CAT Theory Study Guide-2020FINAL
CAT Theory Study Guide-2020FINAL
Introduction
This study guide covers selected parts of the different theory topics of the CAPS Grade 12
Computer Applications Technology (CAT) curriculum in the order they usually appear in the
NSC final examination. The study guide does NOT cover the entire CAPS curriculum, but it
does focus on core content of each knowledge area, that is, Systems Technologies, Network
Technologies, Internet Technologies, Information Management and Solution Development
(Theory)
You must work your way through this study guide to improve your understanding, identify
your areas of weakness and correct your own mistakes. To ensure a high-quality pass, you
should also cover the remaining parts of the curriculum using other textbooks, latest
examination guidelines, past NSC examination question papers and the Annual Teaching
Plan (Grade 10 – 12). It is important to note that content from Grade 10, 11 and 12 will be
examined in the final NSC examination.
The selected parts of each topic are presented in the following way:
Barcode scanner
- Various devices for input can be used to insert data
more productively.
- If one of the input modes fail, another can be used.
- More input modes provides better security.
Keyboard
Keylogging:
Convergence:
When different
technologies are merged
into one device.
COMPUTER APPLICATIONS TECHNOLOGY | Summary of System Technology | 4
Reasons why we use computers/computing devices
To be efficient,
accurate & • GIGO: Garbage In Garbage Out – refers to inaccurate input provides an inaccurate result.
reliability • Data validation: computers allow users to enter data more efficiently and accurately.
To have • Distance: regardless of where you are you can communicate with anyone in the world
effective time • Time: You can instantly communicate with anyone without having to wait
and distance
• Social Networking: Can link to anyone around the world (Facebook, Twitter, Instagram)
To be able to • Web tools: functions and features that helps users:
communicate o Blogs/Vlogs: Online type of dairy.
globally o Wiki's: allows user to create, edit or remove content from a webpage
o RSS feeds: updates from various sources (blogs, websites) to one central place (email)
o Web 2.0: allows users to collaborate and share information
Photographer
•Can perform a •Single Office/ •Designed for •Higher specs •Companies that
wide range of Home Office portable users needed for have many users
tasks •Using computers •Tablets, applications over the country
•Cheap to buy & printers in a phablets, •Expensive to buy •Uses a large
•Uses basic input network smartphones, •More RAM, CPU network to
and output laptops and storage connect
devices needed
Specifications
A BACKUP is a copy of data, files or software saved on a different storage medium and kept off-
site from the original information. If the original data gets lots/damaged it can be restored.
Connections
- Video only - Both audio & video
- Poor quality - High quality
PRINTERS
Types Inkjet Laser
- Expensive to buy - Cheaper to buy
Inkjet / Laser / Multi-Function - Ink cartridges are - Toner is more
Cost cheaper expensive
- Cost per page is - Cost per page is
expensive cheaper
- Measured in DPI (dots per inch)
Resolution - Good photo - Good monochrome
quality quality
Speed - Slow printing - Fast printing
- Uses ink cartridges - Uses toner
Colour - Usually used for - Usually monochrome
colour printing
- Sizes: A4, A3, A2
3D Printer Paper options
- Types: glossy, matte, cardboard
- Refers to the number of sheets that can be
Printing Capacity
inserted in the paper tray (250 sheets)
Functions - Multi-functional printer: scan, fax, copy
- Wireless (Bluetooth/Wi-Fi)
Connection Options
- Wired (USB/Ethernet)
System - Refers to the capacity that the printer and the
compatibility hardware/software should have to function
- Creates 3 dimensional solid objects by adding
3D Printer consecutive layers of material on top of each
other
Feature Description
OPERATING SYSTEM
- Allows communication between the hardware, system programs and the user
- Controls hardware and software
Function
- Runs/manages applications (via file extensions)
- Provides the user with an interface (GUI): icons, buttons, tabs and drop-down lists
- Control between single user and multi user File Types
- Controls multitasking File extensions determine the type of
Managing
- Provides the Task Manager file (e.g. docx; mp3)
applications
- Management of files File Properties
- File types and properties Indicate the size of a file.
- MS Windows Attributes: Read-only/Hidden
- Linux Metadata
Examples - Mac OS Additional information of a file.
- Apple iOS (e.g. Author, Title, Location)
- Android
DRIVERS
- Small programs that acts as a translator between the operating system and hardware
Function devices
- Providing communication between the hardware device and the computer
- Soundcard
- Display card
Examples
- Network card
- Printer
UTILITIES
Function - Designed to analyse, maintain, configure and improve a computer
Examples
- Managing files and folders by creating, copying and searching
File management
- Importing/Exporting and even conversion of files
- Updates are important as it keeps newest features available
Updates
- Scheduled updates will run automatically (in case a user forgets to make updates)
Disk clean-up - To clean the hard drive from all the temporary files that are not in use
Defragmentation - To rearrange fragments of files that are scattered on the hard drive
File compression - Allows a user to reduce the size of a file – "Zip"
- A copy of data, files or software saved on a different storage medium and kept off-
Backups
site on a different location. If the original data gets lots/damaged it can be restored
- Tasks are coordinated in order for problems not to occur.
Coordinate tasks - FIFO (First In First Out), i.e. printing jobs are send to the print spooler and are queued
in the order it was sent
- Firewall: hardware or software that stops unauthorized access to the computer.
- Access control: usernames and passwords
Control security
- Anti-malware: prevents malware like spyware, viruses, worms and Trojans.
- Adware Blocker: Blocks adds that are part of software.
- Software designed to stop viruses from entering the system
Anti-virus - Scanning removable devices, email attachment and websites for viruses.
e.g. Avast!; Bitdefender
Application Software is created in dealing with user input to help the user perform a specific task.
Description Examples
PRACTICAL APPLICATION
- Word processor, Spreadsheet, Database,
- Applications used to create, edit and design
Presentation
information.
- Photoshop
REFERENCING SOFTWARE
- Google Earth
- Instead of using printed materials such as books, - Wikipedia
dictionaries, encyclopaedia's - Google Translate'
- Babylon dictionary
COMMUNICATION SOFTWARE
- Skype
- Software used to communicate with anyone - WhatsApp
anywhere. - Facebook
- Email, etc.
DOCUMENT MANAGING SOFTWARE
- An application used to manage and store
- Windows Explorer
documents.
- eFileCabinet
- Functions include: Storage, Searching, Indexing
WEB BROWSERS
- Edge
- Mozilla Firefox
- An application used to access websites
- Google Chrome
- Opera Mini
Buying software
When buying software, you should consider the following:
Software Licensing
These are terms and conditions for installing software on a computing device. These conditions
include:
•One device only •More than one device as •Any number of computers
stipulated by the agreement as long as they belong to
one company
Software classifications
- Integrated software is when more
than one software is bundled into a
package
Advantages:
Stand-alone - Stand-alone software that can "stand
- Interface is the same
vs on its own"
- Installation as a unit
Integrated e.g. Windows 10
- Data can easily be transferred
- Cheaper to buy than separate
options
e.g. MS Office Suite
- Shareware is provided free of charge,
with conditions:
Freeware - Freeware is provided free of charged • Only for a period of time (trial)
vs - The full program and features are • With limited features
Shareware available for use This is used for a user to see if they
would like to buy the software after the
trial version
- Open-source software is free
Advantages:
- Proprietary software is software you
- Software can be shared
Proprietary buy, however do not own
- Source code can be edited
vs - You pay for the rights to use the
Disadvantages:
Open-source software. (EULA)
- Little or no support to users
- The source code is never released
- Not as user friendly
- Compatibility issues
- Web-based applications are accessed - Installed application that can be
via the internet and can be accessed access without removable devices or
from anywhere anytime the internet
Web-based
Advantages Disadvantages Advantages Disadvantages
vs
- More functions to
Installed - No need to install - Web browser - Must be installed
use
- Doesn't take need to be - Takes up storage
- Doesn't need
storage space compatible space
internet access
Software Problems/Issues
Issue/Problem Description Solution
- Updates can be downloaded from the internet
or from a storage medium.
- Applications should be updated for new
Updating software would features to be added (new version)
ensure that all features are Automatic updates
Outdated
up to date. If software is Advantages:
software
outdated it could cause - Software is always up to date.
software bugs/errors. - Latest features available
Disadvantages:
- Uses bandwidth without user's knowledge
- Takes up space on device
When an application has a - A patch is a small update to fix a software bug.
bug (a small error = software - A service pack includes all patches and updates
Flawed bug) accidentally created by of the software
software the programmer.
This could cause calculation
issues, navigation issues, etc.
When the application is not - Ensure that you verify the system requirements
well-suited with the before purchasing software.
Compatibility
hardware and software of
issues
your computer it would not
function properly.
When a user can only read a - Save the file with a new name/location.
Read-only files file and not edit or change - Go to the properties and remove the Read-only
information. attribute.
System Requirements
System requirements refer to specific hardware and software needed for applications to "run" on a
computer.
Activity 1
21.5"
1920x1080
16:09
1000:01:00
5 ms
HDMI/VGA
External adapter
c. 1000:01:00 refers to the contrast of the screen. Explain the purpose of the
contrast?
Up to 33 pages black
Up to 15 pages colour
5.760 x 1.440
Up to 100 sheets (Tray)
Epson Connect, Wi-Fi, Wi-Fi Direct, Ethernet
e. Would this printer be able to link to a network? Give a reason for your
answer.
1. a. Identify the image below AND state the function of this image?
2. Give TWO advantages of using a barcode scanner for the input of large amounts
of data?
a. Dpi
b. Colour depth
6. Suggest ONE other way to get a document to soft copy besides scanning?
7. a. How would one transfer files from one smartphone to another using NFC?
8. a. Define the term biometric input AND explain the purpose of use?
5. Study the specification below and answer the questions that follow:
20 ??
4" LED touch screen
26x optical zoom
Micro HDMI and USB port
4 GB SD card included
8. Name the type of user that works with high-end hardware and software?
b. Give TWO reasons why some users prefer Blu-ray format over DVD?
6. Explain the difference between RAM and a hard drive in terms of each function?
Activity 6
1. Usually when one tries to install software (e.g. office suite) it requires a product
key.
b. Give ONE reason why software developers would use a product key?
8. To which type of software does Microsoft Edge and Mozilla Firefox belong?
Activity 7
5. a. What is the general term used to describe software that can be used on a
trail version?
6. Give TWO attributes/search filters that can be used for search for a file?
7. Name TWO internet technologies or web tools that will allow users to remotely
attend meetings/classes?
8. Name ONE type of program that would assist visually impaired users?
November 2019
9.1 Computing devices will be used to display the recipes and to capture
the results.
9.1.1 What is the speed of the faster processor when comparing the
two devices? (1)
9.1.2 Why is the tablet more suitable for outdoor use?
(1)
9.1.3 State TWO ways in which to extend the storage space of the
tablet. (2)
9.1.4 Explain why the desktop computer is better for graphics
processing by referring to its specifications, other than the
CPU. (1)
9.1.5 Explain what an on-site warranty is AND why a tablet does not
usually have an on-site warranty. (2)
10.6.1 Give TWO reasons why the weather bureau should make
automatic backups. (2)
10.6.2 Suggest TWO guidelines to be included in the policy for
making backups at the weather bureau, other than
making regular backups or setting automatic backups. (2)
November 2019
4.1 Name TWO input devices that can be found on a laptop computer,
other than a touch screen. (2)
4.2 The user cannot see the full text while an e-mail is being
typed on a touch screen device.
4.4 Discuss TWO reasons why a presenter would use a data projector
instead of a monitor while presenting. (2)
4.5 State TWO advantages of HDMI cables over VGA cables for connecting
a television to a computer. (2)
4.6 Give TWO reasons why 3D printers are not commonly used in a home
office, other than the cost. (2)
4.7.2 Give the term used to describe the reason why this office suite
will not run on an earlier version of the operating system
specified above. (1)
4.8 Give TWO reasons why you would choose to buy an office suite instead
of purchasing various applications by different software developers,
other than the cost. (2)
4.9 Give TWO possible causes why an application stops responding. (2)
Give TWO reasons why the saved picture now displays blurred or is
unclear (2)
4.12.1 Write down the general term for the process where
broadcasting services are changed from analogue to digital
technology. (1)
[25]
4.2 An accounting clerk uses a keyboard that does not have a numeric
keypad. Explain why a keyboard with a numeric keypad would be a (2)
better option.
4.3 A list of files stored on a computer is shown below.
4.3.1 What type of content will be found in a file with a .mp4 (1)
extension?
4.3.2 Give the full name of the spreadsheet in the list of files above
that has a newer file format. (1)
4.3.4 Give ONE reason for creating a compressed file, such as (1)
Books.zip.
4.4 State TWO advantages for notebook computers going into sleep mode. (2)
4.6.2 Give TWO reasons why modern mobile devices are more
likely to have built-in solid state drives instead of hard disk (2)
drives.
