0% found this document useful (0 votes)
111 views12 pages

Activity 1

Uploaded by

alwandeshozi40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views12 pages

Activity 1

Uploaded by

alwandeshozi40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

ACTIVITY 1

SECTION A: SHORT QUESTIONS


QUESTION 1
1.1 Different options are provided as possible answers for the following
questions. Choose the correct answer and write only the letter (A – D) next
to the question number (1.1.1 – 1.1.5) in the answer book, for example
1.1.6 C

1.1.1 A method that can be downloaded to correct a specific error or


bug in software:

A. Patch
B. Service pack
C. Signature
D. Update (1)

1.1.2 How many times will the following loop be executed?

A3
While A > 0 do
….
A  Power (A,0) - 1
End while

A. Once
B. Never
C. Infinite times
D. Three times
(1)
1.1.3 Which ONE of the following statements about Bittorrent is
incorrect?

A. Bittorrent is a peer-to-peer protocol used to share large


files over the Internet.
B. The computers that are used in the process are known
as seeders.
C. The Bittorrent tracker provides a list of all the computers
that are ready to share files with others.
D. The file that is downloaded is divided inrto small Torrent
files. (1)

1.1.4 A method to safeguard digital movies by using a form of


encryption to control access to the contents.

A. SSL
B. FTP
C. AUP
D. DRM (1)
Page 1 of 12
ACTIVITY 1

1.1.5 The type of technology that combines the resources of many


computers to form a single super powerful computer.

A. Scalability
B. Virtualisation
C. RAID
D. Convergence (1)

1.2 Give ONE word/term for each of the following descriptions. Write only the
word/term next to the question number (1.2.1 –1. 2.10) in the answer book.

1.2.1 The number system that uses the digits 0 and 1. (1)

1.2.2 A program that is loaded onto a computer without the knowledge or


permission of the user with the purpose of causing problems. (1)

1.2.3 The amount of data that an ISP (Internet Service provider) allows one
to upload and download in a month. (1)

1.2.4 A part of a larger program that is independently but simultaneously


executed. (1)

1.2.5 The term used when the functions of more than one device are built in
to a multifunctional device. (1)

1.2.6 The use of complex algorithms to group and sort through big data to
discover interesting and unknown patterns of information. (1)

1.2.7 The technology where a cell phone is used to make a payment by


touching the cell phone against a reader that registers the payment
and changes the balance of the user. (1)

1.2.8 The term used to describe the decision making process which relies
on probabilities, for example if it is overcast and cloudy, do not swtich
on the sprayers as it will probably rain. (1)

1.2.9 A standard language that is used to manipulate and query data in a


database. (1)

1.2.10 The process that is used to ensure that the website appears at the top
of a list of searches returned by the search engine in order to
maximise the number of visits to a website. (1)

TOTAL SECTION A: [15]

Page 2 of 12
ACTIVITY 1

Scenario

Only people with a valid South African ID document can vote in the national elections
in 2019. Matriculants that will write the National Senior Certificate examination must
also be in possession of a valid South African ID document. The department of Home
Affairs is investigating the possibility of using a mobile office that will visit schools to
process ID applications.

SECTION B: SYSTEM TECHNOLOGY


QUESTION 2

2.1 DEVICE SPECIFICATION


Laptop Intel Core i7 2.4 GHz CPU
8GB RAM
1.5TB HDD
128 GB SSD
Tablet nVidia Tegra 1.2 GHz CPU
1 GB RAM
32 GB SSD

2.1.1 Name a manufacturer of processors for mobile devices. (1)

2.1.2 How does the battery life of a laptop compare with that of a tablet? (1)

2.1.3 Name TWO advantages of a laptop when comparing it to a tablet. (2)

2.2 Why is it recommended that computers need more RAM to improve


processing? (1)

2.3 Which TWO properties of a CPU would improve a computer’s processing


power? (2)

2.4 Laptops do often have an integrated graphics card.

2.4.1 What is meant by integrated graphics card? (1)

2.4.2 Laptops often contain an integrated graphics card as well as a


separate graphics card. Explain how this combination saves battery
power. (2)

2.5 The laptop has 1.5 TB hard disk drive as well as a 128 GB Solid State Drive.

On which ONE of the two storage media is the operating system stored?
Motivate your answer. (2)

2.6 The mobile office will make use of cloud computing only. The data that

Page 3 of 12
ACTIVITY 1
is captured must be backed up.

2.6.1 Give TWO reasons why a portable hard drive should not be used as a (2)
backup?

2.6.2 What does incremental backup mean? (2)

2.6.3 Google Docs is an example of a cloud application.

Name TWO risks for the user associated with the service provider. (2)

2.7 It is in the interest of an organisation to always make use of the latest software.
For this reason they make use of SaaS which means that they rent the
software instead of purchasing it.

