GRADE 10
COMPUTER APPLICATIONS TECHNOLOGY P2
MARKING GUIDELINES
31 OCTOBER 2024
MARKS: 120
This marking guidelines consists of 15 pages.
October 2024 2 Marking guidelines.
QUESTION 1
QUESTION 2
1.1 C
2.1 D
1.2 H
2.2 C
1.3 J
2.3 B
1.4 A
2.4 C
1.5 B
2.5 B
1.6 K
2.6 C
1.7 D
2.7 A
1.8 M
2.8 C
1.9 G
2.9 C
1.1 L
0 2.1
B
0
[10]
[10]
QUESTION 3
3.
1 True
3.
2 False – CC
3.
3 True
3.
4 False – Piracy
3.
5 False – Phishing
[5]
October 2024 3 Marking guidelines.
October 2024 4 Marking guidelines.
QUESTION 4 (SYSTEM TECHNOLOGIES: GENERAL CONCEPTS)
Which computer has a more powerful CPU? Give two reasons.
Computer B (3)
4.1
Reasons:
Higher speed
More cores
i7 or more powerful the i3
the i7 CPU is a newer generation (13th) than the i3 (12th)
(Any TWO)
What is the operating system of these computers?
Windows or Windows 11 (1)
4.2
Besides managing the hardware and software of a computer, what are
two other functions of an operating system?
4.3 Maintaining security (2)
Provide a user interface
File management
(Any TWO)
Give ONE advantage of choosing a laptop in for university.
4.4 Portability – lightweight and easy to carry around (1)
Convenience: - Can operate on battery when not close to
power outlet
Space Efficiency – laptops take up less space than desktops,
which is ideal for hostel rooms, and having more space on
your desk
(Any ONE)
Other than outdated technology that people hardly use, give two
reasons why manufacturers do not include optical drives in most new
laptops?
4.5 Allows the manufacturer to increase the size of the battery (2)
Allows the manufacturer to add more ports
The optical drive uses more power, decreasing the battery life
of the laptop
Allows the manufacturer to make the laptop thinner and
lighter
(Any TWO)
October 2024 5 Marking guidelines.
Since the laptop will not have an optical drive, name TWO other ways
that software can be loaded onto the laptop.
4.6 Downloaded over the internet (2)
Transfer through USB device (memory stick or external hard
drive)
Transfer through Wifi network
(Any TWO)
Which computer has more RAM?
4.7.1 Computer B (1)
Differentiate between memory and storage by giving three differences
between them.
4.7.2 Memory is faster than storage/High accessing speed (3)
Memory is volatile while storage is non-volatile
Storage retains what is stored if the power is switched it,
memory does not.
Memory hold only the files that are in use, while storage
retains all the files of the computer
Memory is more expensive per GB than storage
Memory is electronic, while most storage is magnetic (except
for SSD drives)
(Any THREE)
What is the main difference between DDR4 and DDR5?
4.7.3 Speed – DDR5 is faster (1)
Capacity – DDR5 supports higher capacities
Power Efficiency – DDR5 uses less power
(Any ONE)
Which computer is better suited to studying to be a teacher? Give TWO
reasons.
4.8.1 Computer A (3)
Reasons:
Better battery life
More compact: 15.6” compared to 17”
MS Office 365 is included
Computer B is probably much more expensive considering
the high-end components, which are not required for studying
teaching.
October 2024 6 Marking guidelines.
(Any TWO reasons)
October 2024 7 Marking guidelines.
Give TWO reasons why the other computer is better suited for studying
graphic design?
4.8.2 Graphic design is hardware intensive, so it will require: (2)
A more powerful CPU
Dedicated graphics card (Nvidia GeForce RTX 4080)
More storage (2TB SSD)
More ports
Faster Wi-Fi (Wi-Fi 6)
More Ram
Much better monitor (bigger, higher resolution, IPS Anti-glare)
(Any TWO)
State TWO advantages and TWO disadvantages of a wireless mouse
compared to a wired mouse.
