English Test 1 The Test
English Test 1 The Test
1. The following test MUST be handwritten on the TDA answer book found under termly planners.
2. Please write neatly and legibly in blue ink.
3. Write your name and surname on each page.
4. Number each page.
5. Do not submit the question paper with the answer book.
6. The completed test MUST be scanned and submitted in full colour.
7. Submit as a SINGLE PDF document into the correct portal.
8. Make sure it is submitted in the correct page order and all pages are upright.
9. It is the responsibility of the learner to ensure that the script upload was correct and successful.
10. Tests and examinations must be uploaded within 30min of completion.
11. CamScanner can be used on your phone to assist in the scanning process.
12. A friendly reminder to NOT submit any formal assessments using your cellular devices, please
view our technical specifications on our website. ALWAYS opt for a laptop or desktop computer.
13. Submit using the following URL, https://za.thinkdigitalacademy.org/login
If you are still struggling to submit, contact the FET department before 16:30 on the day of the
submission, so we can assist you on the same day. Late submissions will result in a 0.
Invigilation
All formal tests and examinations must be invigilated according to Think Digital Academy’s Invigilation
policy. Learners are to make use of the INVIGILATOR APP.
• Instructions and training can be found under Termly Planners and Notices.
• Each test and examination will have its own unique QR-code to grant access to the invigilation
session. (See page 2 of your test or examination)
• Tests and examinations must be uploaded within 30min of completion.
• Uploading of the Invigilation App data must be done by 23:00 the day of the test or examination.
Term 4 English HL Paper 1 Gr 11 2024
Ensure you are connected to the internet in order to log into The Invigilator PC and type in YOUR EXAM QR CODE & EXAM
the exam access code visible below the QR code on this page. ACCESS CODE
Unless otherwise specified by your institution, note that you can only enter the exam
access code once. If your assessment has multiple online sections, tests or attempts, you
should NOT finish the invigilation until your entire assessment has been completed.
Only type in the exam access code when the assessment formally commences.
The exam access code can only be typed in for a limited time and it should therefore
be typed in as soon as possible to start the invigilation.
Once the exam access code has been entered, ensure your media volume is turned up.
The Invigilator PC will notify you with a notification beep when you are required to take a Exam Access Code: 946aaf1d
selfie, which you should then perform.
We recommend that you keep your PC on charge for the duration of the assessment.
Keep The Invigilator PC open on your PC for the full duration of the assessment. You are not allowed to close the app prior to
completing your assessment.
Ensure you are connected to the internet in order to commence the invigilation as well as at the end of the assessment. No internet
connection is required during the assessment.
You have to adhere to the assessment time limit communicated to you by your institution as the time displayed in The Invigilator
PC could differ from the time allocated to complete your assessment.
You can click the "Finish Assessment" button in the app if you finish your assessment early.
Uploading of app data at the end of the invigilation is not time sensitive and you can come back and do it later should you not have an
internet connection at the end of the invigilation. Please make sure to adhere to the cut-off period that your institution allows.
Should you encounter any technical difficulty, please WhatsApp The Invigilator Helpdesk on 073 505 8273.
ENGLISH HOME LANGUAGE
GRADE 11
TERM 4
(LANGUAGE)
Total : 70
Examiner : M. Fouche
Moderator : A. Cunnington
6. Number the answers correctly according to the numbering system used in this
question paper.
SECTION A: 50 minutes
SECTION B: 25 minutes
SECTION C: 45 minutes
SECTION A: COMPREHENSION
TEXT A
1. What about the creep who’s after the kids? The Internet is in many ways
a mirror of the real world. In the same way that an unsavoury character
with unsavoury motives hangs about in the physical world – whether they
be a political extremist, sex fiend or merely a social misfit – you will find
them in the electronic world, too. 5
3. But that, in turn, implies than any legal weaponry aimed at controlling
such evil would have a far wider impact than merely silencing a source of
illicit activity.
4. There are numerous clues that suggest that the censorship debate is 15
about control of the Internet rather than protection of the innocent. For
instance, the presence of child pornography is often cited as justification
for censorship of the Internet. As mentioned above, however, these
expressions are already outlawed across the planet and do not require
further legislation. In countries as far apart as the United States, the 20
United Kingdom and South Africa people have been arrested for
distributing child pornography via the Internet. No new laws are needed.
What is needed is better policing of the existing laws, and better co-
operation between police forces in different countries.
6. Yes, there are dangers on the Internet; yes, children can come across
material that offends them, or after diligent searches find material that 35
they can willingly allow corrupting them; and yes, there are people out
there who would like to prey on children who innocently venture out on to
the unchartered waters of the cyber sea.
7. But so it is in the physical world, too. The only way to ensure absolute
safety in the physical world is to cocoon children, cut them off from the 40
outside world, and watch their every move. Failing that, you would need
to shut down shopping malls, libraries and even schools, in case anything
offensive might be read, heard, or seen.
