Activity 1
Activity 1
A. Patch
B. Service pack
C. Signature
D. Update (1)
A3
While A > 0 do
….
A Power (A,0) - 1
End while
A. Once
B. Never
C. Infinite times
D. Three times
(1)
1.1.3 Which ONE of the following statements about Bittorrent is
incorrect?
A. SSL
B. FTP
C. AUP
D. DRM (1)
Page 1 of 12
ACTIVITY 1
A. Scalability
B. Virtualisation
C. RAID
D. Convergence (1)
1.2 Give ONE word/term for each of the following descriptions. Write only the
word/term next to the question number (1.2.1 –1. 2.10) in the answer book.
1.2.1 The number system that uses the digits 0 and 1. (1)
1.2.3 The amount of data that an ISP (Internet Service provider) allows one
to upload and download in a month. (1)
1.2.5 The term used when the functions of more than one device are built in
to a multifunctional device. (1)
1.2.6 The use of complex algorithms to group and sort through big data to
discover interesting and unknown patterns of information. (1)
1.2.8 The term used to describe the decision making process which relies
on probabilities, for example if it is overcast and cloudy, do not swtich
on the sprayers as it will probably rain. (1)
1.2.10 The process that is used to ensure that the website appears at the top
of a list of searches returned by the search engine in order to
maximise the number of visits to a website. (1)
Page 2 of 12
ACTIVITY 1
Scenario
Only people with a valid South African ID document can vote in the national elections
in 2019. Matriculants that will write the National Senior Certificate examination must
also be in possession of a valid South African ID document. The department of Home
Affairs is investigating the possibility of using a mobile office that will visit schools to
process ID applications.
2.1.2 How does the battery life of a laptop compare with that of a tablet? (1)
2.5 The laptop has 1.5 TB hard disk drive as well as a 128 GB Solid State Drive.
On which ONE of the two storage media is the operating system stored?
Motivate your answer. (2)
2.6 The mobile office will make use of cloud computing only. The data that
Page 3 of 12
ACTIVITY 1
is captured must be backed up.
2.6.1 Give TWO reasons why a portable hard drive should not be used as a (2)
backup?
Name TWO risks for the user associated with the service provider. (2)
2.7 It is in the interest of an organisation to always make use of the latest software.
For this reason they make use of SaaS which means that they rent the
software instead of purchasing it.
2.8 Any company will protect their network with a Firewall, an anti-virus program
and regular updating of applications software.
2.9 Robotics is one of the fastest developing fields and is increasingly making an
impact on our lives.
Page 4 of 12
ACTIVITY 1
The mobile office that will process the ID applications will use three computers, a printer, a
camera and a biometric scanner connected in a network.
3.1 State the purpose for the use in the office of each of the following:
3.2 When they are working in urban areas, the office will connect to the Internet
with Neotel WiMax. The service provides a bandwidth of 8 Mbps.
3.2.3 Name ONE alternative technology that could be used by the mobile
office to connect wirelessly to the Internet. (1)
3.3 The mobile office will collect the information and store the data on the server
at the main office. A Virtual Private Network (VPN) will be used.
3.3.1 Give a short description of how a VPN is used to gain access to the
network. (2)
3.3.2 How does the security on the computer in the mobile office compare
with that of the server computer to which it is connecting? (1)
Page 5 of 12
ACTIVITY 1
3.5.2 The hard disk can be encrypted using local encryption software and a
password.
3.5.5 Both the private key and the public key play a role in encryption.
3.6 Nowadays modems and routers are combined into one device. There is
nevertheless a difference between the function of a modem and the function
of a router.