4.9 Advantages (4)
Less clutter
Freedom of movement
Portability
Versatility – can also work with tables that don’t have USB
ports
(Any TWO advantages)
Disadvantages
Requires batteries
Is more expensive and wired mouse
Possibility of signal interference
Easily stolen
(Any TWO disadvantages)
[2
5]
October 2024 8 Marking guidelines.
QUESTION 5 (INTERNET AND NETWORK TECHNOLOGIES)
Define the term network?
Two or more computers and other hardware devices that are linked
5.1 (1)
together through communication channels.
Mention ONE advantage and ONE disadvantage of installing a network?
Advantages:
5.2 (2)
Sharing of files
Sharing of resources
Sharing a single internet connection
Increasing storage capacity
Disadvantages:
Possible exposure to online crime
Viruses, Privacy and security issues
Network maintenance requires specialised knowledge.
(Any one advantage and one disadvantage)
Differentiate between a search engine and a web browser. Give ONE example
in EACH case.
A search engine is a program that is designed to search for
5.3 (4)
information on the world wide web
example: Google, Yahoo, MSN, Bing (Any ONE)
A web browser is an application that allows you to access and
view websites on the Internet
example: Microsoft Edge, Internet Explorer, Google Chrome,
Mozilla Firefox, Apple Safari. (Any ONE)
Identify the domain name from the above email address.
university
5.4. (1)
1
Besides having the word ‘university’ in the email address, how can we tell
this email belongs to an academic institution?
5.4. The ‘ac’ indicates that this is an academic organization (1)
2
What is the Importance of the lock next to this website address?
This indicated that the website is secure.
5.5 (1)
The website is encrypted.
(Any ONE)
[10
]
October 2024 9 Marking guidelines.
October 2024 10 Marking guidelines.
QUESTION 6 (INFORMATION MANAGEMENT)
Explain the difference between a questionnaire and an interview.
A questionnaire is a research instrument consisting of
6.1
a series of questions and other prompts for the
purpose of gathering information from respondents.
An interview is a conversation between two people (2)
(the interviewer and the interviewee) where questions
are asked by the interviewer to obtain information
from the interviewer.
Explain the difference between an open and a closed question and provide
an example of each of the types of questions.
Open-ended questions
6.2
These types of questions have no limits. It
encourages conversation and helps to collect
information regarding the research. Open questions
usually start with the words who, what, where, why,
when and how.
Closed questions
Allow responders to provide quick answers between
the difficult questions. The answer to a closed (4)
question can only be “yes” or “no.” The researcher
has to be careful when asking closed questions
because the answers from the responders can
sometimes be very lengthy.
The following are examples of closed questions:
Are you in grade 10 this year?
Do you live in South Africa?
Are you a boy/girl?
Why is it important to cite all material that we use in your PAT? Give TWO
reasons.
References and citations are methods of giving credit for
6.3
other people’s work that you use as bases for your own
conclusions in a research process. (2)
Making use of citations allow the user to avoid
accusations of plagiarism.
Excluding websites, name TWO other types of sources you can use during
your research.
Written material: Books, newspapers, magazines
6.4 (2)
People: Questionnaires, interviews
Other Web-based content: Videos/podcasts (Any two)
October 2024 11 Marking guidelines.
[10]
October 2024 12 Marking guidelines.
QUESTION 7 (SOCIAL IMPLICATIONS)
Give two netiquette guidelines to be considered when sending an email.
Emails should be clear and contain no errors
7.1 (2)
Do not type in only capital letters
Ensure that attachments do not contain viruses
Make sure attachments are not too big.
Be cautious with sensitive information and avoid
sharing personal details unless absolutely necessary.
Never pass on chain mail, hoaxes or spam.
Emoticons and emojis should only be used in informal
correspondence.
(Any relevant TWO answers)
List three possible signs that your computer is infected by a virus.
