Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
33 views37 pages

Prelim Scope

2025 scope for lo

Uploaded by

sabswork007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views37 pages

Prelim Scope

2025 scope for lo

Uploaded by

sabswork007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Grade 12

Notes

1
SECTION A
MULTICHOICE QUESTIONS

Spring+w@t3r can be considered a strong password.

Inkjet printers uses tiny droplets of ink onto paper to create images or text.

You need to backup an entire hard drive. Portable hard drive is best suited for this purpose.

Drop Cap is a decorative letter that often takes up two or more lines of text, usually in a first
paragraph or section of a document.

A DVD-writer component is unlikely to be found in a new computer.


Software used to view the results of HTML pages are Web browser.
A motherboard is NOT an example of a peripheral.
Company X installed a network to specifically save costs. Their primary motivation for using the
network is to enable resource sharing and to manage data security.
The URL of a website refers to a way for users to identify a website on the internet.
Citing of sources in academic work is used to acknowledge the original author.
If you think the webpage you are viewing is outdated (old), you can refresh the page.
Compression reduces the size of data files by encoding information more efficiently.
Adding more memory (RAM) will most likely improve the performance of a PC.
Bookmarks, Favourites and Caching is used for storing frequently visited websites.
Plagiarism refers to the use of resource material without acknowledgement
A user who typically uses specialised software that requires high resolution graphics are the power
user.
A database report should NOT be used as a data source.
The digital divide can be reduced by increasing access to ICT devices for all people.
The cellphone number of a client in a database will most likely use an input mask.
A pointing device that allows for gestures like pinch-to-zoom and two-finger scrolling is a touchpad.
The network in John’s office building covers a small area. This type of network is known as a LAN.
A comment in HTML code will appear nowhere when the web page is displayed in the browser.
A wireless keyboard CANNOT be connected to a computer using a/an 3G adapter.
Firewall restricts unauthorised access to and from a computer network.
Most disabled people need a customised solution for an input or output device. Braille keyboard is
NOT an example of such a device, for a motor control disabled person.
A spreadsheet is an ideal application for analysing data. The comment does NOT contribute to the
analysis of data.
LEN is NOT a function that is available for calculations in a Word table.

2
GIGO is an acronym to illustrate that human error have an influence on computer output.
To print all comments and changes made in a document, Print-Markup must be enabled in the Print
dialog box.

3
COLUMN

Webpage A single HTML file on the internet.


History Integration of two or more technologies into a single device.
Digital footprint The electronic record of a person’s online activity.
Watermark A feature that creates a transparent image or text in the background of a
document.
Patch Used to fix a specific programming problem in software.
Default value A property in a database that automatically displays a value in a field when a
new record is entered.
Cell padding Setting the space between the content of a cell and its border in an HTML
table.
Required field The ability to present information and ideas in an unbiased manner.
AI Machines that can perform tasks (autonomously) that would normally require
human action.
GB The unit of measurement used for storage capacity.
VPN Used to encrypt and secure your internet traffic.
Geotagging / Coordinates inserted based on the location of a device.
location sharing
Copyright A preventative action to protect your work from piracy.
Plug-and-play The setup of devices without the need for user intervention.
Switch / hub Used to connect multiple devices within a LAN.
Digital footprint A trail of data that a user leaves behind while using the internet.
Software A collection of instructions that enables a computer to perform specific tasks.
#Value Displays when a function refers to a cell with data that cannot be used in that
function.
Drivers Software that allows the operating system to communicate with hardware.
Broadband High-speed internet connection, which is referred to as ‘always on’.
Piggybacking Gaining unauthorised access to and connecting to an unsecured WI-FI
network.
CSV A text file which uses commas to separate the values in each column.
Beta software Preliminary (pre-sale) versions of software, released by developers to be
tested by the general public.
Aspect ratio The ratio between the width and height of a screen.
Lookup wizard A data type in Access that creates a list of options for the user to choose
from when entering data into that specific field.
ROM A type of memory needed to store permanent data and instructions.
Metadata Additional data stored about a file that describes the contents of the file,
such as the name of the author.
Fragmentation The problem that arises when different parts of files become scattered
across the disk, causing the computer to become slower.
IoT A trend whereby all sorts of devices and appliances are connected to the
internet.
Accelerometer Input device in smartphones and tablets, used to detect which way around
the device is held or how it is being moved.

4
TRUE OR FALSE
A modem/router/ADSL allows a computer to send and receive data via a telephone line.
The focus question is a question that is brief and to the point to cover aspects of a broad
research topic.
ISP is a company that provides a service, such as web page hosting.
Virtual reality (VR) refers to the technology where a person interacts with a simulation of a 3D
environment in a seemingly real or physical way.
The legend is a visual indicator on a graph of related sets of values in an Excel
worksheet/spreadsheet.
Secondary memory is used for storing all programs and data permanently.
Ergonomics is the study of the impact of technology on users.
The Braille keyboard is a device that would help blind users to enter data.
In word processing, auto numbering can also start when you type a number with a full stop,
then a space, followed by text.
The CPU is responsible for processing instructions.
The wild card character can be used in the Find and Replace feature of a word processor.
Disk cleanup is an utility that can be used to make more storage space available by deleting
unnecessary files.
Backward compatibility is an ability of software to open and use files created in previous (or
older) versions of the software.
Bandwidth refers to the total amount of data transferred over an internet connection in a given
period of time.