4.6.3 Why is Blu-Ray storage popular with computer gamers? (1)
4.8 State TWO ways to access a website without typing in the URL or the
IP address in a web browser. (2)
Prelim 2018
4.1 Study the advertisement below to answer the questions that follow:
DEVICE A DEVICE B
DVI, VGA and HDMI output DVI, VGA and HDMI output
Dual Core i5™ 7360U 3.4 GHz 6 Core Ryzen™5 1600 3.2GHz
Integrated Intel Iris Graphics 6000 AMD Radeon RX 580 4G 256bit DDR5
Graphics Card
8GB DDR4-2133Mhz
8GB DDR4-2133Mhz
3TB WD Blue 7200RPM Hard Drive
512GB SSD
LG Blu-Ray Internal Writer BH16NS40
(optional) LG Blu-Ray Internal Writer BH16NS40
(optional)
Wireless: 802.11ac, Bluetooth 4.0
Wireless: 802.11ac, Bluetooth 4.0
Linux Ubuntu 18.3 64 bit
Linux Mint 18.3 64 bit
4.1.1 Although Device A shows a higher processing speed than Device B, the
seller claims that Device B is the "faster" of the two. Provide TWO reasons
why this could be the case. (2)
4.1.2 The Blu-Ray writer is an optional extra on both devices. If the buyer decides
not to have this drive included he will be unable to read optical disks and
may face certain challenges in using the device.
Copy the following table to list two problems AND provide possible solutions
for solving these problems if you use a device without an optical drive.
Note: you may not use the same solution for both problems.
PROBLEM SOLUTION
1. 1.
2. 2. (4)
4.4 Suggest TWO ways to fix a mouse pointer that moves in an unpredictable
way, without replacing the mouse. (2)
4.5 Give TWO reasons why many modern notebooks no longer include an optical
drive. (2)
4.6 State TWO uses of NFC on smartphones. (2)
4.7 What should a user do when the trial period of a software product has expired? (1)
4.8.1 State ONE advantage of using the PDF file format. (1)
4.8.2 How would you convert an office suite document to PDF? (1)
4.8.3 You receive two documents in PDF format. Both are one page long.
Explain why they have different file sizes AND why it is not possible to
do a text search in one of the two.
(2)
Explain TWO ways to find a program on your computer, OTHER than using
4.9
the Start Menu (2)
4.10 Explain how a POS device finds the price of a product after it is scanned. (2)
4.11 Name TWO features to look for in laptop computer hardware that will make
upgrades easier in future. (2)
4.12.1 Name TWO pieces of equipment one would need for VR. (2)
[25]
8GB DDR4-2133Mhz
512 GB SSD
802.11 a/b/g/n
Bluetooth 4.0
4.1 Compare the two drives above and indicate the following:
4.1.1 You have the option of replacing the SSD indicated in the (1)
specifications with a HDD costing the same price. Why would any
buyer consider this option?
4.1.2 Motivate why you think it would have been better to keep the SSD (3)
(give 3 reasons)
4.2 The technician at the distributor has indicated that you can replace the 6 Core (1)
Ryzen™5 X470 3.2GHz CPU with a Dual Core i5™ 7360U 3.4 GHz. He
pointed out that the clock speed of this CPU is higher than the CPU shown in
the specifications but that the computer would in fact be slower. Give the
reason why the 3.4 GHz computer would be slower than the 3.2 GHz
computer.
4.3 Could this computer be used to play a movie on Blu-ray? Motivate your (1)
answer.
4.4.1 Name the operating system that is loaded on this computer (1)
4.4.2 The salesperson ensures you that the system software will also be (2)
able to handle BYOD. Explain what "BYOD" means, not just what the
acronym stands for.
4.4.4 Indicate the difference between open source software and freeware. (1)
4.5 You are considering buying a digital camera with the computer. The salesman
indicates that you have to consider the resolution.
4.5.2 State TWO ways in which data stored on a SD card in a camera can (2)
be transferred to a computer.
4.6 The motherboard on the computer provides 4 USB ports. You are concerned (2)
that you will need at least 6 USB ports. Provide 2 methods that can be used
to make more USB ports available.
4.7 Give the specification that indicates that the computer will be able to connect (1)
to a Wi-Fi network.
4.9 Excluding image quality, give ONE reason why HDMI has an advantage over (1)
VGA as a means of output.
Identify the image below that appears on a newsletter AND explain how it (2)
would be used, by referring to a suitable example.
Activity 1
1. a. 21.5"
b. Resolution/Quality
c. This refers to the screen's darkest colours in contrast with the lightest colours.
d. Aspect ratio
3. a. HDMI
4. Pixels
6. • Difficult to repair
• Costly to fix
• IF something is damaged the whole laptop has to be send in.
7. • Larger pictures
• Better cropping options
• Clearer images
Activity 2
b. • Scan
• Fax
• Copy
c. ppm
d. dpi
3. a. Laser printer
4.
a. Inkjet printer
Activity 3
1. a. QR code
They are generally used as a link to a website
3. a. Radio frequency
4. OCR
7. a. Place the devices very close to each other / Let the devices
touch each other
b. • Facial recognition
• Fingerprint
• Iris/retinal scan
• Voice recognition
Activity 4
1. a. • Keyboard
• Pointing devices: such as touch pad/joystick
• Microphone
• Touch screen
• Fingerprint reader
2. • Webcam
• Microphone
3. Stylus
4. a. • Microphone
• Braille keyboard
b. • Speakers
• Larger screen
5. a. MP (megapixels)
6. • Captures images/videos
• Allows VoIP (Skype)/video telephone calls
• Broadcast live images over the Internet
• Facial recognition – security feature, etc.
7. • Webcam/Camera
• Speakers/Earphones/Headphones
• Microphone
• (Bluetooth) Headset
• Monitor/Screen/Projector
• Smartphone/Computer/Tablet
8. Super/Power user
Activity 5
2. An adapter does not have its own dedicated memory. It shares/uses the
RAM on the computer.
4. a. A fragmented disk slows down the device because files are scattered on
the device
b. GHz
c. • RAM
• Hard drive
• CPU
Activity 6
1. a. Code assigned to software which users need to enter to install and use
the software
b. Prevents (software) piracy or ensures that users pay for the program
c. (Software) piracy
2. • Operating system
• Utility programs
(Note to marker: Accept any specific utility programs, for example driver
programs, anti-virus program, etc. as utility programs. Do not accept any
brand names.)
b. Application Software.
8. Web browser
Activity 7
2. The driver program for many generic and specific devices is pre-loaded on
3. a. Site license
5. a. Shareware/Demo/Trialware/Beta
8. • Screen reader
• Text-to-speech program (e.g. Narrator)
• Speech-to-text (e.g. Dragon Dictate)
November 2019
9.1.2 ONE reason for the tablet being more suitable for outdoor use
9.1.4 ONE reason for the desktop computer being better for graphics
processing
Solution
(1) System restore/Roll back to previous date/time where the software
worked properly
(2) Install a patch/service pack (from the vendor website)
(3) Re-install the software
✓ (Any one)
(Note to marker: Accept 'Glitch' as the cause with 'Restart' as the solution.) 2
(Note to marker: Do not accept any answer related to data usage and cost.) 2
(1) Saves time due to scheduled backups/No user intervention required for
backups
(2) Ensures backup is always/regularly/timeously done/Employees may
forget if done manually
(3) Time/schedule backups when computers are not in use
✓✓ (Any two)
[15]
November 2019
(1) Keyboard/Keypad
(2) Touch pad/Track pad
(3) Microphone
(4) Camera/Webcam
(5) Fingerprint scanner
(6) Track point/Pointing stick
✓✓ (Any two) 2
4.2 TWO reasons why all text on a touch screen device does not display
1024x768 refers to the resolution and NOT the physical screen size/display
ratio/Screen size is given in inches✓
4.7.2 Term used to describe why software will not work on an earlier
version of the OS
Compatibility✓ 2
4.8 TWO reasons for purchasing an office suite rather than applications
by various software developers
(Note to marker: Allocate two marks if the candidate gives two valid points
in the same bullet, e.g. Faulty RAM and faulty CPU.) 2
4.10 TWO reasons why a picture becomes blurred or is unclear
(Digital) migration✓
4.12.2 TWO advantages of digital broadcasting technology for the viewer
• Improved accuracy
• Increased speed
• Improved productivity 2
✓ (Any one) 1 4
OR
• Memory management
• Input and output management
• Co-ordinating/Managing tasks/programs
• Provides basic security
• Device management (e.g. Disk management, printers, etc.)
✓✓ (Any two) 2
[25]
2
4.7 ● 3D printers create three-dimensional solid objects from a
digital model by
● placing successive layers of material on top of each other
2
4.8 System requirements of the software needs to be considered 1
November 2017
AND
Prelim 2019
4.1.2 ● SSD is faster and has better performance than an HDD. (3)
● SSD is less likely to get damaged because of no moving parts.
(reliability robustness)
● SSD is quiet compared to HDD.
● Read/write speed (data access) of SSD is extremely fast and
much quicker than HDD.
● SSD uses 'flash memory' to store data and is not affected by
magnetic interference.
● SSD has low power consumption.
● SSD is easier to carry around because of its physical size (2.5
inch) which is smaller than the size of an HDD (3.5 inch).
● SSD does not become fragmented therefore there is no need
to defrag. (Any 3)
4.2 The 3.2 GHz CPU has 6 Cores vs 2 Cores (1)
4.4.2 ● BYOD refers to a concept where people are allowed to bring (2)
and use their own portable devices,
● to access the network.
(Any 2)
4.4.3 ● Can be difficult for unskilled users to use. (2)
● Most people are familiar with propriety software and finds open
source software intimidating.
Video Conferencing
Video Conferencing is used mostly by business to conduct meetings and conferences by
means of video communication. Video conferencing uses a network of computing devices to
talk, see and hear one another even if they are in different locations
Advantages Disadvantages
Can save money on traveling costs. Expensive to setup and maintain a video
conferencing lab. One needs a fat internet
connection.
Video and audio information can be shared. A power failure or network failure can cause
a break in communication
Enables collaboration and can strengthen Training is needed to use the equipment.
relationships between colleagues.
More information on
Good Practices: video conferencing
• Only speak about the matters that need to be discussed at the
meeting.
• The video lab must be quiet and have no noisy distractions
• Only run the video program during the video conferencing
process.
Communication Devices
Wearables
Small devices that have been designed to worn or attached to your body. Examples include
Smartwatches, Smart clothing and Fitness trackers.
Smartphones
A smartphone is a type of computer that people can carry around. A smartphone is an
example of convergence (multiple/various technologies combined into a single device). A
smartphone has various functions, including the following: GPS, MP3 player, Video and
sound recorders, etc.
Tablets
Tablets are portable hand-held computing devices that are bigger than smartphones, but
smaller than laptops. There are two types of tablets: consumer tablets and PC tablets.
Learn How to
Blocking websites
Block
Blocking websites is when an internet proxy or firewall prevents a user websites
from gaining access to certain network resources such as certain
websites or FTP Servers. One would block certain websites to avoid
phishing websites, to avoid spam disturbing your computer with adware
and popups or to add parent filters to content for children.
Examples include most antivirus software which uses software filters to
block unsafe websites to ensure a safe browsing experience
Search engines
Search engines are websites that allows you to type in a keyword or a phrase and then
searches through the internet to find what you are looking for.
Pop-up blocker
Pop-ups advertise products or features on websites. Advertisers design theses
advertisements to be eye-catching. Pop-up blockers block these advertisements.
Caching
Caching is the temporary storage of web documents that you have
visited to reduce bandwidth usage, server load and lagging.
RSS Feeds
Really Simple Syndication are text files designed to deliver regular internet content and
news updates to subscribers. One can download RSS readers that will give you automatic
updates on new content on your browser.
Podcasts/Vodcasts
A podcast is a free service that allows internet users to pull audio files from a podcasting
website to listen to on their computers or audio players. A vodcast allows users to pull video
files from a podcasting website.
Chatrooms
A website or an online service that provides an online virtual space for users with a common
interest to communicate in real time. Examples include: Badoo, Rawr and ICQ
Wikis
Wikis are used to obtain and share information with other users. The websites can be edited
and access by any user in the world, so long as that person has a computing device and an
internet connection. Examples include, Wikipedia, WikiTravel, WikiHow and WikiBooks.
Blogs/Vlogs
A blog is a diary-type website that maintains an ongoing record of information and has the
function of a journal. A vlog is a blog that contains video content.
Examples include:
Digital Communication
Bluetooth
Bluetooth is a wireless technology that uses radio waves to communicate, or transmit data
or voice over a short distance.
• Widely used
• Free of charge
• No need for any cables
Disadvantages
Wi-Fi Hotspots
An area where you can connect wirelessly to a network with internet
access. Many companies use Wi-Fi hotspots to attract more customers A video explaining
(such as KFC). Hotspots are usually found at places such as, WiMAX
restaurants, shopping malls, airports and other public places.
WiMAX
Worldwide Interoperability for Microwave Access is a wireless
communication standard to describe long-range wireless networking for
mobile and fixed internet connections.
Advantages Disadvantages
Are available from anywhere in the world. GPS Devices uses a lot of power.
Can be used to locate a person. Signal might be affected by weather.
Software is always up-to-date. GPS accuracy depends of the strength of
the signal.
Internet Attacks
DoS attacks
Denial of Service attacks are attacks where a computer is bombarded with huge amounts of
data to slow down a computer network.
Sniffer attacks
A small program that can read packets of data being sent on a computer or a network.
Encryption is a process where data is translated into a secret code for secure transmission.
Activity 1
Activity 2
Activity 3
Activity 4
Activity 5
1. Indicate whether the following statement is TRUE/FALSE. Rewrite the correct underlined
word if the statement is FALSE.
A blog is an area in a place such as a café, hotel or airport where people can connect to
the Internet via Wi-Fi-enabled devices.
2. Name TWO Internet technologies that can be used to reduce the monthly telephone bill
of a company.
3. The 'bookmarks'/'favourites' and 'history' features on web browsers can be used to find a
website that was previously visited.