Files disappear suddenly
7.2 (3)
computer slows down dramatically.
programs stop working.
new error messages appear
hard drive free space is reduced
computer does not boot up
Frequent crashing or freezing
Battery drained quickly (for a laptop)
(Any relevant THREE answers)
Can you mention two ways ICT can actually help create jobs or improve
employment?
Unemployed people could be encouraged to set up
7.3 (2)
small computer-based businesses for themselves,
since minimal capital expenditure is required.
ICT can be a great help to manage a business more
effectively. If a business is successful and expands, it
can provide work for more people.
ICT can create new job opportunities in fields such as
software development, IT support, digital marketing,
and cybersecurity.
ICT enables remote work, allowing people to work
from home or other locations. This can open up job
opportunities for those who may not be able to
commute or relocate for work, such as individuals in
rural areas or those with disabilities.
ICT provides access to online education and training
programs, helping people acquire new skills and
October 2024 13 Marking guidelines.
qualifications.
(Any TWO valid answers)
What is green computing?
Using computers in a way that is sensitive to the
7.4.1 (1)
environment.
Accept any correct answer
Besides sending documents electronically, how can a school practice green
computing with regards to printing? Give TWO examples.
Print on both sides of the page
7.4.2 (2)
Proofread before printing
Use Recycled paper
Reduce Font and Margin Sizes
Regular maintenance of printers/copiers to reduce
paper wastage due to page jams and poor printing
(Any TWO relevant answers)
[10]
October 2024 14 Marking guidelines.
QUESTION 8 (SOLUTION DEVELOPMENT)
Give two reasons why you would choose to use Save As instead of Save
when saving a document.
When you want to save to a different location/folder
8.1 (2)
When you want to rename the file
When you want to change the format of the file
(Any relevant TWO answers)
Your friend was working on a website, but after making some changes, her
website does not display in browser anymore. Study the screenshot and
mention why this occurred and how to rectify it.
This occurred because the closing title tag is missing
8.2 (2)
the forward slash - “/”, so the whole webpage
became part of the tab title.
Correct the closing title tag: </title>
She was trying to change the background colour of the website, so she
added the code <bgcolour="lightblue"> under the body tag. She does not
understand why it is not working. Please advise her on how to fix it.
Bgcolour need to use American spelling: bgcolor
8.3 (2)
The attribute needs to be added to the body tag:
<body bgcolor=“lightblue”>
Note: also mark correct if a learner rewrote the code
Column D displaying an error #####. What is the error, and how do we rectify
it?
There is not enough space in the cell to display its
8.4.1 (2)
contents
Increase the size of the column
Write the name of the function we would use to count how many people have
not paid.
COUNTBLANK
8.4.2 (1)
Cell E10 is supposed to display the total amount paid but is displaying an
error. What is the cause of this error?
The name of the function is not spelled correctly.
8.4.3 (1)
Undefined Named ranges
Missing Quotation marks
October 2024 15 Marking guidelines.
Incorrect Range Reference
(Any ONE)
Writing out the complete correct function that should be in cell E10.
=SUM (E2:E9)
8.4.4 (2)
Which type of chart is most suited to displaying a trend over time?
Line Chart
8.5 (1)
Why does the picture behave like this when you try to move it, and what can
you do to fix the problem?
It behaves in that way because the text wrapping is
8.6 (2)
set to “In Line With Text”.
To fix this, you must change to text wrapping to Tight
or Square
[15]
TOTAL SECTION B: 70
October 2024 16 Marking guidelines.
QUESTION 9 (INTERGRATED SCENERIO)
Suggest TWO steps he should take to protect his laptop from getting a virus.
Keep your operating system up to date
9.1.1 (2)
Keep your anti-virus up to date
Be careful when installing software from the internet
Do not click on links in pop-ups.
Be careful when opening email attachments
Stay away from unsafe sites, like piracy sites
Don’t install pirate software
(Any relevant TWO answers)
Your brother a user of social media. Advise him of TWO guidelines for using
social media.
