0% found this document useful (0 votes)
1K views11 pages

Grade 10 Information Technology

This document contains the instructions and questions for an end of year exam on Information Technology for Grade 10 students. The exam consists of 4 questions testing students' knowledge of topics like website development, computer hardware, networking, document formatting, and data processing modes. Students are asked to define technical terms, describe computer components and their functions, draw network diagrams, perform spreadsheet calculations, and design data validation checks. The exam is 2 hours long and consists of multiple choice, short answer, and descriptive questions worth a total of 80 marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views11 pages

Grade 10 Information Technology

This document contains the instructions and questions for an end of year exam on Information Technology for Grade 10 students. The exam consists of 4 questions testing students' knowledge of topics like website development, computer hardware, networking, document formatting, and data processing modes. Students are asked to define technical terms, describe computer components and their functions, draw network diagrams, perform spreadsheet calculations, and design data validation checks. The exam is 2 hours long and consists of multiple choice, short answer, and descriptive questions worth a total of 80 marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Canadian School of Arts and Science

End of Year Exam – July 2019

Information Technology – Paper 2 (Total 80 marks)

Grade 10
2 hours

Name:

Instructions:

1. This paper consists of 4 questions. Answer ALL questions.


1. Elaine wants to place her gluten-free recipes on the Internet and access them using a web address.
She wants users to register in order to access her recipes and plans to store their information in an
online database. She also needs to manage any e-mails and interact with her online clients when new
recipes are uploaded.
(a) State the name of the computer-related professional that would be most suitable for:

Placing her recipes on the internet _________________________________

Managing her emails and online clients. _________________________________


(2 marks)

(b) Describe TWO tasks of EACH of the professionals in part (a). (2 marks)

(c) Elaine soon receives hundreds of emails with strange email addresses and other requests to visit
other websites.
(i) What is the name given to this type of mail? (1 mark)

(ii) Explain TWO security practices that she should consider before responding to these
mails. (4 marks)
(d) Describe TWO measure that can be used to prevent against software attacks on Elaine’s
website. (2 marks)

(e) Users’ data are stored in an online database. Apart from the first and last name, list TWO fields
that should be used to capture data on users who register for Elaine’s recipes.
(2 marks)

(f) Elaine wants to extract some information from the database. Complete the table by selecting the
most suitable database feature from the list below. (4 marks)
(g) A user searches for Elaine’s recipes and locates the following layout:

Use the layout above to state (4 marks)

(a) the general name given to this type of page

(b) a web address

(c) an email address

(d) a hyperlink
2. John Taylor is the systems administrator at St. Joseph’s High School. He has been asked by the principal
to prepare a report that will show the requirements for the computers and other equipment to be purchased
for a new computer lab.
(a) List any FOUR of the MAJOR components that each computer system should have.
(4 marks)

(b) State the function of any ONE of the major components of a computer system. (1 mark)

(c) John intends to create a network that spans the computer lab. State the name of the type of network that
he needs to create. (1 mark)

(d) In preparing his report, John uses the internet to assist him in finding the specifications of computers
best suited for the computer lab.
Discuss any TWO approaches he could use to evaluate the reliability of the information he retrieves.
(6 marks)
The report must include a well-organized spreadsheet outlining all the needs of the lab, and the expected costs
in terms of equipment. The incomplete spreadsheet is shown below.

(e) Cell A1 is formatted across the columns for effective presentation.


(i) State the name of the formatting feature used to achieve this. (1 mark)

(ii) Write the text for the formula to be inserted in D3 to calculate the TOTAL cost for student computers.
(2 marks)

(iii) Write the text for the function to be inserted in D13 to calculate the TOTAL expected
costs. (2 marks)

(iv) Write a function that would insert the average cost per unit of an item in cell B15.
(2 marks)

(v) John decides that he wants the rows reorganized so that they are in order of the most
expensive to least expensive. Explain how he could do this using features of the
spreadsheet software. (2 marks)
3. (a) A local area network may be wired or wireless. Jennifer has a small apartment and has decided to set
up a network that will connect all the devices in her home that she uses frequently. These devices are:
• 1 desktop computer
• 1 laptop computer
• 1 android cellphone
• 1 android tablet
• 1 printer

Draw lines that correctly map the devices on the left side of the table to the explanation on the right side of
the table. (5 marks)

(b) Explain ONE advantage and ONE disadvantage of using a wireless network over a wired network.
(4 marks)

(c) State the name of the protocol most commonly used to provide wireless computer networking in a
home or office. (1 mark)
(d) Read the extract below and answer the questions that follow.

State:
(i) THREE formatting features used in the document. (3 marks)

(ii) The number of paragraphs after EACH of the following tasks performed:
(2 marks)

Paragraph 2 is moved below Abstract as the new paragraph 1.


Paragraph 1 is copied and placed below paragraph 1.

(iii) The reason why the word “spiralling” was underlined by the software.
(1 mark)

(iv) Using the search and replace option, all occurrences of cyber are to be changed to
cybercrime. State the result after this change. (2 marks)
4. (a) Processing modes can be completed either via batch, online/real-time or time sharing.
The following table describes the characteristics of two of these processing modes. Complete the
table by entering a relevant statement for the online/real-time processing mode for EACH
characteristic. (5 marks)

Processing Mode:
Characteristic Processing mode: Online/Real-time
Batch

Data is grouped,
Processing method sorted and processed
at regular intervals

Hours/days after
Response/Turnaround
submitted for
time
processing

Tape or magnetic
File storage medium
disk

Sequential or
File organization
indexed sequential

Access method Sequential


(b) Specify the MOST applicable processing mode (batch or online/real-time) for EACH of
the following: (5 marks)
(i) Credit card billing systems

(ii) Electronic funds transfer systems

(iii) Flight simulation systems

(iv) Calculating number of hours worked at the end of the week

(v) Processing each customer’s payments for the current month.

(c) In January 2016, a paper-based survey was distributed to capture data from students aged
12 – 21 on their technology use at school. The set of data was then entered into a
software programme for analysis. The survey captured data on the following categories:

• Gender
• Date of birth
• Number of mobile devices owned
• Number of hours spent per day using the mobile device(s)
Complete the table below by providing the guidelines for the data entry. (9marks)

Example of
Data Required Type of Suitable Explanation of How the Data Check
Correct Data
Data Check Works
Entered

Gender

Date of birth

Number of
mobile devices
owned

(i) State whether the data checks in (a) represent validation or verification of the data.
(1 mark)

END OF EXAM

You might also like