Vous êtes sur la page 1sur 18

NATIONAL

SENIOR CERTIFICATE

GRADE 11

INFORMATION TECHNOLOGY P2
NOVEMBER 2007

MARKS: 180
TIME: 3 hours

This question paper consists of 17 pages and 1 addendum.

Copyright reserved

Please turn over

Information Technology/P2

2
NSC

DoE/November 2007

INSTRUCTIONS AND INFORMATION


1.

This question paper consists of FIVE questions. Answer ALL the questions.

2.

Read ALL the questions carefully.

3.

Number the answers correctly according to the numbering system used in this
question paper.

4.

Hand in the attached ADDENDUM relating to QUESTION 4.4.1 together with


your ANSWER BOOK.

Copyright reserved

Please turn over

Information Technology/P2

3
NSC

DoE/November 2007

SECTION A: MULTIPLE-CHOICE QUESTIONS


QUESTION 1
Various possible options are provided as answers to the following questions. Choose
the correct answer and write only the letter (A D) next to the question number
(1.1 1.10) in the answer book, for example 1.0 D.
1.1

The fetch/execute cycle ...


A
B
C
D

1.2

is prone to hacking and should therefore not be used.


cannot be used unless you have a registered digital signature.
provides a useful facility for paying bills and transferring cash to and
from accounts worldwide.
can only be accessed from a laptop.

(2)

Assembly language ...


A
B
C
D

1.4

(2)

Internet banking ...


A
B
C

1.3

is used in database management systems to process queries.


is used to show how instructions are processed at a low level in the
computer.
enhances the performance of RAM by fetching the next memory
location before the current one is processed.
describes how a program translator deals with lines of program code.

is a high-level language used by system developers in the communications industry.


has a one-to-many equivalence to machine code instructions.
has been used to provide platform independence across the internet.
is referred to as a low-level language because it communicates directly
with computer hardware.

(2)

An example of full-duplex mode is ...


A
B
C
D

a hand-held radio, where the user usually says 'Over' when he/she has
finished talking and wants to hear what the other person says.
a telephone conversation that occurs between two people.
a school intercom in operation when the school secretary makes the
morning announcements.
an operating system communicating with a printer.

Copyright reserved

(2)

Please turn over

Information Technology/P2

1.5

B
C
D

B
C
D

Unix, Linux and Open Office


Microsoft Office Suite, Corel Office and Star Office
Windows 2003 Server and Novell
Access, Excel and Word

(2)

allows the data stored on it to be erased electrically and re-used, and


functions like a storage device.
consists of a hard disk that rotates and a head that reads the data
from the disk.
can only hold data as long as power is supplied to it.
can only be written to once.

(2)

A device driver ...


A
B
C
D

1.9

(2)

A flash disk ...


A

1.8

is set up where employees never enter a physical office, but carry out
work via the internet.
is one that uses a LAN and intelligent terminals.
implements virtual memory in a LAN using a suite of office software.
can only be used in a metropolitan area network (MAN).

The following are examples of network operating systems:


A
B
C
D

1.7

DoE/November 2007

A virtual office ...


A

1.6

4
NSC

is unnecessary when plug and play is implemented.


is firmware which is embedded in new devices manufactured after
2005.
is automatically included in any new device which implements hotswapping.
is software that provides communication between a peripheral and the
operating system.

(2)

A file with the extension .dll is ...


A
B
C
D

a dynamic-link library file.


used to implement direct links to LAN servers.
the source code for a database management system.
used to provide communication to peripheral devices.

Copyright reserved

(2)

Please turn over

Information Technology/P2

1.10

5
NSC

DoE/November 2007

Validation is ...
A
B
C
D

the process of checking that data is a correct copy of inputted data.


the process of checking that data falls within an allowable range.
the process of enforcing referential integrity.
used to prevent errors in a spreadsheet when data is imported from a
database.
TOTAL SECTION A:

Copyright reserved

(2)
20

Please turn over

Information Technology/P2

6
NSC

DoE/November 2007

Use the scenario below to answer the questions in SECTIONS B, C, D and E.


SCENARIO
You are employed as a technician at a computer company. The computer company
does the following:

Sells hardware and software


Does software development for its clients
Installs computer networks
Maintains the software and networks of its clients
Maintains a call centre for client support regarding general hardware and software
enquiries

When a client needs support, he/she calls the company and the call is diverted to the
technician who is responsible for that client.
SECTION B: HARDWARE AND SOFTWARE
QUESTION 2: HARDWARE AND SOFTWARE
When calls are received at the call centre, the technician responsible for a client will
answer the client's queries and give additional support information on the topic.
The call centre has received the following calls for support and queries which have
been directed to you as the IT technician:
2.1

'I want to purchase a computer for my children for educational purposes. I


need to decide between buying a laptop or a desktop computer.'
2.1.1

2.1.2

2.2

(a)

Give the client THREE positive reasons why he/she can


consider buying a laptop computer.