Do not give out personal information to people you
9.1.2 (2)
have met online
Do not plan to meet in person with someone you
have only met online.
Be aware not no posting on a social media site is
considered private.
It is acceptable to ignore friend requests
Consider turning off the geotagging function on your
mobile device to keep your location a secret.
Use strong password policies.
Be respectful
Think before you post
Limit screen time to balance online activities with
offline ones.
(Any relevant TWO answers)
He is also concerned about hackers. Name ONE similarity and ONE
difference between Hackers and Cracker.
Hackers and crackers are both types of criminals who
9.1.3 (2)
break into computer systems.
Hackers tend do so more for prestige and recognition
(and are sometimes hired by companies legitimately,
to trace bugs and reveal weaknesses in security
systems). Crackers, on the other hand, have criminal
intent (e.g. removal of copy protection on programs).
October 2024 17 Marking guidelines.
What is biometric security?
Security that uses physical characteristics of a person (1)
9.2.1
as the password
Give TWO examples of biometric devices?
Iris Scanner
9.2.2 (2)
Fingerprint Scanner
Facial recognition System
Voice Recognition System
(Any TWO devices)
What is ONE advantage and ONE disadvantage of using biometric security.
Advantages
9.2.3 (2)
Higher level of security
Much harder to crack
Convenient – no need to remember passwords
(Any valid answer)
Disadvantages
If you injure that physical feature, like your finger, it
will stop working
When you have flu, your voice changes, and therefor
voice recognition stops working
If you need to temporarily give access to someone
else, you cannot (like borrowing the key)
Some types of biometric security are vulnerable to
spoofing, like face recognition incorrectly authorizing
someone who looks similar to you.
(Any valid answer)
October 2024 18 Marking guidelines.
Differentiate between inkjet and LaserJet printers by giving TWO unique
properties of EACH type of printer.
Inkjet printers: LaserJet Printers
9.3.1 (4)
Spray ink droplets on Burns toner onto the
the page page
Cheaper to buy More extensive to buy
More expensive per Cheaper per page
page Better at Black and
Better colour prints White printing
Slower printing Faster printing
Low power usage High power usage
ONE mark per unique property, TWO for each
type
Your brother will need to print high volumes of black and white pages during
his studies. Which type of printer should he buy? Give ONE reason why.
LaserJet Printer
9.3.2 (2)
Reasons:
Better at printing Black and White text
Prints faster
Cheaper when printing high volumes
(Any ONE reason)
A friend recommended that he uses open-source software. What are TWO
disadvantages of using open-source software.
No guarantee of quality or that it works
9.4 (2)
There are often many different versions of the same
product
One can generally only get open-source software
from the internet
Open-source software is not widely used, leading to
compatibility issues
Documentation and support for open-source software
may not be easy to access
Learning curve: it will take extra time to learn to use
programs that you are not used to.
(Any TWO relevant answers.)
Explain the term ergonomics.
The study and design of workplace and equipment used in
9.5.1 (1)
the workplace for the comfort and safety of people in their
work environment.
October 2024 19 Marking guidelines.
Besides sitting upright, give TWO health tips for using computers.
Use ergonomically designed equipment
9.5.2 (2)
Adjust the height of your seat and/or table to sit more
comfortably
Make sure the lighting is adequate
Make sure the ventilation/air circulation is adequate
Make sure your mouse and keyboard are close
together and within easy reach
Make sure the monitor is positioned at the correct
level
Every once in a while, turn your eyes away from the
monitor and focus on something else
Take regular breaks
(Any TWO relevant answers).
He made a backup copy of a new program he bought. Is he guilty of software
piracy?
Motivate your answer by explaining what software piracy is.
No.
9.6 (3)
Software piracy refers to the illegal installation,
copying of proprietary software.
You can generally make one copy for back up
purposes
[25]
GRAND TOTAL : 120