Give TWO reasons why it might be better to use the 'bookmarks'/'favourites' feature to
'remember' a previously visited website as opposed to using the 'history' feature.
4. An online service or technology that makes it possible for people who share similar
interests to communicate with each other regardless of distance or time.
Activity 6
1. Give TWO reasons why more people are currently using Skype than in the past.
2. Give ONE reason why the video and sound quality is sometimes poor when using Skype
to make a video call.
3. Suggest ONE way in which the sound quality of a VoIP call can be improved without
ending the session or changing any hardware.
4. … is an example of an e-commerce website.
A. YouTube
B. eBay
C. Spotify
D. iCloud
5. Why would you use or need browser plug-ins?
6. Give ONE common example of a browser plug-in.
Activity 7
1. Name ONE technology that can be used to improve security while one is using the
Internet.
2. Give TWO reasons why you would block pop-ups.
3. What is the purpose of the 'History' button or tab in a web browser?
4. Give TWO reasons why an e-shop would ask customers to log on using a password?
5. A multimedia file downloaded from the Internet that can be transferred to computer or
portable media players.
A. wiki
B. vlog
November 2018
1. State TWO netiquette rules for a group chat on social media. (2)
2. Most learners use mobile devices to browse the Web. 9.1.1
a. Some learners confuse the terms internet and World Wide Web. Explain the terms
internet and World Wide Web. (2)
b. What term is used to describe the concept where a learner is able to use more than
one app on the same device at the same time? (1)
c. Give ONE reason why a web page does not open in the browser on a mobile
device. (1)
d. State ONE argument against accessing the internet using a public Wi-Fi hotspot. (1)
March 2018
1. Which ONE of the following statements is NOT true about web applications?
A. One may have to pay for the service.
B. More than one person can work on a document at the same time.
C. One does not need an Internet connection to access the resources.
D. Data can be synced across multiple devices. (1)
2. Indicate whether the following statement is TRUE/FALSE. Rewrite the correct underlined
word if the statement is FALSE. (1)
A DoS attack occurs when a computer or network is flooded with a huge amount of
useless data.
3. Give ONE reason why one would install a browser plug-in. (1)
4. How would an RSS feed on a blog benefit its users? (1)
November 2017
1. Suggest TWO ways in which a user can listen to music on a smartphone that has no
headphone jack (port). (2)
2. Name ONE type of technology that uses radio waves for data transfer. (1)
1. State TWO advantages of purchasing from an online shop, other than potentially lower
prices. (2)
2. Explain the significance of the text 'mobi' in the URL 'www.vicbayfm.mobi'. (1)
3. Which hardware or software technology is often used to control and monitor access
between a network and the Internet? (1)
November 2016
1. Indicate whether the following statement is TRUE/FALSE. Rewrite the correct underlined
word if the statement is FALSE.
A blog is an area in a place such as a café, hotel or airport where people can connect to
the Internet via Wi-Fi-enabled devices. (1)
2. Name TWO Internet technologies that can be used to reduce the monthly telephone bill
of a company. (2)
3. The 'bookmarks'/'favourites' and 'history' features on web browsers can be used to find a
website that was previously visited.
Give TWO reasons why it might be better to use the 'bookmarks'/'favourites' feature to
'remember' a previously visited website as opposed to using the 'history' feature. (2)
March 2017
1.1 State TWO advantages of online shopping, other than potentially (2)
lower prices.
1.2 Why do some people prefer paying for online purchases using EFT, (1)
rather than paying by card?
1.3 List ONE measure banks use to protect their clients when they bank (1)
online.
2.2 During Internet surfing, the warning "Pop-up blocked" often appears.
2.2.1 What is a pop-up? (1)
2.2.2 It is advisable to block pop-ups. Motivate the statement by giving (1)
ONE reasonable motivation.
3. Explain what the term trending is in relation to social networking? (1)
4. Discuss TWO advantages of connecting computers within a network. (2)
Computers and computer equipment are connected in a LAN. There are, however, some
concerns about security and privacy.
1. Caching is one of the features that helps us to use the Web more efficiently.
1.2 Give TWO main reasons for using web cache. (2)
2. You have the option to connect to a network via Bluetooth. Give TWO (2)
reasons why Bluetooth is not a very good option.
4. Video conferencing is the meeting between two or more people via the (2)
Internet. Name TWO good practices for video conferencing.
5. During the school holidays you took a lot of photos. These are stored on an (2)
SD card and the size of all the photos is a total of 3Gb. Your friend in Cape
Town wants to see your photos and suggested that you upload it to the
cloud. Give TWO reasons why you would hesitate to do this.
7. Wi-Fi hotspots are used by shops and businesses to attract customers. (2)
Give TWO reasons why a shop would ask customers to log on using a
password.
November 2014
1. Name a function or feature of a web browser that would allow a user to return
to a specific website even if the browsing history has been deleted. (1)
2. Explain how software developers generate a profit from adware, even though
it is distributed for free. (1)
3. State TWO advantages of podcasts over real-time streaming broadcasts. (2)
4. a. Web browsers use a technology called web caching. What is web caching? (2)
b. State TWO possible advantages of using web caching. (2)
5. Describe TWO ways in which available bandwidth plays a role when watching
videos online from services like YouTube. (2)
Activity 1
1. Digital communication occurs when computing devices transfer data between each
other.
2. Communication has become convenient between colleagues who live in different
locations.
3. Any TWO of the following:
Advantages (Any TWO of the following) Disadvantages (Any TWO of the following)
Can save money on traveling costs. Expensive to setup and maintain a video
conferencing lab. One needs a fat internet
connection.
Video and audio information can be shared. A power failure or network failure can cause a
break in communication
4. An RSS feed is a service designed to deliver regular internet content and news updates
directly to subscribers.
5. A podcast is a free service that allows internet users to pull audio files from a podcasting
website to listen to on their computers or audio players.
A vodcast allows users to pull video files from a podcasting website.
6. Wikis are used to obtain and share information with other users. The websites can be
edited and access by any user in the world, so long as that person has a computing
device and an internet connection.
Activity 2
1. a) Cache memory is an area of memory that stores frequently used data or instructions.
b) Smartphones are internet-enabled so you can send and receive e-mails and surf the
internet
2. QuickTime
Java
Flash Player
3. GPS technology allows the devices to receive and send signals
4. D
Activity 3
1. Encryption is a process where data is translated into a secret code for secure
transmission
2. Any TWO of the following:
Do NOT …
• share personal and sensitive information
• share information without permission
• gossip/engage in cyberbullying
• be rude/start an argument/be verbally abusive/swear
• type in capital letters
• have a private conversation on a group chat/post messages intended for one
individual only on the group chat
• send large attachments/content that wastes data
• post information that is outside the usual content of the group/ make irrelevant
comments
• post messages at unusual hours of the day unless urgent
• use a commonly understood language
3. a) The internet – A worldwide connection of networks and computers/Network of
networks
World Wide Web – An internet service which consists of a collection of linked electronic
pages
b) Multitasking
c) Any ONE of the following:
• The mobile data has been switched off/No internet connection
• Web page not designed for/compatible with a mobile device
• The mobile phone's Wi-Fi has not been switched on/Router is off/faulty
• Data cap has been used
• Faulty web page/browser/website
• Server down/Website not available
• Mobile device's RAM is full
• Missing browser plug-ins
Activity 4
Activity 6
Activity 7
1. C ✓
2. True ✓
3. Provides additional functionality/features ✓ on websites
4. Updates are automatically sent to people
No need to continually visit the website to check for new information (Any ONE ✓)
November 2017
March 2017
November 2016
March 2017
3. ● Expensive ✓
4. ● Make sure you work in a venue that is well lit (not too dark) ✓
● Protect your privacy by making sure you know what your camera can "see" ✓
● Test the sound and video before you make a call
(Any two)
1. Use a bookmark/favourite ✓
2. Advertisers pay the developer to show their advertisements within the app/program
using banners or pop-ups ✓
4. a. Web caching is a process where web pages previously accessed ✓ are stored on the
hard drive ✓
b. • It improves browsing speed as pages can be loaded from the hard drive
instead of being downloaded from the Internet ✓
• Less data is consumed during the browsing process, as cached websites are
not downloaded from the Internet ✓
A wide area network is a network that connects computers over Purpose of WAN:
a wide area such as a city or province. A WAN uses: cables,
radio waves, microwaves and satellites as communication • To connect LANs
methods. together
• Allows communication
to take place over a
Advantages and Disadvantages of WANs large distance.
• Centralisation of
shared data
Advantages Disadvantages
Allows sensitive data to be It is very expensive to setup
shared over a wide distance and maintain the network
Multiple LANs can be Security issues such as
connected so that large information theft. For more information on
companies can communicate. InsertWANs
QR code
scan me:
here
Modem: Hardware device that allows a computer to send and receive data over a telephone line,
satellite or cable.
Switch: Allows multiple devices on a network to communicate.
Router: A device that connects a network to other networks wirelessly or through cables.
Internet Services
The internet is a wide area network that can be accessed from any computing device
(Computers Smartphones, etc.), as long as the computing device is connected to the
internet.
• Allows users to chat in “real time” • No time to review messages you are
• Messages are delivered to the other sending
party instantly after pressing the send • Messages are not always saved
button. • The personal experience of talking to
• One can see when messages have people is taken away due to instant
been read. messaging
• Communication can take place For more information on
regardless of distance VoIP scan me:
File Sharing
Accessing or sharing of files by one or more users. For example: ShareIt, uTorrent and
Xender.
Types of connections
Bandwidth vs Broadband
Activity 1
1. The internet is an example of a WAN. Why can the Internet be described as a WAN?
2. Provide ONE advantage and ONE disadvantage of WANs.
3. Match the term/concept in Column B with the definition in Column A. Write down the
correct term/concept next to the question number.
Column A Column B
3.1 A device that connects network to other networks Switch
wirelessly or through cables.
3.2 Hardware device that allows a computer to send and Router
receive data over a telephone line, satellite or cable.
3.3 Allows multiple devices on a network to communicate. Modem
Network
Activity 2
Activity 3
a. The advertisement indicates that the maximum speed is 'up to 10 Mbps'. Give TWO
possible reasons for an ADSL line not performing at its maximum speed.
b. What is the purpose of the router mentioned above?
4. State TWO factors that should be carefully considered when choosing an ISP (internet
service provider), other than cost.
5. Name TWO technologies/protocols that use encryption to secure communication over a
wide-area network.
Activity 4
1. Consider the packages below that advertise Internet access for video streaming at
home.
a) Which package would one use to daily stream HD videos at home? Give TWO
reasons for your answer.
b) Which package would be sufficient for general home use, such as sending e-mails
and browsing the web, for which no video streaming is required? Motivate your
answer.
2. The web browser message below is displayed even when an ADSL connection is
working.
Activity 5
Activity 6
1. Name an e-mail or IM (Instant Messaging) feature that makes it easy to see if the sent
message was read or not.
2. How does a social network such as Facebook make most of its money?
3. What is needed to establish a Bluetooth connection between two devices if all the
required Bluetooth options have already been enabled and correctly set on both
devices?
4. State TWO potential disadvantages of using Bluetooth for communication.
5. Which communications technology or protocol allows devices to connect within a
WLAN?
Activity 7
1. Which of the following refers to cellular technology used for data transfer?
A. WiMAX
B. Bluetooth
C. WiFi
D. LTE
2. Why would the internet be classified as a WAN?
3. Compare the functionality of a switch and a router in a network.
4. Give an example of what NFC (Near Field Communication can be used for.
5. Ms Mills told the learners that all networked and online computer users should make
sure they make use of a firewall. Explain what a firewall is.
6. The … is a hardware component that allows a computer to connect to and communicate
via a network.
A. BIOS
B. GPU
C ROM
D. NIC
November 2018
1. State TWO factors that should be carefully considered when choosing an ISP (internet
service provider), other than cost. (2)
2. Name TWO technologies/protocols that use encryption to secure communication over a
wide-area network. (2)
3. You use your smartphone only for instant messaging and cellphone calls. The monthly
data cap of 5 GB on your smartphone has been used up before the end of the month.
Give TWO possible reasons why the data cap did not last the whole month. (2)
March 2018
1. Consider the packages below that advertise Internet access for video streaming at
home.
a) Which package would one use to daily stream HD videos at home? Give TWO
reasons for your answer. (3)
b) Which package would be sufficient for general home use, such as sending e-mails
and browsing the web, for which no video streaming is required? Motivate your
answer. (2)
2. The web browser message below is displayed even when an ADSL connection is
working.
March 2017
1. Suggest TWO realistic ways of ensuring that the data cap/limit on your Internet lasts the
whole month without reducing the amount of time you spend on the Internet. (2)
November 2015
1.1 Your cousin is moving out of the house soon and has started investigating
connectivity options. She is considering the following packages:
1.1.1 What does the term uncapped for package 1 mean? (1)
1.1.3 What does it mean when your internet connection is shaped? (2)
1.1.4 Which one of these packages has the highest speed? (1)
1.1.5 Refer to package 2: What does out-of-bundle rates refer to? (1)
November 2012
1. Mr Joe has networked all the computers, a scanner and other devices in the computer
centre.
1.1 Name ONE media category that Mr Joe could have used to connect
the computers. (1)
1.2 What is the purpose of a switch in a network? (1)
1.3 Name TWO devices, other than computers and a scanner that can
be shared in a network. (2)
2. Mr Joe is concerned about the security of the network.
2.1 State TWO precautions that he can take to prevent unauthorised
access to the files on the network. (2)
2.2 State TWO guidelines for setting up secure passwords. (2)
2.3 Name TWO problems directly related to hardware that may cause
you to lose data. (2)
3. Mr Joe spends a lot of time setting up users and computers, fixing problems
with computers and connectivity and performing other network tasks. He wants
to advertise for someone to take over these tasks.
