Computer Application Technology GR 12 Exam Guidelines 2021 Eng
Computer Application Technology GR 12 Exam Guidelines 2021 Eng
TECHNOLOGY
EXAMINATION GUIDELINES
GRADE 12
2021
TABLE OF CONTENTS
Page
1. INTRODUCTION 3
5. CONCLUSION 15
1. INTRODUCTION
The Curriculum and Assessment Policy Statement (CAPS) for Computer Applications Technology
outlines the nature and purpose of the subject Computer Applications Technology. This guides the
philosophy underlying the teaching and assessment of the subject in Grade 12.
The purpose of these Examination Guidelines, which replace all earlier versions, is to:
This document deals with the final Grade 12 external examinations and not with the SBA or PAT
per se. However, it is strongly suggested that the principles and the new content in these
guidelines be applied to the SBA and PAT, where applicable.
The National Curriculum Statement (NCS) Curriculum and Assessment Policy Statement
(CAPS): Computer Applications Technology, specifically
o Section 3 – Content and scope per topic
o Section 4 – January 2021 Abridged Section 4 amendments of the NCS CAPS: Computer
Applications Technology
Annexure G: Government Gazette No. 37651, 16 May 2014 (formerly in Government Gazette
No. 31337 of 29 August 2008): Regulations pertaining to the conduct, administration and
management of assessment for the National Senior Certificate.
The National Protocol of Assessment: An addendum to the policy document, the National
Senior Certificate: A qualification at Level 4 on the National Qualifications Framework (NQF),
regarding the National Protocol for Assessment (Grades R–12)
The national policy pertaining to the programme and promotion requirements of the National
Curriculum Statement, Grades R–12
Teachers must take note that these are guidelines. Changes and developments in the
technological environment should be taken into consideration when topics are taught.
Each question in both the Practical and the Theory question papers is evaluated in terms of its
cognitive demand and its level of difficulty.
1
The term average Grade 12 candidate refers to an average Grade 12 candidate in South Africa that has been taught
the full curriculum using the correct resources by a qualified teacher, and not the average learner in a particular school
or class.
In judging the level of difficulty of each question, both the demands that each question makes on
the cognitive ability of an average Grade 12 CAT learner and the intrinsic difficulty of the question
or task is considered. In making this judgement, the difficulty or ease of a particular question is
identified. A four-category framework2 for thinking about question or item difficulty adapted
from Leong (2006) has been used in this identification process. This framework comprises the
following four general categories of difficulty:
Content difficulty: This refers to the difficulty of the subject matter, topic or conceptual
knowledge; some content is inherently more difficult than other content.
Stimulus difficulty: This relates to the linguistic features of the question and the challenge
that candidates face in reading, interpreting and understanding the question.
Task difficulty: This refers to the difficulty that candidates face when trying to formulate or
produce an answer. In this respect, answers requiring paragraphs are inherently more difficult
than questions requiring a single word/phrase as answer.
Expected response difficulty: This refers to difficulties because of the mark scheme or
memorandum/marking guidelines, in other words how marks are to be allocated. Therefore,
answers to multiple-choice questions on a specific topic could be easier than questions where
a candidate has to construct a coherent response.
The estimated percentages for each level of difficulty within each cognitive level as per the
January 2021 Abridged Section 4 amendments of the CAPS are shown in the table below.
D1 D2 D3 D4 TOTAL
3.1 Software
Application software
o Circular S9 of 2015 states the following: 'As from January 2016, the DBE will only use
Microsoft Office to implement and assess the CAT curriculum.'
o The following three versions of MS Office will be used: MS Office 2019/Microsoft 365,
MS Office 2016 and MS Office 2013.
o Should newer versions of MS Office be released, the phasing out of older versions and the
implementation of newer versions will be communicated to all stakeholders by the DBE.
2
Refer to the Exemplar Book on Effective Questioning: Computer Applications Technology that can be found at
https://www.umalusi.org.za/documents/reports/#1558861306122-1980558e-2e8a
Refer to Annexure G, Government Gazette No. 37651, 16 May 2014 (formerly contained in
Government Gazette No. 31337 of 29 August 2008) (Regulations pertaining to the conduct,
administration and management of assessment for the National Senior Certificate) pertaining to
the conduct of a practical computer-based examination and the security procedures that should
be in place.
