IT Nov 2008 P2
IT Nov 2008 P2
SENIOR CERTIFICATE
GRADE 12
INFORMATION TECHNOLOGY P2
NOVEMBER 2008
MARKS: 180
TIME: 3 hours
4. Number the answers correctly according to the numbering system used in this
question paper.
QUESTION 1
Various options are provided as possible answers to the following questions. Choose
the most appropriate answer and write only the letter (A – D) next to the question
number ( 1.1 – 1.10) in the ANSWER BOOK.
1.1 SPOOLing …
1.2 A cookie is a …
1.5 GIGO …
(i) UPS
(ii) AGP
(iii) 250 W power supply
(iv) Heat sinks on certain motherboard components
TOTAL SECTION A: 10
SCENARIO
The internet has the potential for uses in education, commerce, recreation as well as a
variety of other specialised fields such as the medical field. Although there are many
positive and many negative aspects to the internet we cannot imagine our world
without this vast source of global information at our fingertips.
2.1 The first cache store used in computers was a small high-speed memory
device situated between the CPU and RAM.
2.2 Most users are using their computers for multiple purposes at the same time –
for example today many users are using the internet (downloading) while they
are writing reports or doing other work. Computer hardware has improved
gradually to facilitate this kind of usage. This has been accomplished by
introducing new technology in hardware and by improved CPU design.
2.3 LANs which provide access to the internet are becoming commonplace. At
any given time there can be huge amounts of data moving through the
servers supporting these LANs. The speed and capacity of backing storage is
always a problem. RAID is now a commonly used solution.
2.4 Data stored on the servers must be protected from loss or damage arising
from hardware failure, theft of equipment or user carelessness. To facilitate
this protection backup procedures are used.
(b) What media type should be used for this hardware (in
QUESTION 2.4.1 (a)) and where should it be kept?
2.4.2 Some companies offer a backup solution whereby they will provide
equipment and visit your site to perform backups for you. Suggest
TWO advantages of this solution. (2)
2.5 From time to time one can experience unexpected problems with a computer
connected to the internet. These can range from trivial to catastrophic.
2.5.2 The increased use of the internet means that many more files are
written to and deleted from the hard drive.
(b) Suggest a remedy for the problem in QUESTION 2.5.2 (a). (1)
2.6 One internet solution that has emerged in recent years is on-line software.
For example, an application package such as a word processor and the
storage of processed files are provided on the internet.
2.7 A local business upgraded their computers and donated their old computers
as well as their printers to a school. The school decided to create a small
research centre at the school by setting up a LAN that is connected to the
internet.
2.7.1 There are no drivers available to set up the printers. Suggest TWO
ways to solve this problem. (2)
2.7.2 The LAN will be used to play network games over weekends.
(b) Since there will be internet access they would be able to play
games on-line. What kind of internet connection will be
suitable for this application? Give ONE reason for your choice. (2)
2.7.4 Some of the learners use smart phones to connect to the internet.
Some of these phones use an open-source multitasking operating
system.
2.7.5 Traveling costs are increasing and roads are becoming very
congested. The principal gave permission to configure the LAN so
that teachers can make video calls instead of attending meetings.
TOTAL SECTION B: 56
QUESTION 3: e-COMMUNICATION
3.1.2 Using an example, explain what the purpose of phishing is. (2)
3.2 One way of providing security on certain websites is to use digital signatures.
3.2.1 In what type of site will the use of digital signatures be effective? (1)
4.1 Society has access to global information through the internet. Do you think
the internet can be used to assist governments to handle the HIV/Aids issue?
Substantiate your answer. (2)
4.2 The IT teacher at a certain school makes use of internet technology in the
classroom by requiring learners to do electronic research in class on given
topics.
4.2.2 The teacher requires the learners to do the research and compile a
brief report within one hour of finishing. Most of the learners could
not complete this task in the allotted time because of information
overload. Give TWO hints to learners on how to avoid information
overload. (2)
4.3 Internet technology is being used extensively in the medical field. The
shortage of medical doctors in certain areas has been addressed by making
use of telemedicine. Explain what telemedicine is. (2)
[10]
TOTAL SECTION C: 19
Mothusi has managed to obtain licenses from the large Hollywood studios to sell
downloadable copies of movies online in South Africa. As part of his planning and
setup he needs to create a database to contain information on the people ordering
movies on the internet.
5.1 He has been given a database table design that looks as follows:
FIGURE 5.1
(c) Motivate the choice of this field (and its data type) as a primary
key by comparing it to TWO of the other fields from the given
table in FIGURE 5.1 that you would instinctively want to use
as primary keys. (2)
5.1.2 Mothusi has asked you to examine the database design to make
sure it is as effective and efficient as possible. This means that
you have to normalise the database.
(b) Give him a rule for normalising the database to 2NF (2nd
Normal Form). (1)
(c) Show Mothusi how the table design will change by bringing it
into 2NF. Take the single table (FIGURE 5.1) and split it into
three tables. All the original fields given in the table
(FIGURE 5.1) must appear in your new design. You are
allowed to add extra field(s) to accommodate the
normalisation process.
