Grade 10 Information Technology
Grade 10 Information Technology
Grade 10
2 hours
Name:
Instructions:
(b) Describe TWO tasks of EACH of the professionals in part (a). (2 marks)
(c) Elaine soon receives hundreds of emails with strange email addresses and other requests to visit
other websites.
(i) What is the name given to this type of mail? (1 mark)
(ii) Explain TWO security practices that she should consider before responding to these
mails. (4 marks)
(d) Describe TWO measure that can be used to prevent against software attacks on Elaine’s
website. (2 marks)
(e) Users’ data are stored in an online database. Apart from the first and last name, list TWO fields
that should be used to capture data on users who register for Elaine’s recipes.
(2 marks)
(f) Elaine wants to extract some information from the database. Complete the table by selecting the
most suitable database feature from the list below. (4 marks)
(g) A user searches for Elaine’s recipes and locates the following layout:
(d) a hyperlink
2. John Taylor is the systems administrator at St. Joseph’s High School. He has been asked by the principal
to prepare a report that will show the requirements for the computers and other equipment to be purchased
for a new computer lab.
(a) List any FOUR of the MAJOR components that each computer system should have.
(4 marks)
(b) State the function of any ONE of the major components of a computer system. (1 mark)
(c) John intends to create a network that spans the computer lab. State the name of the type of network that
he needs to create. (1 mark)
(d) In preparing his report, John uses the internet to assist him in finding the specifications of computers
best suited for the computer lab.
Discuss any TWO approaches he could use to evaluate the reliability of the information he retrieves.
(6 marks)
The report must include a well-organized spreadsheet outlining all the needs of the lab, and the expected costs
in terms of equipment. The incomplete spreadsheet is shown below.
(ii) Write the text for the formula to be inserted in D3 to calculate the TOTAL cost for student computers.
(2 marks)
(iii) Write the text for the function to be inserted in D13 to calculate the TOTAL expected
costs. (2 marks)
(iv) Write a function that would insert the average cost per unit of an item in cell B15.
(2 marks)
(v) John decides that he wants the rows reorganized so that they are in order of the most
expensive to least expensive. Explain how he could do this using features of the
spreadsheet software. (2 marks)
3. (a) A local area network may be wired or wireless. Jennifer has a small apartment and has decided to set
up a network that will connect all the devices in her home that she uses frequently. These devices are:
• 1 desktop computer
• 1 laptop computer
• 1 android cellphone
• 1 android tablet
• 1 printer
Draw lines that correctly map the devices on the left side of the table to the explanation on the right side of
the table. (5 marks)
(b) Explain ONE advantage and ONE disadvantage of using a wireless network over a wired network.
(4 marks)
(c) State the name of the protocol most commonly used to provide wireless computer networking in a
home or office. (1 mark)
(d) Read the extract below and answer the questions that follow.
State:
(i) THREE formatting features used in the document. (3 marks)
(ii) The number of paragraphs after EACH of the following tasks performed:
(2 marks)
(iii) The reason why the word “spiralling” was underlined by the software.
(1 mark)
(iv) Using the search and replace option, all occurrences of cyber are to be changed to
cybercrime. State the result after this change. (2 marks)
4. (a) Processing modes can be completed either via batch, online/real-time or time sharing.
The following table describes the characteristics of two of these processing modes. Complete the
table by entering a relevant statement for the online/real-time processing mode for EACH
characteristic. (5 marks)
Processing Mode:
Characteristic Processing mode: Online/Real-time
Batch
Data is grouped,
Processing method sorted and processed
at regular intervals
Hours/days after
Response/Turnaround
submitted for
time
processing
Tape or magnetic
File storage medium
disk
Sequential or
File organization
indexed sequential
(c) In January 2016, a paper-based survey was distributed to capture data from students aged
12 – 21 on their technology use at school. The set of data was then entered into a
software programme for analysis. The survey captured data on the following categories:
• Gender
• Date of birth
• Number of mobile devices owned
• Number of hours spent per day using the mobile device(s)
Complete the table below by providing the guidelines for the data entry. (9marks)
Example of
Data Required Type of Suitable Explanation of How the Data Check
Correct Data
Data Check Works
Entered
Gender
Date of birth
Number of
mobile devices
owned
(i) State whether the data checks in (a) represent validation or verification of the data.
(1 mark)
END OF EXAM