication of the number of facts/reasons required.
  5. Number the answers correctly according to the numbering system used in this question paper.
  6. Write neatly and legibly.

SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A to D) next to the question numbers (1.1.1 to 1.1.3 and 1.2.1 to 1.2.2) in the ANSWER BOOK, e.g. 1.1.4 D.
1.1
1.1.1 The most common protocol used to send e-mail is known as …

  1. POP3
  2. FTP
  3. SMTP
  4. VoIP (1)

1.1.2 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?

  1. Digital certificate
  2. Digital fingerprint
  3. Digital handshake
  4. Digital signature (1)

1.1.3 Which ONE of the following refers to a data structure that is non-volatile?

  1. String
  2. One-dimensional array
  3. Two-dimensional array
  4. Text file (1)

1.2
1.2.1 The following declaration statements are provided:
var
K : integer;
R : real;
The assignment statements below have been coded:

  1. K := 25 div 4;
  2. K := R + 2;
  3. K := R div 5;
  4. R := 15 mod 4;

Which of the above assignment statements will cause a compilation/ syntax error?

  1. (i) and (iii)
  2. (i) and (iv)
  3. (ii) and (iii)
  4. (ii) and (iv) (2)

1.2.2 Determine the value of sAnswer after the execution of the statements below.
sLine := 'Information Technology is great';
sAnswer := copy(sLine, pos('n',sLine)-1, 4);
Insert('T',sAnswer, 2);

  1. nfo T
  2. ITnfo
  3. nfoT
  4. nTfo (2)

1.3 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question numbers (1.2.1 to 1.2.10) in the ANSWER BOOK.
1.3.1 Web applications designed to deliver the functions and features of a traditional desktop application online. The interface is generated locally by your web browser. (1)
1.3.2 An type of information system that gathers, analyses and presents information for the management, operations and planning levels of an organisation. This helps to make decisions about problems that may be rapidly changing. (1)
1.3.3 Downloaded software that bombards the user with advertisements (1)
1.3.4 A remotely controlled network of zombie computers (1)
1.3.5 A type of memory that stores the BIOS settings (1)
1.3.6 Testing the accuracy of captured data by checking it against the source of the data (1)
1.3.7 Someone who gains unauthorised access to data in order to steal data or someone who makes unauthorised changes to data (1)
1.3.8 Specialised hardware and software designed to be used at till points (1)
1.3.9 E-mail sent to people that advertise products that were not requested (1)
TOTAL SECTION A: 16

SECTION B: SYSTEMS TECHNOLOGIES
QUESTION 2
2.1 Computers have modular designed motherboards.
2.1.1 Give ONE advantage of a modular designed motherboard. (1)
2.1.2 Name ONE component/device that could be plugged into any of the ports in the rear of a standard desktop computer. (1)
2.1.3 What is the purpose of RAM? (1)
2.1.4 Explain what CPU cache memory is and how it impacts the processing speed of a computer. (3)
2.1.5 Explain the concept of multiprocessing. (2)
2.2 The younger generation of computer users often prefer to use mobile devices rather than desktop computers.
2.2.1 Except for mobility, give TWO other reasons why mobile devices may be preferred to desktop computers. (2)
2.2.2 State TWO factors that limit the use of mobile devices. (2)
2.2.3 Give TWO reasons for using an SSD instead of a conventional hard drive in a mobile device. (2)
2.3 The use of cloud applications, such as Google Docs, as well as other types of Software as a Service (SaaS) is popular practice nowadays.
2.3.1 What is a cloud application? (1)
2.3.2 Give TWO reasons for using SaaS instead of standard desktop software. (2)
2.3.3 State ONE disadvantage associated with the use of cloud computing. (1)
2.3.4 Cloud computing relies on virtualisation technologies.
State TWO ways in which virtualisation techniques are used by companies that offer cloud services. (2)
2.4 The library at a school uses an online digital media repository.
2.4.1 What is an online digital media repository? (1)
2.4.2 Give TWO reasons for using a media repository. (2)
2.5 The library at the school wants to implement a backup policy to backup their data.
Give ONE reason why an online backup service is recommended. (1)
TOTAL SECTION B: 24

SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES
QUESTION 3
The diagram below illustrates the network of a small business.
1 1
3.1 The computers in the cabled network are used by all staff members and the WLAN is used by clients.
3.1.1 Give ONE reason why a wireless network is more suitable for the clients. (1)
3.1.2 Give ONE reason why all devices must have a unique IP address. (1)
3.1.3 Give TWO possible reasons why clients using the WLAN could experience slow connection speeds sometimes. (2)
3.2 The LAN in the administration office uses a client-server model and provides internet access.
3.2.1 Name TWO services that can be provided by an ISP besides the connection to the internet. (2)
3.2.2 State TWO benefits of using an ADSL connection. (2)
3.2.3 Explain the function of the switch as part of the LAN. (2)
3.2.4 The LAN to be used by the administration staff uses fibre-optic cables.