SYSTEM TECHNOLOGIES
Describe TWO ways in which communication in an information cycle takes place.
• Send and receive information between different devices (transfer of files, downloading files,
multimedia files).
• Sharing information between different networks.
• Information can be accessed and updated.
• Sharing of information via channels such as email, instant messaging, video conferencing.
• Transmission of feedback / error messages to requires response from user.
• Transmission of voice message from a user to a device / system.
• Allows ICT devices to connect with each other.
State TWO disadvantages of using a wireless mouse.
• Can easily be lost / stolen.
• Batteries should be replaced often.
• Prone to signal interference / disturbance.
• Bluetooth receiver can be lost / damaged then mouse won’t work / device out of range of
receiver.

5
Explain what biometric security is AND give ONE example of a biometric device.
• Biometric security is using unique biological features / to access devices / systems.

Example of a biometric device:


• Fingerprint reader / scanner.
• Iris / Eye / retinal scanner.
• Facial recognition camera.
• Voice recognition microphone.

Give TWO possible solutions to resolve restrictions (bottlenecks) in data flow that appear in
local storage areas.
• Make use of a SSD / faster hard disk drive.
• Use drives / peripherals with high cache capacities.
• Optimize / defragment the storage.
• Compressing data.
• Increase capacity.

Motivate why using the hidden attribute will be better for protecting the data in a file
compared to the read-only attribute.
• Hidden: The user cannot see the file.
• Read-only: The user can see the file but cannot change the file.
OR
Hidden:
• Hides the file from view and layout.
• Not visible to a user if show / hide is not enabled.
OR

Read-only:
• Prevents user from editing the file but can still be opened.
• Immediately visible for user.
• Can be viewed and copied but not edited or deleted without changing the attribute.

Briefly explain the purpose of a user interface (UI) and give an example of an input
device commonly used with a user interface.
• It is a way to interact with your operating system or programs.
Example:
Mouse, touch screen, stylus or keyboard, any other input device.
Recommend THREE basic hardware components to consider when buying an end-user
computer.
• Processor (CPU).
• Memory (RAM).
• Storage (SDD / HDD).
• Motherboard.
• Graphics card (CPU).
• Network card (NIC).
• Power supply.

6
State TWO ways in which spooling can be utilized in a network printer.
Documents sent to the printer can be:
• Paused.
• Cancelled / Restarted.
• Given preference / prioritized.
• Placed in a queue.
Describe the purpose of a UPS compared to a permanent power supply.
Comparison: A power supply is designed to provide continuous power, while a UPS provides backup
power during outages.
OR
• A UPS has a battery backup system.
• A UPS provides backup power during outages.
• A UPS protects your device against power surges.
• A UPS allows user to save their work before switching off the device.
Give ONE example of a device that can be classified as an input device and output device.
• (Multi) touchscreen / Smartphone / Smartwatch / Tablet.
• Force feedback steering wheel / joystick / headset.
• Visual / Multi-function scanner / printer.
• Interactive whiteboard.
Describe TWO accessibility features that a deaf person can use.
• Caption / subtitles for spoken dialog.
• Speech-to-text.
• Visual (flashing) notifications for sounds.
• Motion (vibration) notifications for sounds.
Describe TWO ways how you could determine if your computer has been infected by malware.
• Drastic decrease in performance / computer slows down.
• Pop-ups (ransomware message) or error message or anti-virus notification.
• Changes to your browser settings.
• High amounts of network traffic / unexplained high data usage.
• Decrease storage space.
• Information / files / folders on the computer goes missing.
• Changes to your Windows settings / programs not working.
• Computer sending messages autonomously.
Suggest TWO ways how a user can customize the graphical user interface ( GUI) to suit their
preferences.
Display / Visual settings:
• Adjust screen resolution.
• Change background.
• Themes.
• Font size / colour.
• Brightness of screen.

7
Desktop layout / organization:
• Add / remove shortcuts / icons.
• Format shortcuts / icons.
Input / device settings:
• Custom keyboard.
• Change cursor size / shape.
Sound settings:
• System sound.
• Notification sound.
Menu customisation:
• Quick access menus.
• Accessibility.
Windows behaviour:
• Multiple desktop.
System preference:
• Date / time format
• Notification tray icons.

Give TWO disadvantages of convergence:


• Functionality of many devices is lost if the device fails.
• Shorter battery life for mobile convergence devices.
• High hardware demand.
• Reduced specialization.
• Security and privacy risks.
• Mastering of additional skills / overload.
• Device is more expensive (because of greater functionality).
• Difficult to upgrade one component of the device.

The utility feature shown below is used on a computer hard drive.

Explain why a user will use the feature above.


• To reorganizing fragmented / scattered data on a computer’s hard disk to improve performance
and efficiency / fixing disk errors.