9. The bottom line is that there is a price to pay for the communications 50
miracle wrought by the Internet. If you do not want society to pay the price
– unfettered access to all things good and bad – there may be an even
worse price to pay, namely restriction of freedoms that extend far beyond
the right to view dirty pictures.
AND
TEXT B
[www.statista.com]
QUESTIONS: TEXT A
1.1 Discuss the meaning of ‘creep’ (line 1) within the context of the text. (2)
1.3 Explain why the electronic universe is more dangerous than the physical
universe. (2)
1.5 Say what South Africa has in common with the old Soviet Union. (1)
1.6 Refer to paragraph 6. Explain how the repetition of ‘yes’ in this paragraph
contributes to the meaning of Text A. (3)
1.7 Refer to lines 37-38: ‘children who innocently … the cyber sea.’
1.8 Account for the writer’s suggestion to close shopping malls, libraries, and
schools. (2)
1.9 Discuss how the diction in the final two paragraphs illustrates the writer’s
attitude towards the internet. (3)
1.10 Do you agree with the writer’s opinion in paragraph 9? Justify your (3)
response.
QUESTIONS: TEXT B
1.12 To which extent does Text B complement Text A? Explain your answer. (2)
1.13 In your opinion, which one of these two texts is more effective? Justify
your response by referring to BOTH texts. (3)
So much of our daily life revolves around the internet, from work to education and even
talking with friends. To avoid online dangers, internet safety tips are essential.
Although using public Wi-Fi is not recommended, it’s sometimes unavoidable. You have
no direct control over its security, which could leave you vulnerable. If you are using
public Wi-Fi, avoid carrying out transactions that use sensitive data, such as online
banking.
Passwords are one of the biggest weak spots when it comes to cybersecurity. People
often choose passwords that are easy to remember and, therefore, easy for hackers to
crack with hacking software. Select strong passwords that are harder for cybercriminals
to crack
Multifactor authentication (MFA) is an authentication method that asks users to provide
two or more verification methods to access an online account. For example, instead of
simply asking for a username or password, multifactor authentication goes further by
requesting additional information.
By using the latest versions of your operating systems and apps, you will benefit from
the latest security patches. For any website you visit, especially ones you transact with
(such as e-commerce sites), it's crucial that they are reliable.
You can take charge of how much information third parties can access. Both web
browsers and mobile operating systems have settings to protect your privacy online. It’s
worth taking a while to review your privacy settings across the board and make sure
they are set to a level you are comfortable with.
A careless click can expose your personal data online or infect your device
with malware. That’s why it's essential to browse consciously and avoid certain types of
online content – such as links from untrusted sources and spam emails. People you
meet online are not always who they claim to be. Fake social media profiles are a
popular way for hackers to groom unwary internet users and pick their cyber pockets.
Apply the same caution in your online social life as you would for your in-person social
life. [Adapted from: www.kaspersky.com/]
Study the advertisements (TEXT D and TEXT E) and answer the questions that follow.
TEXT D
innocenceendanger.org
[www.adweek.com]
AND
[www.actionagainstabuse.wordpress.com]
QUESTIONS: TEXT D
3.1 Identify the target audience of this advertisement. Give a reason for your
answer. (2)
3.2 Discuss how the visuals contribute to the meaning of the advertisement. (2)
QUESTIONS: TEXT E
3.4 Describe TWO techniques which are used to grab the viewer’s attention. (2)
[10]
TEXT F
[www.thecomicstrips.com]
QUESTIONS: TEXT F
4.3 Account for the grandmother’s body language and facial expressions in
frames 1-3. (3)
4.5 Discuss the effectiveness of the grandmother’s words in the final frame. (2)
[10]
Read TEXT G, which contains deliberate errors, and answer the questions that follow.
TEXT H
CATFISHED!
2. Another catfish, Lucia Cole, seemed poised for musical stardom, with a
popular social media presence, interviews with press, and rumours that
she had collaborated and worked with people like Drake and Ariana
Grande. There was just one little hicup: Cole didn't exist. To make the
whole story even more complex, the person behind Lucia Cole was 10
running the same scam with numerous other "singers," stealing and re-
uploading old music and using photos of various models on social media.
3. And finally, we have Uma Kompton, a woman with popular social media
accounts that advertises her original music. Of course, this being the
internet, Uma Kompton does not exist. The pictures showing "Uma" were 15
actually stolen from woman in Russia who had originally posted them to
VK, a Russian social media site. After BuzzFeed reported on the
fraudulent accounts, her Twitter was suspended. Her Instagram account
remains active, however.
[www.buzzfeednews]
QUESTIONS: TEXT G
5.3 Refer to lines 6-8: ‘Another catfish, Lucia… and Ariana Grande.’
5.5 My teacher said, “The person behind the Lucia Cole scam was running
the same scam with numerous other singers.”
5.7 Provide a homophone for ‘site’ (line 17) and use it in a sentence to
illustrate its meaning. (1)
5.8 Refer to lines 17-18: ‘After BuzzFeed reported on the fraudulent accounts,
her Twitter was suspended.’
[10]