  1. What medium is used by fibre-optic cables to transmit signals? (1)
  2. Give TWO reasons why fibre-optic cables will be more suitable for use in a LAN than UTP cables. (2)

3.3 It is a requirement that all computers in the LAN are thin clients and that a UPS be installed for the server.
3.3.1 Explain what a thin client is. (1)
3.3.2 Give TWO reasons why the use of thin clients is often preferred. (2)
3.3.3 What is the purpose of a UPS? (1)
3.4 Some staff members have access to the virtual private network (VPN) of the business.
3.4.1 Give ONE practical example of how the staff can benefit from using the VPN. (1)
3.4.2 Name the technique that is used to maintain the privacy of information during transmission on a VPN. (1)
3.4.3 Give TWO possible reasons why a staff member may encounter problems trying to connect to the VPN. (2)
3.5 The size of an e-service can range from very small to very large.
What is the term used to describe the capability of a system to handle a reduction or a growth of its workload, or its potential to be reduced or enlarged to accommodate a possible reduction or growth of its workload? (1)
TOTAL SECTION C: 22

SECTION D: DATA AND INFORMATION MANAGEMENT
QUESTION 4
4.1 A library uses a relational database to have a record of books that have been borrowed.
4.1.1 Explain what a relational database is. (2)
4.1.2 Explain why record locking is necessary when different staff members are working on the same table in the database. (2)
4.1.3 Besides planning and creating a database, name TWO other tasks that a database administrator has to perform as part of his/her duties. (2)
4.2 The database of the library has two tables: tblStudents and tblBooksBorrowed. The table tblStudents keeps record of the students who use the services of the library. The table tblBooksBorrowed keeps record of the books borrowed by a student.
The relationship between the tables is given below.
2 2
4.2.1 The student number in the tblStudents table is the primary key.
Explain what a primary key is in this context. (1)
4.2.2 What is the StudentNumber field in the tblBooksBorrowed table called in terms of the relationship between the tables? (1)
4.2.3 A composite primary key is used in the tblBooksBorrowed table.
What is meant by a composite primary key? (1)
4.2.4 Identify and motivate the specific relationship that exists between the tblStudents and the tblBooksBorrowed tables. (2)
4.2.5 Referential integrity was enforced when the relationship between the tables was created.
Why was this done? (2)
4.2.6 The extract of data below shows some of the records in the two tables.
3 1

  1. Write an SQL statement to display the name, surname and funds available of all the students with R30 or less in their account. (3)
  2. Write an SQL statement to display the student number and number of books borrowed of all the students who have more than two books on loan. The number of books borrowed must be shown in a field called NumberBorrowed. (7)

TOTAL SECTION D: 23

SECTION E: SOLUTION DEVELOPMENT
QUESTION 5
5.1 Give a reason for the use of EACH of the following structures in a Delphi program:
5.1.1 FormCreate event (1)
5.1.2 A WHILE loop instead of a FOR loop (1)
5.1.3 Ord function (1)
5.2 Students can log in on the university's website or portal to access resources.
5.2.1 Below is an incomplete class diagram for an object class that was created to record access to a website.

StudentEntry
 
Attributes 
-fStudentCode(String) 
-fStudentName(String) 
-fDateOfEntry 
-fTimeOfEntry 
 -fLoginNumber(integer)
 
Methods
+Constructor Create
+toString:String
  1. An object's attributes should be encapsulated.
    Define the term encapsulation. (2)
  2. Suggest a suitable data type for the fDateOfEntry attribute. (1)
  3. Define a method that can be added to the class diagram to return the student code of the object. (1)
  4. Define a method that can be added to the class diagram that receives a parameter and changes the login number. (1)
  5. What type of method is the toString method? (1)

5.2.2 The student numbers of at least 1 000 IT students are stored in an array called arrStudNumbers. The final results for the Mathematics module are stored in a parallel array called arrMathResults.
Example of the first five student numbers and results in the respective arrays:
arrStudNumbers

S0001
S0002
S0003
S0004
S0005 


arrMathResults

 89
42 
 91
 65
 58

The following code was used to enter a student number and update the student's result:

1
2
3
4
5
sSearch := InputBox('Search','Enter student number', '0000');
For A := 1 to 1000 do
Begin
If arrStudNumbers[A] = sSearch then
arrMathResults[A] :=
StrToInt(InputBox('Update result',
'Enter updated result for mathematics',
'00'));
End; 
  1. Name the type of search technique used in the code above. (1)
  2. Criticise the program code provided in terms of good and effective programming techniques. (1)
  3. Write pseudo code that uses a more effective search technique that will terminate the search process when the update has been done. (8)

5.3 The following segment of programming code was used to generate a student code:

Line Code
1
2
3
4
5
6
7
8
sName := edtName.Text;
sCode := ''; {empty string}
A := 1;
Repeat
if NOT(Upcase(sName[A]) in ['A','E','I','O','U'])then
sCode := sCode + sName[A];
inc(A, 1);
Until (sName[A] = ' '); {space}
ShowMessage(sCode);

Copy and complete the trace table below to determine the output of this program segment if the name entered into the edit box edtName is 'Mark Simon'.

sName NOT (Upcase (sName[A]) in ['A','E','I','O','U']) sCode A Is sName[A] = ' '?  Display 
Mark Simon    "  1    
  True        
    M      
         
        False  

(6)
TOTAL SECTION E: 25

SECTION F: INTEGRATED SCENARIO
QUESTION 6
The local university is upgrading their library and the ICT infrastructure. The university's website can be used to check timetables and make reservations for access to the research section of the library.
6.1 An AUP document has been compiled for the library. One of the points listed in the document states that, where possible, electronic documents should be used instead of printed documents.
6.1.1 What does the acronym AUP stand for? (1)
6.1.2 Briefly explain the purpose of having an AUP. (2)
6.2 Some of the electronic documents are stored in an online storage facility to facilitate file syncing.
Explain the concept of file syncing. (2)
6.3 The university employed a web designer to redesign the website.
6.3.1 Name TWO skills that a web designer would need when creating a website. (2)
6.3.2 Students can access the website from their mobile devices.
State TWO factors that a web designer must take into consideration when designing websites to be accessible from mobile devices. (2)
6.4 Some students watch videos on their electronic devices as part of research projects. The videos are saved with metadata on an SSD.
6.4.1 What is metadata? (1)
6.4.2 Suggest a suitable format for the compression of videos. (1)
6.5 Schedules for short-course lectures and webinars are displayed on the website.
6.5.1 What is a webinar? (1)
6.5.2 How can the students remain informed of changes in the schedules without visiting the website? (1)
6.6 Some students use open-source operating systems, such as Linux, while others use proprietary systems, such as Microsoft Windows 10.
6.6.1 State THREE functions of an operating system. (3)
6.6.2 Give ONE reason for using a proprietary operating system rather than an open-source operating system. (1)
6.7 The library can use RFID tags embedded in books and RFID scanners at library exits and return points. Stock takes (audits) in a library can be facilitated by the use of mobile RFID rack readers, enabling an inventory to be done on an entire shelf within seconds, without a book being taken off the shelf.
6.7.1 Write out the abbreviation RFID. (1)
6.7.2 Explain the difference between a passive RFID tag and an active RFID tag. (3)
6.7.3 The use of RFID student cards eliminates the need to type in a student number. The card is scanned using an RFID reader.
Give TWO reasons why manual data input (e.g. a person at a keyboard entering data) is one of the least popular data capture methods used today. (2)
6.8 Although e-mail is one of the most popular uses of the internet, users are often frustrated by the lack of netiquette.
What is netiquette? Give an example as part of your answer. (2)
6.9 ICT has revolutionised the way in which people use social media to communicate.
State ONE way in which social networking can impact negatively on cultures around the world. (1)
6.10 University staff want to be sure that information sent over the network will be safe and secure.
6.10.1 Public key encryption will be used to secure the data.

  1. Explain what the term encryption means.(2)
  2. Explain how public key encryption works. (3)

6.10.2 A yellow lock is displayed on the URL bar when the user opens the university's website.
4

  1. What other visual indication is displayed that indicates that the website is secure, besides the yellow lock? (1)
  2. When a user clicks on the yellow lock, the following dialogue box is displayed:
    5
    Which TWO pieces of information on the certificate can be used to verify that the website is legitimate? (2)

6.10.3 Staff members are often warned against social engineering.

  1. Explain what social engineering is.(2)
  2. What is a consequence of falling victim to social engineering?(1)

6.11 Green computing has become a focal point in the ICT field.
6.11.1 Define the term green computing. (1)
6.11.2 Suggest any TWO initiatives for the library to implement green computing. (2)

TOTAL SECTION F:40
GRAND TOTAL:150

Last modified on Tuesday, 28 September 2021 13:07