(b)

Give the client THREE positive reasons why he/she can


consider buying a desktop computer.

(6)

Indicate why buying the least powerful computer on the market


today should be avoided.

(3)

'My computer gives a message indicating that there is a problem with the
Windows Registry. I know that the Windows Registry is a database
consisting of two files called USER.DAT and SYSTEM.DAT.'
2.2.1

Explain to the client the purpose of the Windows Registry.

(2)

2.2.2

How does the operating system prevent the user from


tampering with system files?

(2)

Copyright reserved

Please turn over

Information Technology/P2

2.2.3

Name ONE other important file extension that you would


find in one of the operating system folders.

(1)

State what the file extension stands for in QUESTION 2.2.3 (a).

(2)

Files found in the operating system folders are a target for


people who create viruses. Explain to the client why this is so.

(2)

(b)

2.3

DoE/November 2007

The system files indicated in QUESTION 2.2 have a .DAT


extension.
(a)

2.2.4

7
NSC

'I used Notepad to open the util.dll file and the contents of this file were full
of garbage.'
(3)

Explain why the file appears to contain incomprehensible characters.


2.4

'My friend says that AGP and PCI Express cards are dedicated to improving
graphics.'
2.4.1

2.4.2

2.5

Name TWO characteristics of modern graphic cards that will


make it possible to improve the performance of a computer
system.

(2)

Name THREE areas of application in real life where AGP and


PCI Express cards make an important difference in the
performance of a computer.

(3)

'I am using a PC and printer that is about 10 years old. The printer is very
slow and once I have started a print job, the PC cannot be used until the
print job is completed.'
2.5.1

2.5.2

Windows' SPOOL manager gets around the problem of waiting


for a print job to be completed before the PC can be used.
(a)

Indicate what the acronym SPOOL stands for.

(1)

(b)

Explain the concept of spooling.

(2)

Buffering further improves the processing of print jobs.


Briefly explain the concept of buffering.

Copyright reserved

(3)

Please turn over

Information Technology/P2

2.6

DoE/November 2007

8
NSC

'All the computer advertisements that I have read, indicate that computers
have cache memory. I want to know the purpose of cache memory in a
computer.'
What is the purpose of cache memory?

2.7

'I read that RAM is often insufficient and that the operating system uses the
virtual memory technique to make the computer look as though it has more
memory than that which is described on the specifications of the computer.'
2.7.1

2.8

(3)

When will the operating system employ virtual memory to


supplement RAM?

(1)

2.7.2

Briefly describe the virtual memory technique called paging.

(3)

2.7.3

Is it better to install more RAM onto a system or continue to rely


on virtual memory? Motivate your answer.

(3)

'There are many ports at the back of my new PC. I am not sure of the
difference between a serial and a parallel port.'
(2)

Explain the difference between a serial and a parallel port.


2.9

'I have to choose between two different hard drives.'


In advising the client, list THREE specifications that must be taken into
consideration when comparing hard drives.
TOTAL SECTION B:

Copyright reserved

(3)
47

Please turn over

Information Technology/P2

9
NSC

DoE/November 2007

SECTION C: APPLICATIONS AND IMPLICATIONS


QUESTION 3: e-COMMUNICATION, SOCIAL AND ETHICAL ISSUES
3.1

3.2

All the company's customers will be connected to the internet, but many
customers know very little about the internet. The company decides to set
itself up as an internet service provider (ISP).
3.1.1

What is the primary function of an ISP?

(1)

3.1.2

What additional hardware and software would you suggest the


company undertake to provide to their customers to facilitate
their use of the internet? Give ONE example of hardware and
ONE example of software and give a reason for EACH of your
choices.

(4)

Several customers are interested in using the internet to find information on


products and customers. You are going to do a demonstration to assist
them.
3.2.1

3.2.2

3.2.3

3.3

You are going to demonstrate the use of a search engine.


Explain what a search engine is.

(2)

Name TWO search engines that you would use in the demonstration, taking into account that the customers do much of their
business locally as well as internationally.

(2)

One of the clients is an antique dealer for the local industry. He


asks you how he would get information on wooden cabinets.
Suggest TWO criteria you would type for a search.

(4)

To stay abreast of the latest technology, the company is investigating some


new international trends.
3.3.1

Portals are being used in the networking environment


specifically on the internet.
(2)

Briefly explain what a portal is and how it can assist users.