Give the job title (designation) that should be used in the advertisement for such a person.
(1)
4. Mr Joe wishes to connect the network to the Internet.
4.1 Suggest ONE type of broadband Internet connection.
(Do not give a brand name.) (1)
4.2 State ONE advantage of a broadband connection for the learners in
the learning environment. (1)
Activity 1
1. The Internet is a very large collection of networks and computers around the world that
are interconnected
2. Advantage: Allows sensitive data to be shared over a wide distance / Multiple LANs can
be connected so that large companies can communicate.
Disadvantage: It is very expensive to setup and maintain the network / Security issues
such as information theft.
3. 3.1 Router
3.2 Modem
3.3 Switch
4. Much cheaper than traditional communications such as telephone calls and many users
can communicate at the same time.
5. A. FlipGrid
6. True
Activity 2
Activity 5
1. B
2. Transferring Files
3. Any TWO of the following:
• Emoticons/Smileys/Emojis/Icons
• Short versions of phrases, e.g. LOL, ROTFL
• Use capital letters when necessary, etc.
4. Any TWO of the following:
• Avoid downloading large files/torrents often
• Use public data access when available
• Compress files being sent over the Internet
• Use a browser that uses less data e.g. Opera mini, etc.
• Limit the amount of video conferencing/Avoid heavy streaming/Do not watch
YouTube videos too often/Stream videos (such as YouTube) in a lower resolution
Activity 6
Activity 7
1. B/C/D
2. The internet is a global connection of networks/It is not linked in a small area/It spans
over a wide, global area
3. Switch is a device used to connect multiple computers on a network ✓ Router is used to
connect to external networks e.g. Internet
4. Any ONE of the following:
Sharing/Transferring files
Identity verification/Authentication purposes
Location-based profile automation
Can be used in payment systems
Switch devices on or off, etc.
5. Hardware and/or software (utility program) that protects a computer against harmful
unauthorised access between networks or a computer and a network
6. D
November 2018
March 2018
November 2017
1. Router ✓
2. Any ONE of the following:
• Wi-Fi/Wi-Max
• NFC/RFID
• Satellite
• Bluetooth
• 3G/LTE
3. Connects two or more computers/devices in a network
Directs network traffic (data) efficiently (Any one ✓)
(Note to marker: Accept features of a managed (smart) switch that has to do with control
or management of the network.)
4. a) Hangouts/Facetime/WhatsApp/Viber, etc.✓
b) Internet connection may not be reliable
Lack of bandwidth
Destination point may not have VOIP
Difficult for emergency services to trace origin of the call (Any one ✓)
c) Prevent dropped calls OR Save on data/costs ✓
March 2017
1. B ✓
2. Transferring files ✓
3. Any TWO of the following: ✓✓
• Emoticons/Smileys/Emojis/Icons
• Short versions of phrases, e.g. LOL, ROTFL
• Use capital letters when necessary, etc.
November 2015
1.1.1 Uncapped means that there is no limit on the amount of data ✓ that can be
downloaded or uploaded
1.1.2 Package 2 & 3 are both capped accounts
1.1.3 On a shaped account, priority/speed ✓ is different for various services
Note: Accept specific examples such as emails, web browsing, Internet banking
and "normal" downloads via a web browser getting full speed and data-intensive
activity such as torrenting/online gaming that gets less speed
1.1.4 Package 2/LTE
1.1.5 Using more data than the bundle/package supplies
1.1 • Cable
• Wireless ✓ (Any one)
1.2 • It is a central connection point where all the devices on the network plug
in
• Directs network traffic ✓ (Any one)
4.1 • ADSL
• WiMax
• Wi-Fi
• 2.5G/3G/4G/LTE
• Satellite ✓ (Any one)
Step Step
1 2
Step Step
4 3
•Communicate •Process
findings information
Data Information
• What is the current situation? (Explanation of the problem in the country or area)
• What will be the focus and purpose (desired outcome) of the investigation? (Which angle
will the investigation aim at and what will the solution be)
• How will I go about the investigation considering all the requirements? (Explanation of all
the requirements of the problem and how they will be addressed)
• Who is the target audience? (Who is the solution aimed at)
• open-ended
• closed-ended questions
Closed-ended questions are narrow in focus and can usually be answered with a single
word such as 'Yes' or 'No' or a pick from a limited list of options. These questions are
specific and may start with Who? When? Where? What? How many?
Open-ended questions are broad are questions which require more thought and more than
a simple one-word answer. These higher-order questions can usually be answered in detail
and may start with Why? How? What if? If? Would it be better if? What recommendation?
What would be best?
Questions are further divided into four levels of thinking:
LEVEL TYPE OF QUESTION QUESTION USUALLY STARTS WITH
1 Focuses on facts Who, When, Where, What, How
many
2 Focuses on exploring How
Searching tips
When searching for something on the internet you need to keep the following in mind:
Information sifting
Not all data found is always useful. Only relevant, valid, reliable, current and objective data
will be kept. Sifting through data is the process of keeping data that will assist to solve the
problem.
Information vs knowledge
Knowledge results in an action, based on the processing of information. Once data has been
processed into information and comparisons and contrasts have been made, patterns have
been discovered and definitions are obtained, knowledge is gained.
Processing data
All data (questionnaire data, as well as other data) that may require the use of a spreadsheet
and worksheets within the spreadsheet or database should be processed.
During processing, information is turned into knowledge.
Spreadsheets
A spreadsheet will be used to capture the questionnaire data and other information
collected. The spreadsheet should be formatted so that it is easy to
interpret by adding headings, using different font sizes, freezing panes,
adding borders and wrapping text.
Spreadsheets are better suited when statistical and mathematical
functions should be used to analyse data and present it visually by
using graphs.
Why statistics are
The following features of the spreadsheet can be used to analyse data
fascinating
or information:
• Title
• Legend
• Data labels
• Axis titles
Databases
The database will be used to analyse data that needs to be connected,
which makes it easier for users to search for, and extract information from
the data.
Databases are better suited when:
Analysing data
The final step in data analysis is to look for trends and patterns.
A trend is a general direction into which something is moving or
developing across time. In a trend points move in the same direction.
A pattern is a set of data that looks similar and repeats itself in a
predictable way. When presented on a graph this data forms a shape
and conclusions can be drawn from that.
Knowledge vs insight
Insight means to gain a deeper understanding of something. This can only be done once all
data has been processed, analysed and knowledge have been gained by identifying trends
and patterns in the information. The insights or observations obtained from the research
should be communicated to an audience. This is the final purpose of the investigation.
• Reports
• Websites
• Presentations
Who the audience is and what the purpose of the presentation is will determine in which way
the findings will be communicated.
Software should be used to create the documents to
communicate the findings. Examples of software that can be used
are:
Report
A report is one of the ways to present the findings. This is usually a
word processing document that contains all the information, knowledge
and insights obtained from the investigation organised in a logical way.
Report
Contains the name of the researcher, topic and abstract. If a picture is used on the
Cover page cover page, it must be suitable
Abstract An abstract is a brief summary of the investigation and the contents of the report
Discussion and Analysis This is also called the body of the report and consists of headings and paragraphs that
discusses the points of the investigation
Knowledge that has been gained by the investigation and claims made after the data
Findings analysis
Conclusion A short discussion about the insights gained through the investigation
Organise information
The information should be organised in a logical way in the body. The body contains the
discussion and summary of the investigation. The body/discussion is made up of headings
and a discussion of each heading.
The body/discussion and analysis should have the following:
Interpret information
Charts, queries and reports have been created during the processing and analysis phase
and these visualisations should now be interpreted.
Interpretation means to explain your own understanding of something.
Each visualisation that has been added to the body should be interpreted. An explanation
should be added to each visualisation. Trends and patterns that have been observed can be
mentioned.
Findings
Once information has been interpreted, findings are made. Findings include knowledge and
insights about the evidence (charts, queries, reports).
Findings should include recommendations and new insights about the investigation.
• Be logical
• Not include information that is not present in the report
• Have recommendations
• Include new knowledge and insights based on the information in the report
Referencing
The information that was used in the report should be referenced. It will show where the
information was obtained. It is illegal to take someone else's
intellectual property. All sources should be referenced in the APA or
Harvard format.
Plagiarism is when someone passes off someone else's work as their
own, without acknowledging the original source. This can be done
when using someone else's words, picture, etc. without referencing the
original source. All sources should be referenced at all times. Plagiarism
Copyright is a law that gives the owner of a work (for example, a
book, movie, picture, song or website) the right to say how other people can use it. The ©
symbol is used when something has copyright.
Information is referenced by using a:
Websites
Websites can also be used to communicate findings. When creating websites, the following
should be considered:
Activity 1
1. Your school has to gather information about which sports students like.
Study the questionnaire below and answer the questions that follow:
Activity 2
Activity 3
1. Name TWO application software suited to process results captured from a survey if
the survey consists of closed questions.
5. Give ONE element that should appear on the cover page of a report, besides the
title of the report.
6. Give TWO reasons why the information of a book dealer is stored in databases
rather than in spreadsheets.
7. Give TWO tips on how to check that information sourced from the Internet is in fact
correct and reliable.
Activity 4
1. There is a lot of information available, and skills needed to be able to work with this
information is needed.
1.1 State ONE advantage of having information that is already in digital format.
1.2 What is the difference between data and information?
2. Give TWO advantages of completing an electronic form in a store.
3. Study the question below that was asked in a questionnaire, and answer the
questions that follow
_________________________________________________________
Give TWO changes that should be made to the spreadsheet before it is imported
into Access.
5. Name TWO design aspects that must be considered when evaluating a website.
Activity 5
Name,Gender,Age,Amount
Susan Motau,Female,16,500
Kirk Key,Male,15,450
Pete de Preex,15,200
Thuli January,18,670
Victor Naidoo,17,340
2.1 How many fields will the database contain of (excluding a primary key)?
2.2 Why would it not be advisable to have the name and surname in one field?
2.3 Explain the steps that you would need to take to be able to separate the name and
surname from each other without manually retyping it?
4. Name the word processing feature that can be used to automatically indicate the
different changes made to a document by various editors or users.
5. How can the creator of a questionnaire ensure that the questions in a questionnaire
are closed questions?
BMW
Volkswagen
Toyota
Activity 7
November 2019
6.1 Refer to a formal written report, such as your PAT, and explain the purpose of
an:
6.2 When you did research for your PAT, you found information on the topic (2)
that appeared to be suitable.
Give TWO reasons why you CANNOT use some of this information in
your report.
6.3.2 Give TWO benefits for a researcher when closed questions are (2)
answered electronically.
6.4 Study the graph below that shows the final outcome of a national election and
answer the question that follows.
June 2019
6.1 State TWO ways in which to find information if you do not have access to (2)
the internet.
6.2 Give TWO reasons why a drop-down form field is used instead of a text (2)
form field on an electronic form.
6.4 Study the spreadsheet below and answer the questions that follow.
6.4.1 Identify THREE problems in this spreadsheet that will affect the (3)
quality of data when it is imported into a database.
6.4.2 Other than the problems identified in QUESTION 6.4.1, why (1)
would it NOT be possible to create a meaningful graph using the
data above?
[10]
November 2018
6.1 The example below shows three questions that were part of a questionnaire for
learners taking Mathematics as a subject at primary school.
QUESTIONNAIRE
Question 1: Did you pass Mathematics?
Question 2: How many learners in South Africa take Mathematics as a subject?
Question 3: What impact does Mathematics have on the economy?
6.1.1 Identify ONE open-ended question from the questions above. (1)
6.2 State TWO ways in which a teacher can check if a learner plagiarised from (2)
the internet.
6.3 Give TWO tips that learners can use to check the quality of information (2)
when researching a topic on the internet.
6.4 Name TWO broad categories of spreadsheet features/options that can be (2)
used to interpret data from a questionnaire.
6.5 Why do you need a citation in the body of a research report and a (2)
bibliography at the end of a research report?
[10]
6.1 Give TWO tips for setting high quality questions to be used in a survey. (2)
6.2 How would one transfer data collected electronically to another application (2)
without re-typing the data?
6.3 Assume that you have one spreadsheet that uses data from another
spreadsheet.
Give ONE reason why it would be better to insert a cell reference instead (1)
of using the copy and paste method to return the required data.
6.4 Study the graph below and answer the questions that follow.
6.4.1 How many categories (series of data) are shown in this (1)
graph/chart?
6.4.2 Explain the problem that exists in the Marketing department (1)
according to the graph/chart.
March 2018
6.2 Explain why using an online questionnaire is an efficient option for gathering (2)
data, by referring to:
6.3 The following rule was entered into a database to prevent inaccurate input: (2)
<=0 OR >=18
Give TWO reasons why irrelevant or unusable data can still be entered.
6.4 Explain why you would NOT use information found on the Internet, even if (2)
it was written by an expert author.
6.5 What word processing feature could be used to view the changes made by (1)
multiple authors to a single document?
6.6 How can one prevent changes being made to a spreadsheet opened in a (1)
spreadsheet application?
6.7 How can one prevent the input of duplicate records when capturing data in (1)
a database table?
[10]
November 2017
6.1 Why would an author's name not be enough to consider a source (1)
trustworthy?
6.2 An Internet search returned a link from an advertiser at the top of the set of (1)
results.