3.2 Scope (as per the January 2021 Abridged Section 4 amendments of the CAPS)
3.3 Content
File management
Learners may be required to extract files from compressed folders, either as part of the
examination or they may be required to extract/unzip a compressed folder to access all the data
files to be used in an examination. This means that the data might be provided in the form of a
password-protected executable file where the data is distributed, e.g. as CATP1DataNov2022.exe.
Once extracted, the data files to be used in the examination will be found in the
CATP1DataNov20xx folder.
Word processing
Collect data via electronic/online forms, e.g. Microsoft forms, Google forms. (CAPS p. 31 and
p. 41)
Use of word processing electronic forms: Legacy controls should be used to answer
questions regarding electronic forms. Include radio buttons as part of the GUI. (CAPS p. 31
and p. 41).
Referencing features, including Index and Table of Figures (CAPS p. 36)
Spreadsheets
Databases
Candidates must be able to interpret and deduce data and information found in database
tables. For example, they should be able to derive the data type or validation rule of certain
fields without being instructed exactly which data type to use.
General
Transfer of skill – skills learnt in one application may be tested in another application. For
example, conditional formatting or data validation taught in Excel, could appear in Access and
so can lists/combo boxes be examined across the applications, Find and Select taught in
Word could appear in Access or Excel, etc.
Candidates are required to distinguish between closely related skills, e.g. shade and shadow,
etc.
As per 3.2, the total mark for the practical examination (Paper 1) is 150 marks and no longer
180 marks.
This change will be accommodated in the paper as follows:
The number of subquestions will be reduced in order to allow more learners time to complete
the paper.
Accuracy in the demonstration of skills has been gradually introduced over the past few
years and must now be complied with in all questions. In other words, no mark will be
allocated to the inaccurate demonstration of a skill, e.g. applying the skill to text in the wrong
place, or not using a prescribed colour when asked to do conditional formatting. However,
where a question counts more than one mark, part marks will be allocated where the skill to
be demonstrated requires multiple actions and only a part of the answer is correctly given.
Words, such as define, describe, discuss, explain, name and state, are used for a reason:
different cognitive levels are tested. A much higher cognitive level is tested when you have to
discuss something than when you merely have to name or make a list of items.
Action words/Verbs in an examination paper may guide learners in exactly what to include in their
answer. Knowing the meaning of the action words in the questions will guide learners to know
what is required from the questions. The list below is comprehensive, but not exhaustive, and
gives a general guideline as to what is expected when these action words are used.
Find the main ideas, how Analyse the correct Break into parts/sections.
they are related and why use of word Study each part – look at the
Analyse they are important. processing features detail.
in the following
screenshot:
Order the items by listing Arrange the Arrange from small to large,
several items (terms or storage media few to many, slow to fast, write
Arrange
events) in the correct according to their down the steps in order, etc.
sequence. capacity.
Group concepts/ideas Categorise the Which categories can describe
that are similar/have the following computer the function/features?
same characteristics/ devices: keyboard, Understand relationships.
Categorise/
functions or belong CPU, printer,
Classify
together. mouse, hard drive,
SSD according to
their main function.
Show both the differences Compare ROM Find a relationship between
Compare/ and the similarities of with RAM. two concepts.
Differentiate specific concepts. Which features/functions/uses
are alike/differ?
Give a clear, concise Define the term Use short, concise description
formal meaning of a term phishing. of main features, focus on
Define
or concept. facts – in a sentence or two.
TRUE/FALSE-response questions
Learners are expected to write the word FALSE and give the term to make the false statement
TRUE. However, should a learner provide only the term to make the statement TRUE, he/she
should not be penalised. No mark will be allocated if only the word FALSE appears.
4.2 Scope
SECTION A
SECTION B
SECTION C
NOTE:
The content in the table above is NOT an exhaustive list of all the content – also refer to the
CAPS document which contains a list of all possible content to be covered.
Some of the topics may fall into two or more focus areas, thus topics might be examined in
different sections/questions from year to year, depending on examiner discretion.
Operational knowledge from Paper 1 in terms of understanding where, how and why various
functions, techniques and concepts are applied in problem-solving contexts may also be
examined in any of the sections of this paper. This also includes interpreting simple error
messages and assessing the best options and strategies in a given situation.
4.3 Content
The CAPS (p. 18) suggests the inclusion of newer technologies and a phasing out of old
technologies as there is a rapid development in the subject which should be reflected in
what the learners are taught and what is examined. This Examination Guidelines document
lists the new technologies that can be expected in the examination paper and outlines the
depth of knowledge required for an end-user.