3.3.2

Experts estimate that by 2007 more than 500 million personal


computers will be obsolete.
(a)

(b)

Copyright reserved

Why should users NOT store obsolete computers in their


warehouses, basements or any other location?

(2)

What should be done with obsolete computers?

(1)

Please turn over

Information Technology/P2

3.4

DoE/November 2007

10
NSC

The technicians at the company have to attend seminars on a regular basis


to be updated on the latest technologies in the computer industry.
Webcasting has become a viable alternative to travelling for seminars.
3.4.1

What is webcasting?

(2)

3.4.2

Webcasting can also be used to present lessons in an e-classroom.


Name FOUR advantages of e-classrooms in South Africa.

3.4.3

(4)

An interactive whiteboard is often used in the e-classroom.


What is an interactive whiteboard?

(2)
TOTAL SECTION C:

Copyright reserved

26

Please turn over

Information Technology/P2

11
NSC

DoE/November 2007

SECTION D: PROGRAMMING AND SOFTWARE DEVELOPMENT


QUESTION 4: ALGORITHMS AND PLANNING
4.1

A database has been compiled to keep the information of the technicians


employed by the company.
The following table called Employee, has been designed:

The following applies:


The minimum monthly salary of an employee is R4 500,00.
A cellphone number always has 15 digits.
4.1.1

With the exception of the last field, all the fields are text at the
moment.
Improve the design by indicating which fields should NOT be
text. Also indicate the most suitable data type for EACH of
these fields.

4.1.2

Copyright reserved

(3)

An input mask should be used for the EmpNumber field.


(a)

What is the purpose of an input mask?

(1)

(b)

Name ONE other field that should definitely have an


input mask as well.

(1)

Please turn over

Information Technology/P2

4.1.3

Use ONE of the fields in the database to explain how the


data entered can be validated in a database program.

(3)

Explain the purpose of the validation text AND formulate


the validation text for the validation rule in QUESTION 4.1.3 (a).

(2)

Name TWO fields from the given table that can NOT be
validated.

(2)

Name TWO other methods of restricting data entry to a


prescribed set of choices.

(2)

(b)

4.1.5

4.2

DoE/November 2007

It is important to validate data entered in a table.


(a)

4.1.4

12
NSC

The diagram below shows some of the information typed into the table
called Employee. Some of information is duplicated in the table.

Make use of a diagram with TWO tables to indicate how you will split up the
above table into two tables to avoid duplication of data.
The following must be indicated in the diagram:
(a)
(b)
(c)
(d)
(e)

Copyright reserved

The name of each table


The primary key of each table
The foreign key
The other fields of each table
The type of relationship between the two tables

(1)
(1)
(1)
(2)
(1)

Please turn over

Information Technology/P2

4.3

13
NSC

DoE/November 2007

Special bonuses are paid on an annual basis.


The following information has been captured in a spreadsheet. Cell C1
indicates today's date.

4.3.1

4.3.2

4.3.3

Write down a function that could be placed in cell D11 that


would determine the number of permanent employees.

(2)

Write down a function that could be placed in cell E4 that would


determine the number of years the employee has been working
at the company. Use C1 as an absolute cell reference.

(2)

Write down an if-statement that could be placed in cell F4 that


would determine the special bonus as follows:
All staff working at the company for more than 10 years get an
80% bonus on his/her salary, whilst all the other staff members
will get a 50% bonus on their salaries.

Copyright reserved

(3)

Please turn over

Information Technology/P2

4.4

DoE/November 2007

14
NSC

One of the programmers developed the following algorithm in pseudocode:


1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Val1 1
Val2 1.5
Loop from 3 to 7
Val2 Val2 + counter value of the loop
if the counter value of the loop is divisible by 2
Val1 add 2 to Val1 and then multiply the result by 3
Val2 Rounded up value of Val2 and then add 1.5
Display Val1
Display Val2
end of loop

4.4.1

Draw a trace table in ADDENDUM A on the last page of this


question paper to determine what the output of the algorithm/
pseudocode will be.
The trace table has the following headings:

Step

Val1

Val2

Loop
Counter

Loop
Counter
< = 7?

Is Loop Counter
divisible by 2?

Display

(7)
4.4.2

4.5

Rewrite the given pseudocode by replacing the loop with a code


which will terminate the algorithm when Val1 exceeds the value
of 50.