Give a reason why it may not be a good idea to follow this link.
6.3 The graphs below represent the change in male and female learner numbers over
a period of time.
6.3.1 What conclusion can be made based on the data above? (1)
6.3.2 What type of graph would you use to combine the information in the graphs (1)
above?
6.5 Give ONE reason why the values in the Name column and Marks column (2)
in the data below were not sorted correctly.
6.6 Identify THREE problems in the wizard below that will affect the quality of (3)
data when the import process is completed.
[10]
Activity 1
Activity 2
Why
• All sources should be acknowledged to avoid issues with copyright
• For future reference
• To compare if the original sources were not plagiarism
3.1 • Follow-up questions can be asked
• Interviewer can confirm immediately if information on the biographical data is
accurate: age, gender, race
• Interviewer is able to observe verbal and non-verbal communication, i.e. body
language, emotions, behaviour, etc.
3.2 • Can be very time consuming
• Transport to conduct interviews can be expensive
• Interviewer can manipulate answers
• Interviewer could have their own preconceived biases that they build in to the
interview or the documented responses
• Have to be a skilled interviewer to obtain quality data
3.3 • Improved accuracy/Data validation can be done/No issues with handwriting
• Less time needed for data capture/Respondents may be more likely to
complete/answer the survey
• Data can be exported for analysis (e.g. into a spreadsheet) directly
• Easier to 'distribute' survey/has a wider range of respondents, etc.
3.4 • Set limits for online engagements/intake capacity
• Set time limits for searching
• Identify the kind of information you seek
• Constantly review and update
Activity 3
Piracy
• Illegally using/ copying or distributing software without ownership or legal rights
3. Copyright
4. Survey is a research method while questionnaire is the type of tool to collect data
Activity 4
1.1 • Easier to obtain, because many different ways to transfer digital information.
(e.g. e-mail, 'cloud', SMS, portable storage)
• Less work/time needed, because not necessary to retype/scan data sources
into digital format
• More likely to be up to date, because distribution of digital data is faster than
hard copy
1.2 • Data refers to raw unprocessed facts that are not useful on their own
• Information is processed data that has meaning/has been processed
2. • It would save time as the data would be captured immediately
• It would provide potentially more accurate data if the form is suitably validated
• The form can be quickly adapted if there is additional data that needs to be
captured
3.1 Closed question, since the question can be answered by a single answer
3.2 It would be (almost) impossible, or impractical, to provide a set of options to predict
all possible options
4. • All empty cells or columns should be deleted
• All columns should have file names
• All data should have the correct data types
Activity 5
Activity 6
1.1 Question 1: Radio buttons allow only one response, whereas two or more
responses may be applicable
Question 2: Not clear what response is required
1.2 The respondent is asked to select a response from a set of options
2. Styles
3. URL shortening service converts a long URL to a shorter version
4.1 Information or news that is deliberately meant to deceive people
4.2 • Cross-check the information with other sources
• Check reliable sources
5. • Perform a spell check
• Ensure grammar is correct
• Ensure formatting is correct
• Verify that layout is correct
1.1 • Plagiarism is the act of passing off someone else's work as your own
• Copyright refers to the legal right to make copies
1.2 • Plagiarism: Reference all borrowed work
• Copyright: Do not make copies of content without permission
2. • Indicates that the content of the website could have changed since the date it
was used
• Indicates what the information was on that specific date
3. • Charts/Graphs
• Sorting
• Pivot tables
• Conditional formatting
• Wide range of functions/formulas
• Filtering
• Validation facilities
• Results of functions/formulas updates automatically
4. The way a source is referenced in a document
5. • For collecting individual perspectives/experiences/opinions
• Easy/Quick way to gather information from individuals/groups
• For targeting specific respondents, etc.
6. • The answer is not specific
• The question does not limit the answer
• Options are not sufficient
• Data won't be valid
• Answers could be incorrect
November 2019
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 122
6.4 THREE reasons why the graph is difficult to interpret
(1) The title obscures the content of the graph/The title may make
it difficult to see detail/interpret the graph
(2) The graph shows a big difference in the bars but values are
very close
(3) The combined percentages go well beyond 100%/It is not
obvious that the graph displays parts of a whole/A pie chart
would be more suitable
(4) The Y-axis starts at 80% rather than 0%/Incorrect upper and
lower limits of the Y-axis
(5) The legend has a meaningless label
(6) Axes are not labelled
✓✓✓ (Any three) 3
[10]
June 2019
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 123
6.4.1 THREE problems affecting quality of data imported to DB
• Missing information
• Inconsistent data type/date format used in the columns
• Duplication of headings
• Meaningless field names
• Two sets of data in one field/Inconsistent order of data
• Difficult to set a primary key due to missing
information/duplicate field names
✓✓✓ (Any three) 3
6.4.2 ONE problem with the data for a meaningful graph
November 2018
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 124
6.3 TWO tips for checking information quality
Authority
• Check the credentials of the author
• Check reviews of the source/Author
Accuracy
• Compare with other sources for accuracy
• Number of citations
Currency
• Check how recently the information was posted/Check the
date
Bias
• Check for bias in terms of gender, race, religion, culture, etc.
✓✓ (Any two) 2
6.4 TWO spreadsheet features for data analysis
• Functions/Formulas/Calculations
• Sorting/Grouping/Sub-totalling
• Conditional formatting
• Graphs/charts
• Filtering
✓✓ (Any two)
June 2018
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 125
6.4.1 2✓ (1)
6.4.2 They spent too much of their budget/They overspent✓ (1)
6.4.3 Research✓ (1)
6.4.4 • Add currency symbols to the numbers/amounts
• Add data labels
• Add axis titles
• Move the legend to the left/right/bottom
• Use a more meaningful chart title
• Use gradient/textured/colours fill for the bars/columns
• Remove the decimal portion of the numbers
• Decrease the units of the y-axis
March 2018
AND
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 126
6.7 • Use a primary key (1)
• Use indexing (No duplicates) property
✓ (Any one)
[10]
November 2017
COMPUTER APPLICATIONS TECHNOLOGY | Information Management Past Exam Papers Solutions | 127
Summary of Social Implications
Computer-related crimes
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate
crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Cybercrime encompasses a wide range of activities, but these can
generally be broken into two categories:
SOFTWARE THEFT
Software theft is the unauthorized copying of software. Most retail
programs are licensed for use at just one computer site or for use by
only one user at any time. By buying the software, you become a
licensed user rather than an owner (see EULA). You are allowed to
make copies of the program for backup purposes, but it is against the
law to give copies to friends and colleagues.
Source: https://www.webopedia.com/TERM/S/software_piracy.html
For additional
information
To avoid software theft, do the following:
● Do not copy, duplicate or distribute any software without a copyright licence.
● Do not download and use illegal software from the internet.
● Do not lend your software so that an illegal copy can be made.
BANDWIDTH THEFT
Bandwidth theft refers to the use of bandwidth without paying for it.
Bandwidth theft can also occur when one is connected to an unprotected
network.
Precautions include:
IDENTITY THEFT
Identity theft occurs when someone uses your personal information to pretend to be you to
commit fraud or to gain financial benefits.
Your personal information could be your full name, email address, online login and
passwords, driver's license number, passport number or bank account number. Criminals
can gain access to these types of information and sell it on the dark web to commit identity
theft.
CROWDFUNDING
Crowdfunding is a method of raising capital through the collective effort of
friends, family, customers, and individual investors. This approach taps into the
collective efforts of a large pool of individuals-primarily online via social media
and crowdfunding platforms-and leverages their networks for greater reach and
exposure.
Source: https://www.cisco.com/c/en/us/products/security/common-
Scan for more cyberattacks.html
MALWARE
Malware is a term used to describe malicious software, including spyware, ransomware,
viruses, and worms. Malware breaches a network through a vulnerability, typically when a
user clicks a dangerous link or email attachment that then installs risky software. Once
inside the system, malware can do the following:
Scan to watch clip Bots can be used for productive tasks, but they are also frequently
used for malicious purposes.
Source: https://www.techopedia.com/definition/24063/internet-bot
ZOMBIES
In computing, a zombie is a computer connected to a network that has been compromised
and taken over by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks.
Source: https://www.pandasecurity.com/en/security-info/zombie/
If you do your work on a computer owned by someone else, they may have the right to claim
access to your data files.
If you use online services such as Facebook you should be aware that their End User
License Agreement states that whatever you post belongs to them.
If your school has an AUP for the computer lab that you have accepted, you may have
allowed people other than yourself to access your data files.
FIREWALLS
A firewall is a system
Scan for more
designed to prevent
unauthorised access
to or from a private
network. You can
implement a firewall in
either hardware or
software form, or a
combination of both. Firewalls prevent unauthorised internet users
from accessing private networks connected to the internet, especially Scan for more
intranets. All messages entering or leaving the intranet (the local
network to which you are connected) must pass through the firewall,
which examines each message and blocks those that do not meet the
specified security criteria.
Source: https://kb.iu.edu/d/aoru
https://www.researchgate.net/publication/323903323_A_Study_on_Positive_and_Negative_Effects
_of_Social_Media_on_Society,
https://socialnetworking.lovetoknow.com/Negative_Impact_of_Social_Networking_Sites
Activity 1
Legacy media is a term associated with the use of old media (hardcopy, print
newspapers, magazines, periodicals).
4. Explain the difference between social bookmarking and social networking that form
part of social media.
5. People receive e-mails that seem too good to be true; for example, that they have
inherited money.
a) What information could a phishing email claiming "…you have inherited money…"
be trying to acquire?
b) Give an example of any another technique that can be used to get users' personal
information.
Activity 2
1. What is Twitter?
2. Why would an events company use Twitter rather than Facebook to announce
upcoming events?
3. Give the term when somebody, opens an online account using another person's
details.
6. How is it possible that an email can still be sent and/or received during a power
failure?
7. Explain how an educator at school can send an email to parents of his/her register
class, without parents knowing to whom the same email was sent.
1. Your anti-virus program reports that it has quarantined a virus. What does this mean?
2. Provide THREE measures you can take to avoid computer viruses, besides installing
anti-virus software and keeping the software up to date.
4. Your father says that he makes a point of updating his anti-virus software twice a
year. Explain to him why this approach is not sufficient.
5. A pop-up appeared on your aunt's computer saying that she should download an
anti-virus program from the internet, as viruses had been detected on the computer.
Why should she not respond to this warning, if viruses are so dangerous?
Activity 4
You have legally purchased a copy of a new game and your friend Thulani asks you to make
a copy for him to use and adds that he will pay for it.
3) Explain two environmental benefits of downloading games rather than buying them on
disk.
4) Tabulate the positive and negative impact the use of digital devices have on people's
health and wellbeing.
Activity 5
Phishing is the most common form of computer crime and people easily fall victim to
this kind of crime.
3. Give a list of practical tips to ensure that your browsing experience is a safe experience.
6. List three devices that cater for a user with poor muscular control.
7. Give two economic reasons why ICTs are used in trade and industry as well as
business, exclude reasons related to the employment cost of people.
Activity 6
Information and Communications Technology (ICT), is becoming more of a part of our daily
lives' governments are making increasing use of it to get services closer to the people.
1. Give one advancement, one development, and one improvement in which the
development of ICT has influenced the way the government operates.
You must give the advancement, development, and improvement that has taken place
first and then give the effect that it has had on the government.
2. The widespread deployment of ICT's has led to the government's invasion of its citizens'
privacy. Which two laws you would implement to protect the privacy of the people.
3. Describe two ways in which ICT has benefitted the way businesses operate.
June 2019
7.3 The public has access to software that is published under various terms
and conditions.
7.3.1 What laws protect the rights of people who create original content?
(1)
7.3.2 What is an EULA? (Do NOT simply write out the acronym.)
(1)
7.3.3 Give TWO reasons why people should NOT use pirated
software. (2)
7.4 Why is it potentially risky to use Bitcoin to buy and sell items? (1)
[10]
November 2018
7.1 A user sometimes shares his/her personal details when using social media,
e.g. a cellphone number or an e-mail address.
Why should a user think carefully before sharing this information on social
media websites? (1)
7.2 State TWO ways in which a system administrator can protect a network from
hackers. (2)
7.3 Why would a research company benefit from using 'big data'? (2)
7.5 A school wants to promote e-learning by using the BYOD concept on a Wi-Fi
network.
7.5.1 Explain the BYOD concept. (Do NOT only write out the acronym.) (1)
7.5.2 State TWO problems that this school could experience when
implementing a BYOD policy. (2)
[10]
March 2018
7.1 Give ONE indication that a message you have received is a hoax. (1)
7.2 State TWO ways in which ICTs may negatively impact the workplace. (2)
7.3 Why are governments concerned about the widespread use of Bitcoin? (2)
7.6 Besides cheating, discuss TWO reasons why some schools ban the use of
smartphones. (2)
[10]
November 2017
7.1 Name the computer crime that has to do with posting false information/
accusations about another person online. (1)
Suggest TWO rules for an acceptable use policy (AUP) in a school
7.2 computer
7.3 While installing software, you were not required to enter a product key.
Suggest TWO guidelines for the company to ethically manage client data. (2)
7.5 Study the picture below and answer the questions that follow.
NOTE: Assume that BANKZA is the name of a legitimate South African
bank.