The depth of knowledge required for all the existing concepts and terminology below
includes, inter alia:
Definition – what it is
Purpose/Function – what it does, why it is needed
Advantages/Disadvantages
Benefits/Limitations
Application in an ICT environment
3
The two questions in Section C may each have a different scenario.
4.3.1 Clarification of some existing concepts and newer technologies for Paper 2
Most of the technologies and concepts below are listed in the CAPS. The depth of knowledge
required is as listed in 4.2 above, but some aspects in respect of these technologies/concepts are
clarified below.
Solid-state drive: A drive that has no moving parts, making it quieter and more robust. They
operate much faster than traditional hard drives as they store data electronically and not
magnetically as with a traditional hard drive. (CAPS p. 22)
Card reader: A device connected to a computer that is designed to accept and read data
from different types of storage media, such as SIM and SD cards and flash drives.
(CAPS p. 22)
Multi-touch screen: Feature of a screen that allows it to register more than one point being
touched simultaneously. (CAPS p. 22)
HDMI: High-definition multimedia interface is a standard/port for connecting high-definition
video devices, such as computer monitors, video projectors and digital television. HDMI
carries high quality video and audio signals, and there is no need for separate audio cables
as with VGA. (CAPS p. 30)
3D printing/printers: 3D printers can create three-dimensional solid objects (e.g. motor
vehicle parts, human tissue replacement, jewellery, clothing, small buildings, small boats)
from a digital model of the item by adding successive layers of material on top of one another.
(CAPS p. 20)
Standards for wireless communication which provides for high-speed data transfer
between cellular devices (such as smartphones and tablets) and ISPs. Each generation, e.g.
5G or 6G, increases the capacity and speed of previous mobile connections. (CAPS p. 35)
NFC: Near field communication (NFC) is a standard that allows devices such as smartphones
to connect wirelessly simply by touching them together or bringing them into close proximity
to, for example, exchange files by just touching two smartphones together or for sending a file
from a smartphone to a printer wirelessly. (CAPS p. 35)
Video communications – also include platforms such as Zoom, Microsoft Teams and
Google Meet.
Internet technologies:
URL shortener: This is a tool or service, such as TinyURL.com, which converts a long URL
to a shorter version. This shorter version of the URL will take a user to the same web
address, but is easier to remember and/or type out. (CAPS p. 25)
Internet of Things (IoT): This refers to the trend whereby all sorts of objects and devices are
increasingly being connected to one another via the internet. This can range from surveillance
systems to geysers, washing machines, 'smart' vehicles and traffic lights, etc. Various
sensors in the devices can produce data for all sorts of purposes, including diagnostics and
running systems more efficiently. (EG 2017)
Autonomous vehicles: A self-driving car, also known as an autonomous vehicle, driverless
car, or robo-car is a vehicle that can sense its environment and move safely with little or no
human input.
Properties/Metadata:
Click-jacking: Users are tricked into clicking on an item on a web page which acts as a
concealed link. (CAPS p. 42)
Ransomware: A type of malware designed to encrypt or block access to your computer
system and files until you pay a sum of money ('ransom'). (EG 2017)
Screen lock pattern: A way of locking a device by setting up a pattern you must draw or trace
on the screen to unlock the device. (EG 2017)
Authentication (Internet safety): Two-factor (two-step) authentication: includes the use of
CAPTCHA, OTP (one-time pin/password), ApproveIt messages, etc.
Crowd funding: A process where a single idea or business practice is funded by multiple
small donations from volunteer contributors, usually before the business venture is started.
The contributors will then receive the product when it is finally put into production. Examples:
www.indiegogo.com and www.kickstarter.com. (CAPS p. 45)
BYOD: Bring your own device (BYOD) refers to a concept where employees/students are
allowed to bring and use their own portable devices, such as smartphones, laptops, tablets, to
work on and access the network instead of a device owned/supplied by the company/
institution. (CAPS p. 32)
Big data: Very large structured and unstructured data sets that are analysed using
computers to reveal trends and associations. These present challenges, such as storage,
curation, querying, visualisation. (EG 2017)
Cryptocurrencies (e.g. Bitcoin, Ethereum, Luno): This is a form of virtual, digital currency.