• The fields that make up the new tables. This must include
all the fields from the original table as well as any extra
field(s) that you will need to achieve 2NF.
• Primary keys (PK)
• Foreign key(s) (FK) (9)
5.1.3 You suggest to Mothusi that the design should include data
validation:
(b) Write out the data validation that you would set for the
following fields in the given table:
5.1.4 Getting data into the database and making sure that it is accurate
is only the first step in making a database work. The real power of
a database lies in how you get information out of it. To do this you
need to know how to query the database. The best way to do this
is to use SQL.
(b) Write out the SQL statements to get the following data from
the table:
5.2 Users who log onto a website to order movies need to create a profile which
includes a user name and a password. You explain to Mothusi that he will
need some programming done to make sure that users' passwords are
sufficiently strong. If a password is not strong enough then the user must re-
enter a new one.
• Minimum of 9 characters
• Must include a number
• May not include the user name
5.3 The website that is being used is a success and Mothusi has expanded his
business to sell mp3 music and e-books as well as movies. He has decided
the program that records the sales from the web-site should now be re-written
to use OOP programming techniques. ItemClass is a class that records
sales and looks as follows:
Fields Methods
• itemCode • setPrice (price)
• costPrice • setTitle (title)
• title • update
• fileName • getFileName
• toString
• getSalesPrice
5.3.2 How would you change the update method to make it receive
values to put into the fields? (2)
5.3.4 Three other classes will be derived from this superclass, namely
MovieClass, BookClass and MusicClass. The process of one class
being derived from another is called inheritance.
TOTAL SECTION D: 45
Copyright reserved Please turn over
Information Technology/P2 13 DoE/November 2008
NSC
QUESTION 6
The Ba Tau BEE consortium has attracted foreign investment and has bought land
next to the Pilanesberg National Park. They plan to construct a five-star game lodge
with a difference; they plan to use ICT to manage the wildlife and the environment and
to keep their guests happy and comfortable.
The lodge will consist of a central complex including a reception office, lounge,
conference venue, curio shop, swimming-pool and dining area. There will be 21
individual two-sleeper units for the guests within a 100 m radius of the central complex
(see the diagram below).
room
room
room
Waterhole
room room
Dining-room
Pool
room
Patio room
Lounge Kitchen
room
room
room
Reception
Conference
room
1
room
Conference
2
room room
room
room room room room room
room
6.1 The following needs to be considered when planning the use of ICT:
(a) Keeping in mind that they must have as little effect on the
environment as possible (that is, no poles or trenches), what is
the only acceptable medium for them to use to provide
network connectivity? (1)
(b) What equipment will they need in the computer room in the
central complex to make access to this medium possible? (1)
6.1.2 Most of the guests will be business people who will want access to
their e-mail and the internet. The computer room at the lodge will
also have to contain the equipment necessary to connect the
network to the internet. This equipment includes:
• A router
• A firewall
• A 3G data communication card
(f) Besides the hardware, explain what else the consortium would
have to do to enable the lodge to connect to the internet? (2)
6.2 Internet use can be frustratingly slow especially if you are accessing an
international site that contains lots of graphic images.
6.2.1 Explain how caching operates to reduce the delay in accessing the
same site on several occasions in a short period of time. (2)
6.2.2 Study the options given below. In each case state whether caching
is suitable or not and give a reason.
6.3 As part of conservation management and to increase efficiency, the lodge will
make sure that all guides and trackers are issued with a smartphone PDA.
This device will include a GPS which will enable the guides to better track and
record the wildlife.
6.3.2 (a) What does the acronym GPS stand for? (1)
How will this make tracking and finding game more predictable
over time? (2)
6.4 There are two waterholes near the lodge site. Both have viewing platforms
and are lit up at night. Both waterholes offer good game viewing opportunities
– especially in the dry season. The consortium decides that this is an asset
that they can make use of for publicity and so they install high-quality
webcams for 24-hour operation at both of the waterholes. They want the feed
from these webcams to be available on the internet.
6.4.2 In order to make the feed available on the internet the consortium
will have to create a web presence for themselves. They will need
the following:
(b) The domain name service makes navigating the internet easy
for humans. Explain how it does this. (2)
www.bataulodge.edu.nz
(i) Explain what the .nz in the name refers to and why this is
unacceptable. (2)
(ii) What does the .edu in the domain name refer to? (1)
6.4.3 Now that the lodge has a web presence the consortium decides
that they want visitors to be able to do direct bookings and
payments through the internet. In order to keep these transactions
secure they need to use SSL.
(a) Name TWO things to look at to make sure that you are visiting
a web site that uses SSL for security. (2)
(d) The lodge manager does not understand RSS and asks you to
explain it to him. (2)
TOTAL SECTION E: 50
Copyright reserved