7.5.1 Identify the type of scam represented in the picture above. (1)
7.5.2 State TWO ways in which a user can identify this as a scam. (2)
[10]
7.1 Why would keylogger software not have any harmful effects if it is installed on
a computer that is never networked or connected to the Internet? (1)
7.2.2 Give TWO reasons why unwanted or disused ICT devices should
NOT be thrown into a rubbish bin. (2)
7.4 Explain what phishing is AND why updating your antivirus program will not
prevent you from becoming a victim of phishing. (2)
November 2016
7.1 Briefly explain how a website or service like Kickstarter.com works to financially
benefit entrepreneurs or start-up companies. (2)
7.2 The geotagging function of modern cameras is useful for holidaymakers and
tourists.
Explain what this statement means by explaining what geotagging is. (2)
7.3 State TWO general printing options that are provided in most programs, which
can be used to promote green computing. (2)
7.5 Give TWO potential disadvantages of e-learning when compared to the traditional
classroom approach, besides any cost factors. (2)
[10]
Activity 1
1) The writer had to do excessive research by going out and finding information
whereas with digital media research is available through websites/blogs/twitter
and there is more interaction with the readers.
2) Newspapers can now shoot video and make it part of the story and a radio
station can write blogs and use Facebook as part of their show to interact with
their audience.
4) Social bookmarking refers to the sites the user browses often and lets other
users see what they bookmark – Save/collect/pin/store and many of these
bookmarks let you see how many times a particular site has been bookmarked.
There is no interaction between the users.
Social networking refers to sites like Facebook, Myspace, Twitter and Instagram
that are dedicated websites and applications where users interact with other
users and find people with similar interests to their own.
1) Twitter is a free social networking (microblogging) service that gives users live feeds of
added information. Only registered members can broadcast short posts or tweets
(isolated group).
2) The default settings for Twitter are public and anyone can follow anyone on Twitter,
unlike Facebook, where members need to approve social connections to follow
someone.
Twitter allows for quick short messages with added hyperlinks that are received by a
follower who is then informed about an event that will be hosted by the events
company only, unlike Facebook that makes the world more open and connected.
People use Facebook to stay connected with friends and family, discover what's going
on in the world and share and express what matters to them.
(Keep in mind you need to make a comparison as to how Facebook differs from
Twitter.)
3) Identify theft, cloning
6) The email service provider receives and keeps all the emails that are sent. Once the
recipient accesses his/her email account when the power is back on, their messages
will download (be sent) to the inbox of their email program.
Power might be off at the sender's end but not at the receiver's end or the ISP.
Emails sent via cell phone still seem to work but come through a lot slower
7) The educator will use the BCC field to include all parents' email addresses without
them being able to see the names of the other recipients.
9) • It saves time because all the email addresses do not have to be typed in one by one.
• Any email sent to the group will be sent to every person in the mailing list.
• Prevents errors in typing an address and omission of an address.
• Any list member can send an email to all other list members, reply to all list members
or send an email to the original sender only.
1. When an antivirus places an infected file in quarantine, it deletes the file from its original
location and makes changes to it so that it cannot run as a program. It then transfers it
to a hidden folder that other programs (or yourself as the user) cannot access where it
stays until you choose to deal with it.
3. Accept all reasonable answers referencing most popular antivirus software brand
names, and Windows firewall.
4. Your security software should be set to check for updates at least once a day; this will
already be the default setting for most current security programs, although it's worth
investigating your program's settings to make sure this is the case.
5. Computer viruses spread through downloads from the internet. So, if you have not
bought an antivirus program, you should not download it from the internet.
6. Accept all reasonable answers referencing most popular antivirus software packages
Activity 4
Activity 5
1. Because the people receive emails or some form of communication that is supposedly
from a legitimate website and will be requested to make updates, confirm personal
information and log in to the website.
2. When the receiver of the mail actually does enter in their personal confidential details
the sender will then be able to steal a persons' identity and in this way access
accounts and steal money or purchase something fraudulently.
4. Firewall software is software that monitors and controls incoming and outgoing
network traffic based on specific rules.
7. • They are often more reliable than people (e.g. don't get sick, tired, bored).
• They are faster than people (can do more tasks in the same amount of time).
• They can work constantly (24/7)/don't need breaks.
• They reduce the need for other resources (promote green computing)
Activity 6
1. • Advancements in database technology have enabled the government to collate and
monitor statistical information more quickly and accurately.
• Improved cellular communications technology has enabled the government to
communicate with its citizens more effectively.
• Improved banking and financial security technology have allowed the government to
fairly control and maintain the country's finances.
• National networks development can allow voting to take place more efficiently and
accurately. Voting management can be improved.
• Social media network development has made the government operate in a more
open and transparent manner.
• Development of national network grids has allowed the government to control the
electricity supply more equitably.
• Development of radar information technology has enabled the defence capabilities
to be improved.
• Development of encryption methods has allowed the government to send its
sensitive data via public networks.
2. • All information obtained must be fairly and lawfully processed through the Courts of
Law.
• The information obtained can only be used for a specific purpose.
• The information obtained should only be enough for the purpose it was needed.
• The information obtained must be accurate.
• The information obtained should not be kept longer than necessary.
• The information should be obtained and processed in accordance with the subject's
rights as set out in the Constitution of the country.
• The information obtained should be kept secure and protected from unlawful use.
• The information obtained should not be given to anyone or any other department
without a legitimate reason or without adequate protection.
June 2019
✓ (Any one) 1
7.1.2 TWO reasons for employers to implement ergonomic policy
✓ ✓ (Any two) 2 3
7.2 TWO measures to prevent PC theft (NOT gates/burglar bars)
✓ ✓ (Any two) 2
7.3.1 Laws that protect the creators of original content
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 147
7.3.2 EULA (End-user license agreement)
✓ (Any one) 1
7.3.3 TWO reasons for NOT using pirated software
✓✓ (Any two) 2 4
7.4 ONE reason for Bitcoin transactions being potentially risky
• No consumer protection
• Cannot reverse a transaction
• Easier to hack Bitcoin wallets, etc.
✓ (Any one) 1
[10]
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 148
November 2018
✓ (Any one) 1
7.2 TWO ways to protect a network from hackers
• Implement security policies/passwords/logins/access rights
• Set up a firewall
• Do not allow users to install software
• Make outside users access the network via a VPN
• Disable WPS
• Update firmware/Use alternate firmware
• DNS/Mac filtering
• Install/Update security/antivirus
• Prevent users from uploading files to the network
• Disable form autofill/Disable Remember me
• Disable USB ports/CD drives
✓✓ (Any two) 2
7.3 Benefits of using 'big data' for a research company
'Big data' leads to better decision-making which could reduce
costs
The volume of data gathered provides more insight/
Companies have more data to analyse and base their
findings/advice on
Because data is gathered all the time, 'big data' is more
relevant
✓✓ (Any two) 2
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 149
7.4 Reason for private browsing mode
You do not want to store your friend's:
• browsing history
• web cache
• cookies
• passwords
• temp files
✓ ✓ (Any two) 2
7.5.1 Concept of BYOD
Learners are allowed to use their own devices i.e. tablets,
smartphones and notebooks to:
✓ (Any one) 1
7.5.2 TWO problems associated with using BYOD at school
Device theft is difficult to control
Difficult to control data usage
Learners will be easily distracted
Potential spread of malware
Not all learners may have their own device
Security cannot be enforced on all devices (due to different
operating systems and software/hardware versions)
Compatibility issues due to different hardware/software
configurations/Software incompatibility
May cause a bottleneck on the network
Potential for learners to access sensitive data on the network
✓✓ (Any two) 2
[10]
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 150
March 2018
✓✓ (Any two)
(Note to marker: Accept any other valid reason.) (2)
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 151
7.5 • Appliances can be started remotely before getting home
• Check on the status of appliance
• Manufacturer can diagnose problems without visiting
• Firmware can be upgraded
• Usage can be monitored
• Data can be retrieved from these devices
November 2017
7.1 • Cyberbullying
• Flaming
✓ (Any one)
7.2 • Do not give out login information/Do not use other peoples
credentials
• Do not visit untrustworthy/offensive websites
• Do not stream or download during peak use
• Do not use for non-school related activities
• Limit the duration of using ICT resources
• Guidelines on the use of external storage media
• Guidelines on printer usage
✓✓ (Any two)
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 152
7.3 • Software does not require a licence key/ freeware/shareware/OSS
• Upgrade of existing software
• Pre-activated enterprise software
• The software is illegal/cracked
7.4 • Ensure privacy of data/They should not sell/share user data to third
parties
• Ensure safety of data against hackers/Encrypt data
• Ensure compliance with the POPI act (Protection of Personal
Information)
7.5.1 Phishing✓
[10]
March 2017
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 153
7.2.2 • It contains poisonous materials
• It requires more and more land to be allocated to rubbish
heaps
• It can cause health issues for humans and animals
• It can pollute water and soil, etc.
✓✓(Any two) 2
7.4 Phishing is any attempt to trick a user into giving out sensitive
information. ✓
Humans make the attempt by sending out e-mails etc./There is
no set program/code for the anti-virus program to recognise ✓ 2
7.5 • Do not use a lot of data/Do not download too much/Ask how
much data you may use
• Do not visit sites which could potentially endanger the
security of the computer
• Not visiting sites with inappropriate content sites
• Not downloading inappropriate content
• Ask each time before you use the connection, etc.
✓✓(Any two) 2
[10]
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 154
November 2016
7.1 They provide money for start-up projects getting multiple small
donations ✓ from the public ✓ (usually via the Internet)
7.4.2 • Phishing 1
• Spamming
• Pharming
• Spreading malware, e.g. Virus, Spyware, Ransomware, etc.
• DDoS (Distributed denial of service) attacks
• Illegal BitCoin mining, etc.
✓ (Any one) 1
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 155
7.5 • Lack of access to technology/working hardware/Digital
Divide
• Lack of technology skills to unlock/maximise potential of
e-learning
• Potential lack of guidance/input/feedback/monitoring from
teacher
• Dependent on electricity/battery life
• Feelings of being isolated/Lack of human contact/Contributes
to lack of socialisation skills
• Health-related concerns ('Long hours of sitting'), etc.
✓✓ (Any two)
[10]
COMPUTER APPLICATIONS TECHNOLOGY | Social Implications Past Exam Papers Solutions | 156
Summary of Solutions Development - Theory
Word Processing
Overview:
Microsoft WORD is a word processing program. The program is used to create a range of
documents like letters, articles, activities, homework, assignments etc.
File management:
Save
The SAVE command lets you save your new document in the directory and the folder of
your choice and allows you to specify the name of your document. You can access the FILE
tab on your Ribbon and choose SAVE, or you can use the keyboard shortcut <Ctrl> + <S>.
IMPORTANT:
Always keep good file organisation practice in mind when you name and save
your documents. A good thought-out name can help you find the document more
easily. The file extension will be determined by the type of program you used to
create the document and the operating system will add it to the back of your file
name e.g. math_assignment.docx
Save As
o You can access the SAVE AS option on the FILE tab on your ribbon.
o To save a copy of an existing file under a new name or different location.
o To save an existing file in a new format e.g. .txt/ .pdf/ .csv etc. To do this you need
to choose File Type in the SAVE AS window and choose the required option.
Printing
To PRINT a document from your MS Office program, you can choose the FILE tab on the
ribbon or use the keyboard shortcut <Ctrl> + <P>.
There are many options you can choose from before you print:
o Range of pages: Choose the exact pages of the document that you wish to
get printed (5-7). If pages do not follow numerically, use a comma as
separator (5, 7, 9).
o Odd or Even pages: Choose to print pages with odd numbers or pages with
even numbers
o Number of copies: Choose how many copies of the document you need to
get printed.
o Print quality: Access the Printer Properties and choose the QUALITY tab.
Select the quality options that you need e.g. Black, Grayscale, Colour, ink
saving etc.
o Pages per sheet: Select the amount of pages you wish to print on one side of
each sheet.
Integration: Send to email or fax:
Properties
o Document properties, also known as metadata, are details about a file that
describes or identifies it. Properties include title, author name, subject, and
keywords that identify the document.
o To access and change these properties you need to choose the FILE tab on
your ribbon. The INFO menu item contains all of the properties of your document.
You can view and change the properties of your document here.
o To select data inside a document, you can use your mouse. Hold the left mouse
button and drag the selection.
o To select all the data in a document you can use the keyboard shortcut <Ctrl> +
<A>.
Basic punctuation:
Formatting:
o Paragraph:
● Spacing lets you widen or lessen the spaces before and after paragraphs
with paragraph spacing. You can change the spacing between lines of text
by using the line spacing options in the paragraph box or the icon on the
Home tab.
● Alignment options help you to move text horizontally and vertically on a
page.
● Horizontal alignment (Home tab) – Left, Center, Right and Justified.
Justified will align the text from the beginning of the left margin right up to the
right margin in a block form.
● Vertical alignment (Layout tab) – Top, Center, Bottom.
● Bullets and numbering lets you organise lists with bullets or numbers. You
can customise these bullets and numbers and even create multi-level lists
using outline numbering.
● Line breaks (pagination issues such as widow/orphan control)
● Line breaks specifies how lines, paragraphs and pages break in your
document.