Bitcoins can be exchanged for other currencies, products and services. They have caused
concern because they are often used for payment in criminal activities, such as ransomware
demands. However, more and more legitimate companies are accepting them as a means of
payment. (EG 2017)
E-learning: The creation of a learning environment where individuals use their computers to
take part in teaching and learning to further their education
Mobile or M-Learning: A form of education and training delivered and conducted via the
internet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime. (EG 2017)
Virtual reality (VR): This refers to using technology to create a simulation of a
3D environment that can be interacted with by a person in a seemingly real or physical way.
This is achieved by using equipment, such as helmets with screens and gloves fitted with
sensors. (EG 2017)
Augmented reality (AR) uses types of technology similar to VR but does not create a totally
virtual environment like VR. Instead, it takes the physical world and adds (augments) objects,
such as graphics, within the real world. Both VR and AR are used in areas ranging from
entertainment (e.g. the augmented reality game Pokémon GO), training in aircraft simulators,
and healthcare (e.g. an app used to highlight veins when a drip is inserted or surgeons being
able to perform remote surgery on patients.
AI (artificial intelligence): Refers to the simulation of human intelligence in machines that
are programmed to think like humans and mimic their actions, especially traits associated
with a human mind, such as learning and problem-solving. Machine learning is the study of
computer algorithms that improve automatically through experience and by the use of data. It
is seen as a part of artificial intelligence.
4IR (the fourth industrial revolution): 4IR is a way of describing the blurring of boundaries
between the physical, digital and biological worlds. It is a blend of advances in artificial
intelligence (AI), robotics, the Internet of Things (IoT), 3D printing, genetic engineering,
quantum computing and other technologies. It creates many products and services that are
fast becoming essential to modern life and is the collective force behind disrupting almost
every business sector.
5IR (the fifth industrial revolution): 5IR runs and develops alongside 4IR and uses the
advantages 4IR brings to put the focus back on humans and human endeavour, defining the
ethics and impact of technology developed in the 4IR.
Blockchain: The name of a whole new technology. It is a sequence of blocks or groups of
transactions that are chained together and distributed among the users.
'The blockchain is an incorruptible digital ledger of economic transactions that can be
programmed to record not just financial transactions, but virtually everything of value.'
– Don & Alex Tapscott
It works as an indisputable record of transactions that do not require reliance on an
external authority to validate the authenticity and integrity of the data. Transactions are
typically economic, but we can store any kind of information in the blocks.
As technology improves, many technologies may become obsolete or will no longer be relevant
and will therefore not be examined.
In other cases, the set differences between devices/technologies may have become blurred. As a
result, some aspects of these concepts/devices will not be examined in order to avoid confusion
for the candidates, as well as during the marking process.
Devices such as printers WILL BE examinable, but the comparisons between various printer
types will NOT be examinable.
802.11 a/b/g/n: Candidates should know that 802.11 refers to a Wi-Fi connectivity standard.
The details on the specific standards, i.e. a/b/g/n, will NOT be examinable. (CAPS p. 35)
The concept of a plug-in as a way of customising the browser or program has been largely
replaced by add-on, which is an extension of the software. Candidates will NOT be required
to distinguish between these two concepts. The term add-on will be preferred.
Candidates will no longer be required to distinguish between a phablet and a tablet. A
phablet is a small screen tablet or a larger screen smartphone.
Modem and router: Distinguish between the function of a modem and the function of a
router, even if it is one converged device.
Differentiation between LCD and LED monitors will NOT be examined.
5. CONCLUSION
Copyright reserved
Computer Applications Technology 16 DBE/2021
Examination Guidelines
ANNEXURE A: HTML TAG SHEET
CHARACTER DESCRIPTION
0 Digit (0 to 9, entry required, plus [+] and minus [–] signs not allowed)
9 Digit or space (entry not required, plus [+] and minus [–] signs not allowed)
Digit or space (entry not required; spaces are displayed as blanks while in Edit
# mode, but blanks are removed when data is saved; plus [+] and minus [–] signs
allowed)
Decimal placeholder and thousand, date and time separators (The actual
.,:;-/ character used depends on the settings in the Regional Settings Properties
dialog box in the Windows Control Panel.)
Causes the input mask to display from right to left, rather than from left to right.
! Characters typed into the mask always fill it from left to right. You can include
the exclamation point anywhere in the input mask.
Causes the character that follows to be displayed as the literal character (for
\
example \A is displayed as just A)
Copyright reserved