Instructions and information
1. This question paper consists of:
SECTION A (15 Marks)
SECTION B (35 Marks)
2. Answer ALL the questions.
3. Number the answers correctly according to the numbering system used in this paper.
4. Start EACH question on a NEW page.
5. Do NOT write in the right-hand margin of the ANSWER BOOK.
6. Leave a line after EACH sub question.
7. Generally, one mark is allocated per action; therefore, a 2-mark question would usually require TWO
actions, et cetera.
8. Write neatly and legibly.
SECTION A
Question 1
Choose a term/concept from COLUMN B that matches the description in COLUMN A. Write only the letter (A–G)
next to the question number (1.1–1.5) in the ANSWER BOOK, for example 1.6 T
COLUMN A COLUMN B
1.1 Any software written with negative intentions A Web browser
1.2 Protocol used for fast, easy transfer of files between remote B Upgrade
computers that have an internet connection
1.3 An update to software intended to fix bugs in the software C Malware
1.4 A wireless technology that allows devices such as mice, printers D Communication
and cellphones to communicate over a relatively short distance.
1.5 A type of software application that enables a user to view and E Patch
explore web pages
1
F FTP
G WiFi
H Bluetooth
SUBTOTAL (QUESTION 1) (5 x 1) = [5]
Question 2
Various options are given as possible answers to the questions. Choose the correct answer and write only the
letter (A–D) next to the question number (2.1–2.10) in the ANSWER BOOK, for example 2.11 D.
2.1 An e-mail message that promises the school principal that he will receive large amounts of
money if he forwards this e-mail to at least 10 people is called a …
A) Driver
B) Hoax
C) Trojan
D) Firewall (1)
2.2 Proprietary software is software that …
A) can be copied freely from the legal owner of the software.
B) is completely free.
C) needs a licence to be bought to use it.
D) can be shared with friends. (1)
2.3 Which one is another name for web address?
A) http
B) URL
C) html
D) www (1)
2.4 Which one of the following restricts unauthorised access to and from a computer network?
A) Modem
B) UPS
C) 3G Card
D) Firewall (1)
2.5 Which ONE of the following represents the order of wireless range/ bandwidth from highest to
lowest??
A) WiFi; Bluetooth; WiMAX
B) WiMAX; Bluetooth; WiFi
C) Bluetooth; WiFi; WiMAX
D) WiMAX; WiFi; Bluetooth (1)
2
SUBTOTAL (QUESTION 2) [5]
Question 3
Indicate whether the following statements are TRUE or FALSE. Where the statement is false, rewrite ONLY the
underlined section to make it true. (You may not simply use the word 'NOT' to change the statement.)
3.1 A bug is a term used to describe an error or fault in the program caused by the way it was
written or programmed. (1)
3.2 A word processor is the best application to display an HTML page. (1)
3.3 Cyber-bullying involves unwanted attention towards another person or group of people using
cellphones and other methods of electronic communication. (1)
3.4 E-commerce is the term used for any type of business transaction done via the internet. (1)
3.5 A hotspot is a wireless network technology used for connecting computers and other mobile
devices to a wireless network or to the Internet. (1)
SUBTOTAL (QUESTION 3) [5]
TOTAL FOR SECTION A [15]
3
SECTION B
Application software is the real reason we have computers. But sometimes the software we use might be
incomplete or incompatible with other software.
Question 4
4.1 Define the term computer network. (2)
4.2 Name TWO reasons why it would be beneficial to connect computers to a network in the
school. (2)
4.3 Explain how speech recognition software can help disabled people to make use of computers. (1)
4.4 Briefly explain the difference between LAN and WLAN.
(NOTE: Do not just expand the abbreviation) (2)
4.5 Name TWO advantages of using a WLAN. (2)
4.6 Give TWO reasons why people would want to update their software. (2)
Briefly describe the function of the following components of a network:
4.6.1 NIC (Network Interface Card)
4.6.2 Modem-router (2)
15.6" HD
Intel i5-7400
4 GB DDR3
1.5 TB HDD
Blu-ray
Windows 10 (64-bit)
Consider the following advert for a laptop computer and answer the questions that follow:
4.7 What are the TWO main hardware components that one should consider when purchasing any
type of computer for general computing purposes?
(2)
4.8 Write down the specification that refers to the memory of the computer. (1)
4.9 Would the above computer be ideal for high-end computer gaming? Give ONE reasons for your (1)
answer.
4.10 Hardware failure is a sad reality of computing.
4.10.1 Give ONE troubleshooting tips you might try, if you experience problems writing a
CD or DVD, apart from using a different drive or disc. (1)
4.10.2 Name TWO common sense precautions that can help prevent hardware failure. (2)
SUBTOTAL (QUESTION 4) [20]
4
Question 5
As there will be laptops permanently connected to the internet, the SGB is concerned about the impact social
media might have on the learners and the increase in certain malware.
5.1 List TWO advantages of using social networking sites. (2)
5.2 Name TWO ways in which you can protect yourself while using social networks. (2)
5.3 Social engineering has become a real threat to computer users today.
(1)
5.4.1 Briefly explain what social engineering is.
5.4.2 Give TWO precautions you can take to prevent becoming a victim of a social engineering
attack via e-mail. (2)
5.4 In our quest for a paperless office, people are encouraged to make use of electronic mail
instead of letters and faxes.
5.4.1 Explain what a web-based e-mail service is. (2)
5.4.2 Give ONE reason why you would use a web-based e-mail service. (1)
5.4.3 What is the major disadvantage of a web-based e-mail service? (1)
5.5 Having computers connected to the internet will help the school to pay bills online.
5.6.1 List TWO ways in which banks protect clients when they are making on-line transactions. (2)
5.6.2 What are some of the ways users can protect themselves when banking online? (2)
SUBTOTAL (QUESTION 5) [15]
GRAND TOTAL [50]