● The Keep lines together command will keep all the lines selected, together
on one page. The Window/Orphan control will ensure that no lines of any
paragraph will bleed over to the next page, but will rather move the whole
paragraph so the lines stay together.
o Cut <Ctrl> + <X> removes selection and keeps a copy on the clipboard if you
need to paste it elsewhere.
o Copy <Ctrl> + <C> creates a copy of selection and keeps it on the clipboard for
you to paste it elsewhere.
o Paste <Ctrl> + <V> places whatever is on the clipboard into the selected place in
your document.
o Find <Ctrl> + <F> helps you find text elements inside a document.
o Replace helps you replace found text with different text elements inside a
document.
o Proofing, spelling and grammar, lets you check for spelling and grammar errors.
o Autocorrect can be set in the FILE OPTIONS menu and lets you choose certain
autocorrect options.
o Comments allow the editor to leave important notes for other editors inside the
document. This feature helps aid collaboration projects.
o Protecting your document can include setting a password for editing and/or
reading. Use the FILE, Info settings to change the document settings.
o Margins – set the top, bottom, left and right margins for your document.
o Orientation – Choose between portrait and landscape options.
o Size – Choose whether you need to work on an A4, A5 or different size of paper.
o Columns – Selected text can be formatted into two or more columns to save
document space and to improve the layout of your document. Use column breaks
to move text to another column.
o Hyphenation – Using the Layout tab, page setup block, you can set automatic
hyphenation and by choosing Hyphenation options, you can specifically set extra
hyphenation criteria.
- Themes
Makes it easy to combine colours, fonts, and graphic formatting effects across
your Word documents. You can update them quickly. You can change the entire
theme or just customize theme fonts, colours, or effects.
- Watermarks
Watermarks are text or images on the background of your document. It is usually
used to indicate the status of the document e.g. COPY, EXAMPLE, DRAFT,
FINAL etc.
Page numbers
o Page numbers can be set in the header or footer of your document by using the
Header/Footer Design Tab. Access this tab by clicking inside the header of footer
in your document.
o Remember that there are a lot of options regarding page numbers (start at, odd
and even pages, format, style of numbering etc.) which you can set by using the
DESIGN tab in the header or footer.
Page breaks
o Breaking a page will create a new page or move text to the beginning of the next
page.
Section breaks
o Section breaks divide a document into individual sections, thus allowing changes
to a section/sections that need to be formatted differently from the rest of your
document.
Fields:
Cover page:
o Used to introduce the document to the reader.
o Cover pages supply important information about the content of a document.
o Cover page fields include the title of the document, related image/s, author,
extract or small summary of the content of the document.
o Word supplies pre-set cover page templates – INSERT, COVER PAGE.
View options:
o View the print layout and preview your documents before you print it. Also gives
you the option to view more than one page at a time, draft of a document or full
screen reading of a document.
o Layout errors can be picked up quickly and rectified by using view options.
o Clip art – A gallery of images, arrange according to topics. Online gallery can
also be accessed.
o Word art – Lets you modify text. This text can be manipulated e.g. borders, fill
colours, gradients, shape effects, text effects etc. To do this, use the Format tab
after you inserted the Word Art.
o Shapes – Use shapes to draw, group and manipulate. You can place text inside
a shape by right clicking on the shape and choosing Add text.
o Charts – Insert charts into a document by choosing the type of chart and
changing the data inside the spreadsheet that will appear.
Integration: Charts
You can also copy and link an existing chart from Excel. By linking it, you
have the option to UPDATE link whenever the original chart is updated with new
information. To do this, copy the chart and paste it with PASTE SPECIAL as a
link.
o Text box – We insert text boxed by drawing them in the desired place. Text
boxes can be manipulated to required specifications like layout options, border
options, size, format options etc.
o Integration: Hyperlinks
Hyperlinks can be placed on words, phrases and images.
When clicked the hyperlink would take the user to a different place in a document, to
another document or a webpage.
Paragraphs:
Tables:
Reference:
Templates:
o Templates are documents that have been pre-created for ease and speed of
use. Formatting, layout and set-up of the document has already been done in
a professional manner.
o When you use a template, you personalise it with your data and information.
o You can also create your own templates – File, Save As, File type: Template
o To access online help in MS WORD, just use the keyboard function key F1
when working in your document.
o To access offline help, you can type your question in the TELL ME WHAT YOU
WANT TO DO space on your ribbon. You can also use the keyboard shortcut
<Ctrl> + <Q>.
o FAQs
Frequently Asked Questions provide information on frequent questions that the
user might have regarding the program that they are using. It consists of
pre-set questions that might help solve a problem.
- Style sets
Include a combination of title, heading, and paragraph styles.
Allows you to format all the elements of a style at once.
o When you create an original document in Word, you can track any changes that
were made during the creation of your document.
o Track changes is an editing command and tracks which user makes changes
and where those changes were made. Track changes also gives the author a
choice whether to accept or reject made changes.
o Integration: Track changes make it easy to collaborate on tasks by giving users
the ability to work together on the same document with ease.
Electronic forms:
Mail Merge:
Overview:
Cell reference:
● Each cell in Excel has an address, determined by using the column name and row
number on the grid e.g. B7.
● Cell reference refers to the cell address or a range of cells in a sheet e.g. A2:B25.
● Cell references can be used in a function or formula in Excel.
Formatting sheets:
Sorting:
Excel will only sort data that was selected. Always make sure you include all fields in the
table before attempting to sort.
Data types:
● Text - descriptive like names, places etc. and usually contains letters. Any piece of
data that may start with a 0 is also classified as text e.g. cell phone number, postal
codes etc.
● Number - Numbers are usually raw numbers or dates.
● Currency - Refers to money values and the type of currency e.g. RAND, EURO can
be set in the number format settings in Excel.
● Date and Time - Dates and times can be used in functions. Date formats can be
changed in the number format settings in Excel.
We format cells in order to make data stand out and to have a neatly formatted spreadsheet.
● Rename - Change the name of sheets to the type of data they carry.
● Headers and footers - set page headers and footers that will appear on each page in
the spreadsheet.
● Printing - set print area to include entire workbook, sheets or partial sheets, pages
etc.
● .xlsx is a typical Excel file format that saves data, graphs, pivots etc.
● .txt is a text file containing no formatting.
● .csv is a flat text file that uses delimiters to separate data e.g. a comma.
Basic calculations:
Uses basic operators including +, -, *, / , order of precedence and the use of brackets.
Basic functions:
When entering a cell reference in a function or formula, Excel will assume it is a relative
reference and will change or adapt the reference when the function or formula is autofilled.
With an absolute reference the range reference or cell reference will not change when
autofilled. Achieve absolute cell referencing by adding a $ to the front of the column and/or
row number in the cell referencing e.g. $B$14.
Simple IF function:
o Returns one value if a condition is TRUE and another value if condition is FALSE.
o Use of relational operators (> < <= >= <>) in simple IF functions.
o Nested IF - Tests for multiple criteria. Increases the possible outcomes if TRUE.
o Vertical lookup - Looks up a value in the first column and returns the value next
to it in the second column. #N/A error - function can’t find referenced value.
o Horizontal lookup - Looks up a value in the first row and returns the value below
to it in the second row. #N/A error - function can’t find referenced value.
o Roundup - will round upward.
o Rounddown - will round downward.
Subtotal feature
The subtotals command allows us to group data in a spreadsheet and apply common
functions to the groups to help summarize our data e.g. sum, count, average
Text functions:
Error indicators:
● #NUM - error indicating numeric values that are not valid. Enter a valid numeric
value.
● ####### - error indicating that the column is too thin for data to show. Change the
column width.
● #NAME - error signifies that something needs to be corrected in the syntax of a
function. Check the syntax of your function.
● #DIV/0! - error indicates that no division by 0 can take place. Check your formula.
● #REF! - error indicates that function refers to a cell or range that no longer exists.
● #VALUE! - error indicates that there is something wrong with your function or
referencing inside the function.
Graphs:
Types of graphs:
● Pie - to indicate percentages or proportional data.
● Line - to track changes over periods of time.
● Column/Bar - compare information/data between groups.
Database:
Objective:
Microsoft Access is a database application that helps manage large amounts of data and
allows analyses of information.
Tables:
Data types:
Queries:
Purpose of a query:
A query is a request for data results using criteria, calculations, grouping and totals.
o Basic queries are created using AND, OR and sorting.
o We can use wildcards */ to extract data.
o Calculation fields can be created in order to apply calculations to data.
o By using Totals and Groups we can total and/or group results of queries according to
particular settings.
Reports:
Purpose of a report:
A report is an organised way in which you can print and distribute information in a database.
● Grouping can be applied to fields in a report. If applied, the report would group on the
field/s you chose e.g. Gender.
● All the basic calculations that you can apply to the report footer, can also be applied
to any grouping footer. The difference is that a calculation in the grouping footer will
be applied to each group, rather than the whole report.
What is HTML?
Hyper Text Markup Language is a language used to create web pages with. We view
these pages with a web browser e.g. Firefox, Safari, Chrome etc.
HTML syntax:
Main tags:
● <html> </html> - indicates the start and end of an html document.
● <head> </head> - indicates that we are working on the tab of the web page.
● <title> </title> - indicates the name on the tab in the browser.
● <body> </body> - indicates the start and end of the contents of the web page.
Heading elements:
● <h1> to <h6> - indicates a heading on a web page.
Text elements:
Text formatting:
● <font> </font> - allows to change attributes to text between tags e.g color, align, face
etc.
● <b> </b> - bold the text between the tags.
● <i> </i> - italic the text between the tags.
● <u> </u> - underline the text between the tags.
HTML links:
HTML lists:
- Numbered list: <ol> </ol>
- Bulleted list: <ul> </ul>
- List items: <li> </li>
Attributes:
Attributes define additional characteristics of an html element.
Elements include:
● bgcolor - set background color.
● color - set text color or line color.
● align - alignment of elements.
● type - the type of element.
● size - text size.
● height - height of element in pixels.
● width - width of element in pixels.
● face - define the font of text.
HTML tables:
Table tags:
Table Attributes:
HTML comments:
Comments are not displayed in your web page. They are used to leave notes inside the
page’s code.
Activity 1
1. Name the word processing tool which we can use to view formatting marks
on the screen when editing a document.
3. Consult the following word processing list and answer the questions that
follow:
1. Gauteng
1.1. Johannesburg
1.2. Pretoria
2. Western Cape
2.1. Cape Town
2.2. Paarl
3. KwaZulu Natal
3.1. Durban
3.2. Richards Bay
3.1 What type of list tool was used to create the list above?
4. When working with a document, how can we ensure that certain words like
the date in the example, will always stay together on the same line when
the line breaks? e.g. 25 October 2020.
7. In Excel, why would you rather use a lookup table and lookup function
instead of a nested-if function?
8. Look at the following HTML code. The code gives an error. Correctly rewrite
the code in order for it to work in a browser.
1. Study the data in the given Access table and answer the questions that
follow:
1.1 Which data type should be used in the Cell Number field? Give a reason
for your answer.
1.2 Name the property in the Fee field that can be set to R250.
1.3 Why can't we set that same particular property (1.2) for the Cell Number
field to 0724458585 for example?
1.4 Which of the fields in the table could be set up as a primary key? Give a
reason for your choice.
1.5 Write a usable Input Mask for the Cell Number field.
2. What is the most significant difference between a .xlsx file and a .csv file?
The aim of this function is to sum the data in H2:H50 if the two conditions in
C2:C50 and F2:F50 are met.
5. Describe the difference between a First line - and a Hanging indent when
using a word processor to create a document.
6. Why would you typically use the COMMENT utility in a word document?
2. Why would you want to create a form letter and a mail merge?
4. In order to show data changes over a period of time like a year (per month),
what type of chart would you use to show results to best effect?
5. Name 3 elements, changes you can add/enhance in any chart to help with
readability/interpretation of the chart.
6. Why would Excel give the following error when you enter a function or
formula? #Value!
8. Look at the HTML code and answer the questions that follow:
8.2 What will the output of this specific code be in the browser? (What will you
see on the page when looking at this specific piece of code in the browser)
Activity 4
1. Study the following Excel table and answer the questions that follow:
A B C D E
1.1 Write a formula that should appear in cell D5 that will determine how many
hours Suzan worked today.
1.2 The following guidelines exist in determining how much each worker should
=IF(D2>=4,D2*180)
2. Write down 2 ways/methods in which you can help eliminate data capture
errors in an Access table.
3. Why would you want to design a report in Access? Give two reasons.
4. What will the reason be for using a Text Box tool when designing a report in
Access?
8. Give the name for the tool in Microsoft Word, which will generate a
synonym for a selected word.
Activity 5
1. Inspect the following text taken out of a word processing document and
answer the questions below:
1.1 Name the element that has been used to create the large letter T in the first
paragraph.
1.2 What is the formatting indicator indicating at the end of the last line of the
second paragraph?
1.3 How many spaces should there be between any two words in a sentence
3. Indicate the difference between using a <th>tag and a <td> tag when
coding an html table in an html editor.
4. Why would you use the following code in the design of a web page?
Note: Any name can be entered between the quotes.
#DIV/0!
What caused this error?
6. When designing a database table, why would it be a good idea to use a
lookup like a list box or combo box in a particular field? Give two reasons.
7. What would the reason be for someone to set a primary key property on a
field in an Access table?
Like "*9"
Activity 6
1. When doing a spellcheck in a document, when would you use the ADD TO
DICTIONARY option?
● Between 18 AND 50
● <=18 OR >=50
6. To ensure that every cell in a field contains data, which property could be
activated for that particular field?
7. What tool can be used to add text to a report like for example your name,
grade and class inside a report footer?
1. Give two reasons why a small business owner would use a database
program like Microsoft Access for his business?
2. Why would you typically create an input mask for a field in an Access table?
3. Look at the following list of field names in a table in Access and answer the
questions:
Id number: Student's ID number
Surname: Student's surname
Name: Student's name
Age: Student's age
Camp fee: Cost of camp
3.1 Which data type would you use for the Camp fee field?
3.2 Name any two fields that would not be appropriate to use as primary keys
and give a reason why they wouldn't be appropriate.