(4)

The following pseudocode was developed by another programmer:


1. Enter the date of birth (1990/12/12)
2. Enter this year (2007)
3.
Year of birth Get year of birth from date of birth
4.
Age This year year of birth
5. Display Age
After this pseudocode has been converted into a programming language,
the code must be tested with data.
Explain what is meant by using extreme data to test and give at least TWO
sets of extreme data to test this algorithm.
TOTAL SECTION D:

Copyright reserved

(3)
41

Please turn over

Information Technology/P2

DoE/November 2007

15
NSC

SECTION E: INTEGRATED SCENARIO


QUESTION 5
USER TERMINALS
BOOKSHOP

n o

SALES

CORRIDOR
AND OTHER
OFFICES

ADMIN.
OFFICE

100 m

CAF

q
r

Your friend has rented premises in a local shopping mall in order to set up a bookshop which includes an internet caf. The ground plan of the premises is shown in
the diagram above.
At one end of the corridor your friend plans to set up the bookshop and caf. At the
other end of the corridor is a room which will be used as an administrative office to
handle stock ordering, client information and keeping personnel records of the
bookshop and caf. It is approximately 100 m away from the bookshop.
Your friend wants some advice from the IT company on hardware, software and
setting up a network, which will be based on Ethernet technology.
5.1

5.2

Using the numbers in the diagram, indicate where the file server should be
situated and why.
The file server has to be a powerful machine. Multi-processing would be a
good option. Your friend has heard the term multi-threading and mentions it
as an option.

(2)

Explain the difference between multi-processing and multi-threading.


5.3

(2)

It is intended that the file server should store many audio and video files
that clients can view and listen to. It is recommended that RAID technology
be used.
Name TWO advantages of RAID technology.

Copyright reserved

(2)

Please turn over

Information Technology/P2

5.4

16
NSC

DoE/November 2007

Your friend intends to legally download files from the internet to create his
audio and video library. These files will be sourced from the internet and
downloaded using FTP. FTP is an example of a data communications
protocol.
(a)

What is a protocol?

(2)

(b)

What is the name of the most commonly used suite of protocols on


the internet?

(1)

(c)

These protocols (QUESTION 5.4 (b)), rely on packet switching.


Explain how packet switching operates and state the purpose of a
router in this process.

5.5

(4)

The setting up of the network will require a large investment of money and it
is important to ensure that the data will be replaceable in the event of fire,
theft or some other disaster.
What should be done to allow data to be replaced in the event of a
disaster?

(2)

5.6

What topology should be used when setting up the network and why?

(2)

5.7

A managed Ethernet switch will be used on the network.


(2)

Name TWO functions of a switch.


5.8

One of the main objectives of the shop will be to provide convenient access
to information for clients. Some clients come to the store with their memory
sticks/flash disks on which to save information.
5.8.1

5.8.2

What kind of port must be available on the user terminals so


that clients can use their memory sticks/flash disks?
This port is often referred to being hot swappable.
What does hot swappable mean?

Copyright reserved

(1)

(2)

Please turn over

Information Technology/P2

5.9

5.9.2

5.9.3

Suggest a useful facility which could be installed at the mall and


used to allow clients with laptops to log onto the internet and
the bookshop LAN.

(2)

What equipment must the bookshop purchase in order to


implement this facility?

(2)

What hardware must clients have on their laptops in order to


make use of this facility?

(1)

Several clients have decided that there are too many dangers on the
internet and they do not want it. You want to persuade these clients that
using the internet would be a good idea for their businesses.
5.10.1

5.10.2

5.11

DoE/November 2007

Some clients have indicated that they would like to bring their laptops to the
shopping mall and to log onto the network.
5.9.1

5.10

17
NSC

Name TWO internet facilities that can assist these clients in


their businesses and state ONE advantage of EACH of these
facilities.

(4)

Name TWO negative aspects of the internet and indicate how


you would allay the clients' fears with regard to EACH of these
negative aspects.

(4)

Most shop owners with private networks are linked to the internet. The
main reason for a company to be linked to the internet is e-commerce.
5.11.1

5.11.2

Briefly discuss TWO positive and TWO negative effects that


e-commerce has on society.
The public is often reluctant to be involved in e-commerce
because of criminal activities. Some companies exist in name
only on the internet and they disappear without delivering
products that were ordered and paid for in advance.
Name THREE ways in which users can verify that a business is
real and reputable.

5.12

(4)

(3)

The computer industry is helping to solve the problem of unemployment


because of the wide variety of careers it offers.
Name FOUR IT-related careers to be followed in this IT company AND give
a brief description of what EACH career entails.

Copyright reserved

(4)

TOTAL SECTION E:

46

GRAND TOTAL:

180

Information Technology/P2

DoE/November 2007
NSC

NAME/EXAMINATION NUMBER:
ADDENDUM A
QUESTION 4
TRACE TABLE FOR QUESTION 4.4.1
Step

Val1

Copyright reserved

Val2

Loop
Counter

Loop
Counter
< = 7?

Is Loop Counter
divisible by 2?

Display