2.7.1 Expand the acronym SaaS? (1)

2.7.2 Give a complete description of the role of the Internet, if the


organisation makes use of SaaS. (2)

2.8 Any company will protect their network with a Firewall, an anti-virus program
and regular updating of applications software.

2.8.1 What is the purpose of a Firewall? (1)

2.8.2 Why is it necessary to update application software? (1)

2.9 Robotics is one of the fastest developing fields and is increasingly making an
impact on our lives.

2.9.1 Give ONE advantage of developing robotics software. (1)

2.9.2 Give ONE disadvantage of developing robotic software without referring


to your answer in 2.9.1. (1)

TOTAL SECTION B: [25]

Page 4 of 12
ACTIVITY 1

SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES


QUESTION 3

The mobile office that will process the ID applications will use three computers, a printer, a
camera and a biometric scanner connected in a network.

3.1 State the purpose for the use in the office of each of the following:

3.1.1 Biometric scanner (1)

3.1.2 Camera (1)

3.2 When they are working in urban areas, the office will connect to the Internet
with Neotel WiMax. The service provides a bandwidth of 8 Mbps.

3.2.1 What is the difference between Wi-Fi and WiMax? (1)

3.2.2 What is a public Wi-Fi access point called? (1)

3.2.3 Name ONE alternative technology that could be used by the mobile
office to connect wirelessly to the Internet. (1)

3.3 The mobile office will collect the information and store the data on the server
at the main office. A Virtual Private Network (VPN) will be used.

3.3.1 Give a short description of how a VPN is used to gain access to the
network. (2)

3.3.2 How does the security on the computer in the mobile office compare
with that of the server computer to which it is connecting? (1)

3.4 Communication with the main office will be via e-mail.

State the protocol which is used to

3.4.1 send e-mail. (1)

3.4.2 download e-mail. (1)

Page 5 of 12
ACTIVITY 1

3.5 Data can be stolen by intercepting communications or with spyware that is


installed on the computer. Preventative measures such as SSL and
encryption can prevent this.

3.5.1 Define the term encryption. (3)

3.5.2 The hard disk can be encrypted using local encryption software and a
password.

Name ONE disadvantage of this method. (1)

3.5.3 Expand the acronym SSL. (1)

3.5.4 Name TWO characteristics of a webpage that is protected by SSL. (2)

3.5.5 Both the private key and the public key play a role in encryption.

Briefly explain the role of both these keys. (2)

3.6 Nowadays modems and routers are combined into one device. There is
nevertheless a difference between the function of a modem and the function
of a router.

State the function of each of the following:

3.6.1 Modem (1)

3.6.2 Router (2)

TOTAL SECTION C: [22]

Page 6 of 12
ACTIVITY 1

SECTION D: DATA- AND INFORMATION MANAGEMENT


QUESTION 4

Information is stored in a database as shown in the diagram below:

4.1 Data validation is important during the design phase of a database.

4.1.1 Define data validation. (2)

4.1.2 Use the above table to give an example of data validation. (1)

4.2 Normalisation of a database prohibits data duplication.

4.2.1 Refer to the design of the above table to motivate how normalisation
will lead to more effective database management. (2)

4.2.2 What is the purpose of the primary key in a database table? (1)

4.2.3 Explain what the function of the foreign key is. (2)

4.3 A distributed database is spread over various severs.

4.3.1 Give TWO reasons why it will not be practical for many users to try to
access a single database on a single server. (2)

4.3.2 Name TWO models that can be used for data synchronization in a
distributed database. (2)

4.3.3 Explain how data integrity is ensured when processing transactions in


a distributed database. (2)

4.4 BIG DATA is one of the new fields under investigation.

Name TWO challenges that companies may experience when working with
BIG DATA. (2)

Page 7 of 12
ACTIVITY 1

4.5 New applications for schools in a certain town are stored in tables in a
database. There is a one to many relationships between tblApplicant and
tblSchool. Study the layout of the tables given below:

tblApplicant tblSchool
Key ID-number Text[13]
Key SchoolID Text [5]
Surname Text [20]
Name Text [20] Schoolname Text [20]
SchoolID Text [5] Adress Text [20]
Paid Yes/No Telno Text [10]
Contactperson Text [20]

Write a SQL statement for each of the following:

4.5.1 Display all the fields in the table tblSchool. (2)

4.5.2 Display the ID numbers of all people who have paid. (4)

4.6 During a conversation with the database administrator, it was indicated that
data independance and data security should be implemented.

4.6.1 What does data independence mean? (1)

4.6.2 Suggest TWO ways of implementing data security. (2)

TOTAL SECTION D: [25]

Page 8 of 12
ACTIVITY 1

SECTION E: SOLUTION DEVELOPMENT


QUESTION 5

5.1 Each school generated a list of learners that still do not have ID documents
and stored the data in a text file.

The layout of the text file is as follows:


• The first line contains the name of the school

• Each following line contains the name of the learner and the ID number
that appears on the birth certificate. The two fields are separated by a %
symbol.