3.3 What data type would you assign to the ID number field in this table?
4. Why should you select all the fields and records in a Word table before
performing a sort command on the table?
5. When showing a learners' end of term marks for each subject on a chart,
what type of chart would you recommend be used to show this information?
8. Rewrite the following HTML code to create a blue table background and
change the space between the cell border and the text in the cells to 5.
November 2012
Mr Joe has to solve several problems regarding computers and the work learners are doing
in the computer centre.
7.1 Mr Joe has asked some learners to help him in the computer centre in the
afternoons.
He has created a spreadsheet to calculate the times worked by each learner.
Study the extract from the spreadsheet below and answer the questions that
follow.
7.1.1 Mr Joe wants to copy the names of only the learners in 12C. Suggest a way in
which Mr. Joe can extract the names of the learners in Grade 12C without copying
each name separately. (2)
7.1.2 Which formatting feature did Mr Joe use to place the heading in one cell across
all the columns in the first row? (1)
7.1.3 Mr Joe wishes to know how many hours each learner worked. He used the formula
=E3-D3 (Time Out minus Time In) but found that the number of hours display as a
time, for example 03:30 instead of 3.5.
State TWO changes Mr Joe should make to display the number of hours
correctly. (2)
7.1.4 Mr Joe needs to have the same information which appears in the spreadsheet, in
a database application. Which feature of an office package can he use to achieve
this? (1)
7.1.5 The chart/graph below compares the times the learners have worked in the
computer centre.
Suggest a more appropriate type of chart/graph to display and compare the data. (1)
7.2.1 Which field should Mr Joe set as the primary key field?
Motivate your answer. (2)
7.2.2 Learners may not work more than 30 hours. Name the field property that Mr Joe
must set so that numbers larger than 30 cannot be entered into the Hours worked
field. (1)
7.3 The school principal requires a printed document that displays the names,
surnames and hours worked of all the learners who helped in the computer centre.
7.3.1 Which database object would be most suitable to create and save a list of the
learners in Grade 11B who worked more than 15 hours? (1)
7.3.2 How would you calculate and display the number of records in a database report? (2)
[13]
November 2013
Ms Cloete has in the past received the following enquiries from parents and learners and
has decided to include them in the questionnaire.
7.1 Some of the applications typically used in a small business are:
• Spreadsheet application
• Word processing application
• Database application
• E-mail software
• Web browser software.
Choose TWO of the applications from the list above and state the use or function
of each of these two applications in a small business. (2)
7.2.1 Suggest a change to the formatting of cells B4:B7 to automatically display the
'R' symbol for each value. (1)
7.2.2 The screenshot above shows a result of 0.00 in cell B7 for a correct function that
was entered as =SUM(B4:B6).
How must the spreadsheet be changed to obtain the correct result from the
function? (2)
7.2.3 Suggest ONE way in which the formatting can be changed to make it easier to
read or interpret the spreadsheet. (1)
State TWO ways in which she can check whether the work has been copied
from the Internet. (2)
[8]
November 2014
8.1 You have studied web page development in your CAT course.
8.1.1 What is the name of the language that uses tags and attributes to create web
pages? (1)
8.1.2 What is the difference in function between the <ul> and <ol> tags used in the
code for a web page? (2)
8.1.3 Give TWO possible reasons why an image you added on an HTML web page
does not display when viewed in a web browser. (2)
8.2 Businesses regularly use databases.
8.2.1 The names of various schools are listed in a field in a database table.
Which criteria would you enter in a query to extract the names of all the schools
that have the word 'business' anywhere in their name? (2)
8.2.2 State TWO advantages of/reasons for using codes instead of the 'full text' in a
database, for example 0847 instead of the text 'Business Studies'. (2)
8.3 Spreadsheets are commonly used to analyse data.
=COUNTIF(A1:A10,<50)
Give TWO reasons why this function will NOT work correctly. (2)
8.3.3 Which feature within a spreadsheet program can be used to display words
underneath one other within the same cell? (1)
8.4 State TWO advantages of using the 'Track Changes' feature of a word processing
program. (2)
[15]
November 2015
8.6 Study the screenshot below of the structure of a table that was created to keep
track of items that a computer shop has in stock.
8.6.1 Why would it NOT be necessary to set the properties of the StockID field to be a
required field? (1)
8.6.2 Which feature or property could be used in the Number in stock field to ensure
that no number larger than 100 can be entered? (1)
8.7 Processors are listed in the Category field as CPU.
The query below (based on the Stock table described in QUESTION 8.6) was
created to find all the CPUs of which there are fewer than 10 in stock.
8.7.1 Briefly explain why this query will NOT return the correct data AND how it can be
corrected. (2)
8.7.2 Which field in this query will NOT be displayed when the query is run? (1)
[15]
8.1 Study the screenshot below and answer the questions that follow.
8.1.1 Cells C4:C9 should display the relevant unit price from the data in the cell range
A12:B15, depending on the value in column A.
The following function was used incorrectly in cell C4:
=VLOOKUP(B4,$A$13:$B$15,1)
Identify the TWO errors in the function. (2)
8.1.2 Why will the formula = A4*B4 produces an error message? (1)
8.2 What is the difference in use between the COUNT and the COUNTA spreadsheet
functions? (2)
8.3 Why should one use the ROUND function in a spreadsheet to round off numbers,
instead of just formatting the numbers? (1)
8.4 In each of the following cases, name the word processing feature that must first
be used or applied before it will work:
8.4.1 Automatic table of contents (1)
8.4.2 Automatic bibliography (1)
8.5 Give an example of a program (NOT a website) that can be used to edit HTML
files. (1)
8.6 What is the relationship between a web page and a website? (1)
8.7 What is the connection between the <head> section of an HTML web page and
the information displayed in the browser tab? (1)
</ul>
<li>Item 1</li>
<li>Item 2</li>
<ol> (2)
8.9 What is the main reason for using a form in a database? (1)
8.10 The following appeared in a query:
Total: [T1]+[T2]
What effect does a calculation in a query have on the values in a database
table? (1)
[15]
November 2017
8.1 Why would one turn on the formatting symbols, as is done in the screenshot
below? (1)
8.2 Look at the screenshot of a table below and answer the questions that follow.
8.2.1 What is the current width of the page without the margins? (1)
8.2.2 Suggest a way to reduce the number of cells in the table WITHOUT
deleting any text. (1)
8.2.3 State TWO general ways to configure the spell checker to get rid of the automatic
underline. (2)
8.2.4 The table in the screenshot above is too wide to display correctly.
Suggest ONE way to make the table fit on the page. (1)
8.3 The ACTUAL size of an image called 'google.jpg' is 1080x900.
This image should display smaller when the following HTML code is executed:
8.4.1 Give the term for the feature that was applied to give the 'Value error' dialog as a
result. (1)
8.4.2 What is the purpose of the dropdown buttons next to the column headings in the
image? (1)
8.4.3 A named range has been defined in the spreadsheet above. What is this named
range called? (1)
8.4.4 You need to export the data in the spreadsheet to a database. Which field would
you choose as a primary key? Explain the reason for your choice. (2)
[15]
November 2018
8.1 Give ONE reason why words such as 'color' and 'favor' (instead of the expected
'colour' and 'favour') are NOT identified as spelling errors when you do a spell
check on a word processing document. (1)
8.2 Give TWO possible reasons why a main mail merge document fails to load the
data source when you are trying to open it. (2)
(3)
8.4 How would you ensure that another user can NOT enter data into certain cells in
a spreadsheet? (1)
8.5 The following error message is displayed in a spreadsheet cell: #VALUE!
Explain how you would correct the error that causes the message above to
appear. (2)
8.6 The two underlined arguments in the function below prevent the function from
working correctly when copied down:
November 2019
8.1 Give ONE benefit of using styles for headings in a long word processing
document. (1)
8.2 Suggest TWO reasons for using section breaks in a word processing document. (2)
8.3 Name TWO word processing features that a reviewer can use to indicate
suggested changes to the author of a document. (2)
8.6 What does the exclamation mark (!) in the formula bar for cell E1 indicate in the
screenshot below?
(1)
8.7 Study the screenshot below. The formula used in cell D3 to obtain the time
worked is correct, although it is not displaying the correct answer.
What cell formatting must be applied to cell D3 to obtain the correct answer of 2
hours? (1)
8.8 The formula in cell B2 was copied down to calculate the VAT (cell E1) for all
amounts in column A.
8.10 What would happen if a =COUNT(*) function was moved from the group footer
to the report footer in a database? (1)
8.11 What needs to be done for the text 'December holidays' to display on a web
browser tab?
(1)
[15]
1. ● Show/Hide
2. ● Section break
5. ● Excel keeps specific rows and columns in place when you scroll
through the spreadsheet.
● Helps to view a lot of records more easily .
6. ● Percentages of a whole.
Activity 2
3.1 ● The sum range is in the wrong place inside the function
3.2 ● =Sumifs(H2:H50,C2:C50,">100",F2:F50,"RUGBY")
5. With a First line indent, only the first line in a paragraph is indented, but with
7. ● Styles
Activity 3
2. We would want to create form letters in order to mail merge data to be sent to
multiple recipients ✓ by emailing them or printing the letters.
(Recipients would only receive letters with data relating to them or their
accounts.)
4. Line chart
1.2 =IF(D2>=4,D2*180,D2*100)
● ,
● D2
● *100
5. Such criteria will give results where the cells of a field are not empty.
6. A tab leader helps to lead the eye in order to make a document more
readable.
7. A language error.
8. A Thesaurus
Activity 5
1.3 ● One
6. ● By using a list box it will speed up the entering of data into a table
● By using a list box it will help to eliminate data entry errors
Activity 6
1. You are sure that this word contains no spelling errors. It might be a name or
a place
2. Headers and footers are useful to display information you wish to see on top
or bottom of each page. (Do not except examples without explaining)
4. ● Between 18 AND 50
Will only allow numbers from and including 18 up until 50.
● <=18 OR >=50
Will allow numbers from 18 downward or from 50 upward.
6. Required
7. A label
Activity 7
3.1 Currency
3.2 ● Surname
● Name
● Age
● Camp Fee
Reason: None of these fields will require unique data
4. If you only select a field and its data, only that field and data would be sorted
7. =RANDBETWEEN✓(1✓,50✓)
November 2012
7.1.2 ● Merge
● Merge and Center
● Merge Cells (Open Office)
✓(Any one) 1
7.1.4 ● Import
● Copy and paste
● Copy
✓(Any one) 1
[13]
November 2013
(Note to marker: Marks are not allocated to the applications but to the use
of the applications related to small businesses.)
✓✓(Any two)
(Note to marker: Accept any response related to the fact that some
computers may have been set up to accept a decimal comma so for
example, an incorrect formula was used.) 2
[8]
November 2014
8.2.1 ● *business*
● Use an asterisk ✓ on both sides ✓ of the word business
(Note to marker: Ignore if the LIKE operator has been added. Allocate one
mark if the answer refers to wildcards only. Accept variations of the word
business) 2
✓✓(Any two) 2
[15]
November 2015
(Note to marker: Do not accept 'older than 60' for the first mark.) 2
✓(Any one) 1
8.4.1 ● To comment/document ✓
8.4.2 ● None of the content within the HTML comment tag is displayed ✓
8.5 ● The text that is displayed if for any reason the image cannot be
displayed ✓ 1
8.6.1 The Stock ID field has already been set as the primary key ✓ 1
8.7.2 ● Description ✓ 1
[15]
8.1.2 The error occurs because the formula tries to multiply a number by text (a
word). ✓ 1
8.3 ● Formatting only gives the appearance of being rounded off, while
the actual value is not changed/The ROUND function changes the
actual value ✓ 1
8.4.1 ● Styles ✓ 1
✓(Any one) 1
8.7 ● The text between title tags ✓ within the head section is indicated in
the browser tab 1
8.10 ● It has no effect on the values in the database table/ The values in
the database table remain the same ✓ 1
[15]
November 2017
(Note to marker: Accept responses that refer to right click and selecting the
correct option as well as selecting the "Ignore/Ignore all" option)
✓✓(Any two) 2
8.3.2 ● The dimensions specified are not in keeping with the aspect ratio
● The balance between height and width is wrong
✓(Any one) 1
8.3.3 ● The blind user will not be able to understand what the picture is 2
8.4.2 It indicates the use of a filter/Gives a list of options for items to display ✓ 1
8.4.4 ● Property ✓
● Unique field/ No duplicate in this field ✓ 2
[14]
November 2018
8.3
FIELD NAME DATA TYPE
8.5 ● Replace text in referenced cell(s) with a valid number ✓/Ensure that
referenced cell(s) do not contain text
● Make reference to the correct cell ✓ 2
8.6 =VLOOKUP(A1,$L$1:$M$5,2,FALSE)
2
[15]
November 2019
8.2 ● Wish to change the page orientation of the document from certain
point onward
● Changes to header or footer from certain point onward
● Changes to page margins from certain point onward
✓✓(Any two) 2
8.5 ● View Page break preview and Move the page break preview lines
to the suitable column and row ✓ 1
8.6 ● The (!) indicates the specific sheet's name that will be used - data!
sheet ✓ 1
8.9 ● Square brackets references the field names inside the table that 1
8.10 ● The total number of records over the whole report would be
counted ✓ 1
8.11 ● The <title> tag should be move to the front of December holidays ✓ 1
[15]