Page 6 of 12
ACTIVITY 1
4.1.2 Use the above table to give an example of data validation. (1)
4.2.1 Refer to the design of the above table to motivate how normalisation
will lead to more effective database management. (2)
4.2.2 What is the purpose of the primary key in a database table? (1)
4.2.3 Explain what the function of the foreign key is. (2)
4.3.1 Give TWO reasons why it will not be practical for many users to try to
access a single database on a single server. (2)
4.3.2 Name TWO models that can be used for data synchronization in a
distributed database. (2)
Name TWO challenges that companies may experience when working with
BIG DATA. (2)
Page 7 of 12
ACTIVITY 1
4.5 New applications for schools in a certain town are stored in tables in a
database. There is a one to many relationships between tblApplicant and
tblSchool. Study the layout of the tables given below:
tblApplicant tblSchool
Key ID-number Text[13]
Key SchoolID Text [5]
Surname Text [20]
Name Text [20] Schoolname Text [20]
SchoolID Text [5] Adress Text [20]
Paid Yes/No Telno Text [10]
Contactperson Text [20]
4.5.2 Display the ID numbers of all people who have paid. (4)
4.6 During a conversation with the database administrator, it was indicated that
data independance and data security should be implemented.
Page 8 of 12
ACTIVITY 1
5.1 Each school generated a list of learners that still do not have ID documents
and stored the data in a text file.
• Each following line contains the name of the learner and the ID number
that appears on the birth certificate. The two fields are separated by a %
symbol.
5.1.1 Name and describe ONE type of error that can occur during the process
of coding a program. (2)
5.2 During the testing phase of the program, the following error message
appeared:
5.2.2 Name TWO ways that a programmer can ensure that the user will not
be able to enter alphabetic characters when the program is expecting
numbers to be entered. (2)
Page 9 of 12
ACTIVITY 1
5.3 The following data structures can be used to store data during
programming:
• Two-dimensional array
• Array with string values
• String variable
Decide which ONE of the above data types will be suitable for each of
the following examples.
5.4 Study the UML diagram that follows. clsApplicant will be used to test
the validity of the ID number and to calculate the age of the applicant.
clsApplicant
Attribute Methods
- fID : Integer + constructor(ID,Naam,Van)
- fSurname : string + TestID
- fName : String + CalculateAge
-fValid : boolean + toString : string
5.4.4 What is the function of the tostring method in the class? (2)
5.4.5 Explain how the value of the private field, fValid can be changed. (2)
Page 10 of 12
ACTIVITY 1
SECTION F: INTEGRATED SCENARIO
QUESTION 6
Home Affairs placed the information about the visits to all the schools on their website.
A short information video can be streamed. Prospective applicants must show a birth
certificate and pay R60.
Name TWO aspects of a web browser that must be adapted so that it can be
viewed on a mobile device. (2)
Name THREE advantages of using apps as opposed to mobile web browsers. (3)
6.3 Name TWO characteristics of media files that can be streamed. (2)
6.4 Briefly explain how scalability handles the problem of increased traffic to a
website. (3)
Briefly explain how one can trace a computer from which a message was
transmitted. (2)
6.8 The service offered by Home Affairs is a good example of how ICT is used by
the government to improve its services.
Give TWO other examples where ICT is used to improve the services of the
government. (2)
6.9.1 The web page is compiled following the users profile and personal
settings.
6.9.2 Where are the Javascript program instructions carried out? (1)
6.9.3 Where are the personal settings of the client stored? (1)
Page 11 of 12
ACTIVITY 1
6.10 Lost ID-documents can be used for Identity theft.
Give an example of the crime that takes place when identity theft is involved. (2)
6.11 Data security is a priority in the mobile office. Unauthoirised access and loss
of data or corruption of data must be minimised.
Give TWO methods, besides securing against physical theft, in which the
organisers can ensure that the data on this computer is not stolen or that data
access is not unauthorised. (2)
6.13 The IT department wrote an Android app to make the registration process
easier. This app can be downloaded from the Home Affairs server to the
tablets used by the registration officials.
6.13.2 State TWO advantages for guests to download the app from the
school’s network instead of downloading it from the app store. (2)
6.13.3 Many officials are worried that the app might be a Trojan.
Page 12 of 12