Example of data in the text file:

Miranda High School


Mapula%0108142525089
Susan%0202020042085
Peter%0212155523087
.
.
.

5.1.1 Name and describe ONE type of error that can occur during the process
of coding a program. (2)

5.1.2 Write an algorythm to execute the following steps:

• Read the contents of the file


• Determine which learners turn 16 years old in the current year.
• Display the names of the learners who will turn 16. (13)

5.2 During the testing phase of the program, the following error message
appeared:

'execution halted – an overflow error occurred'

5.2.1 Explain when an overflow error will occur. (1)

5.2.2 Name TWO ways that a programmer can ensure that the user will not
be able to enter alphabetic characters when the program is expecting
numbers to be entered. (2)

Page 9 of 12
ACTIVITY 1

5.3 The following data structures can be used to store data during
programming:

• Two-dimensional array
• Array with string values
• String variable

Decide which ONE of the above data types will be suitable for each of
the following examples.

NOTE: Each data structure can be used once only.

5.3.1 A list of all the schools in Limpopo. (1)

5.3.2 The name of the contact person in the school. (1)

5.3.3 The number of applications per school in each town. (1)

5.4 Study the UML diagram that follows. clsApplicant will be used to test
the validity of the ID number and to calculate the age of the applicant.

clsApplicant
Attribute Methods
- fID : Integer + constructor(ID,Naam,Van)
- fSurname : string + TestID
- fName : String + CalculateAge
-fValid : boolean + toString : string

5.4.1 Which ONE of the methods is a mutator method? (1)

5.4.2 Why are the attributes declared as private? (1)

5.4.3 What is the purpose of the public methods? (1)

5.4.4 What is the function of the tostring method in the class? (2)

5.4.5 Explain how the value of the private field, fValid can be changed. (2)

TOTAL SECTION E: [28]

Page 10 of 12
ACTIVITY 1
SECTION F: INTEGRATED SCENARIO
QUESTION 6

Home Affairs placed the information about the visits to all the schools on their website.
A short information video can be streamed. Prospective applicants must show a birth
certificate and pay R60.

6.1 Many young people use cell phones to access websites.

Name TWO aspects of a web browser that must be adapted so that it can be
viewed on a mobile device. (2)

6.2 Many people choose apps over traditional websites.

Name THREE advantages of using apps as opposed to mobile web browsers. (3)

6.3 Name TWO characteristics of media files that can be streamed. (2)

6.4 Briefly explain how scalability handles the problem of increased traffic to a
website. (3)

6.5 This website can be described as static.

What is a static website? (1)

6.6 Nothing on the Internet is private, anonymous or untraceable.

Briefly explain how one can trace a computer from which a message was
transmitted. (2)

6.7 Explain the concept of web caching. (2)

6.8 The service offered by Home Affairs is a good example of how ICT is used by
the government to improve its services.

Give TWO other examples where ICT is used to improve the services of the
government. (2)

6.9 Javascript is used as client-side scripting during the setup of a webpage.

6.9.1 The web page is compiled following the users profile and personal
settings.

Briefly explain how the web page is set up. (2)

6.9.2 Where are the Javascript program instructions carried out? (1)

6.9.3 Where are the personal settings of the client stored? (1)

Page 11 of 12
ACTIVITY 1
6.10 Lost ID-documents can be used for Identity theft.

Give an example of the crime that takes place when identity theft is involved. (2)

6.11 Data security is a priority in the mobile office. Unauthoirised access and loss
of data or corruption of data must be minimised.

What precautions should be put in place in each one of the following to


ensure data is security:

6.11.1 Power cuts. (1)

6.11.2 Computers that are stolen. (1)

6.11.3 GIGO (Garbage In Garbage Out) (1)

6.11.4 Access to the software must be restricted to certain personnel. (1)

6.11.5 Hard disk failure. (1)

6.12 The data on the administration computer must be kept confidential.

Give TWO methods, besides securing against physical theft, in which the
organisers can ensure that the data on this computer is not stolen or that data
access is not unauthorised. (2)

6.13 The IT department wrote an Android app to make the registration process
easier. This app can be downloaded from the Home Affairs server to the
tablets used by the registration officials.

6.13.1 What is the general role of a server in any network? (1)

6.13.2 State TWO advantages for guests to download the app from the
school’s network instead of downloading it from the app store. (2)

6.13.3 Many officials are worried that the app might be a Trojan.

What is a Trojan AND how is it generally installed? (2)

TOTAL SECTION F: [35]

Page 12 of 12

You might also like