8
Data and information are crucial elements in an ICT system.
Describe what is meant by data and give an example:
Data refers to raw facts which as such does not have any meaning / unprocessed facts / not
analyzed.
Example: a list of numbers or words.

Describe TWO processes that will transform data into information.


Analyze the data.
Interpret the data.
Organize raw data.
Users are often at risk of using flawed (faulty) software.
Recommend ONE way to fix a software bug.
Install a patch.
Install a service pack.
Update software.
State TWO risks of using flawed software.
Security vulnerabilities: create security loopholes that attackers might use to
gain unauthorised access.
Data loss or corruption: data can be lost or corrupted.
System crashing: the device can malfunction or crash, causing a disruption in normal
operation.
Compatibility issues: can cause compatibility problems with hardware and software.

The new monitor you connected to your computing device displays a resolution error
message.
Where would you change the resolution to resolve / fix this error message?
• Research bar: Type resolution: System setting: Display.
• Right click on desktop: Display settings.
• Right click on Start: Setting / System: Display.
• Windows + i
A data projector has been set up and displays a ‘No Signal’ error.
Identify TWO possible reasons why this error occurs.
• Cable / signal (WiFi, Bluetooth) not connected properly.
• Faulty cable / port.
• Incorrect display settings.
• Computer is off or on sleep mode.
• Faulty / outdated drivers.
• Correct source is not selected.
Give TWO disadvantages of frequently defragmenting a hard drive.
• Can increase the wear and tear of the hard drive, which can cause it to fail more quickly /

9
decrease life span of the hard drive.
• Can be a time-consuming process.
• It slows down the overall performance of the computer while it is running.
• Could result in corrupted files.

One of the functions of an operating system is to manage programs and users.

Explain the difference between a single-user system and a multi-user system.

• A single-user system is limited to only one active user / one user at a time.
• Multi-user system allows more than one user at the same time.

Give ONE example of where a multi-user system can be used.

• Online gaming.
• Online platforms.
• (Networked) companies / institutions (e.g., school university, banks, SARS)

State TWO limitations of firewalls.

• Unable to protect against the transfer of files or software / social engineering.


• It does not prevent misuse of passwords from dialing in to or out of the internal network.
• Firewalls are not able to stop users from accessing data or information from malicious websites.
• Already infected systems cannot be secured by firewalls.
• Change settings to firewall can hamper network traffic.

Give TWO reasons why a company would choose to use gird computing:

• No need to buy powerful computing devices to perform complex processing.


• Complex calculations can be performed / increased computing power.
• Uninterrupted processing.
• Tasks are performed in parallel thereby improving performance.
• Uses idle resources.

Study the following advertisement and answer the questions that follow:

Identify the feature in the advertisement that indicates that it is a portable computer.

• Size of the monitor / 15.6 HD LED display.


• (Built in) Wi-Fi / Bluetooth.
• (Built in) webcam.
10
• Integrated graphics.

The processor in this advertisement has 2x cores. Explain why a processor with two cores
(Dual Core) would have a better performance than a single core processor.

• When dual core or quad core or any other core is used to describe a CPU, this tells you how many
physical CPUs are on the chip.
• A dual core has two physical CPUs making it possible for the computer to work more efficiently.

Explain the function of the ‘HDMI Output’.

• HDMI carries high quality video and audio signals so there is no need for separate audio cables as
with VGA.

Briefly explain why the CPU needs cache memory.

• CPU needs cache memory to avoid waiting for slower components.

Name TWO differences between a build in Graphics Card and an external Graphics Card
besides anything relating to cost.

• A dedicated graphics card is an external attachment that is connected to the motherboard, an


integrated graphics card is in an internal attachment that is integrated into the motherboard or the
CPU.
• A dedicated graphics card has its own graphics processing unit (GPU), in an Integrated Graphics
Card the graphics systems are built into the same chip as the CPU.
• A dedicated graphics card has its own RAM, as integrate graphics card uses the system’s RAM.
• The processing power in a dedicated graphics card is usually higher, and lower in an integrated
graphics card.
• The power consumption in a dedicated graphics card is higher, and lower in an integrated
graphics card.

What does the abbreviation SSD stand for?

• Solid state drive.

Which one of the storage mediums (SSD / HHD) is best suited for storage of large quantities
of data?

• HHD

Explain the characteristics of an SSD in terms of:

a) Silent operation.
There are no physical moving parts when writing or reading on an SSD.
b) Faster performance.
There is no time spent to move to the position where the file is saved can access it immediately.
OR
Solid state drives operate much faster than traditional hard drives as they store data electronically
and not magnetically.

11
Every now and then your computer displays the following message:

Describe what virtual memory is.


• Virtual memory is a portion of hard drive space which acts as memory (RAM).

Explain when the operating system will make use of virtual memory?

• Too many applications open.


• The program is too large to run from the available RAM.

Study the image below and answer the questions that follow.

Identify the technology that is referred to in the image.

• Drone technology.

Give TWO limitations of above-mentioned technology.

• Battery life.
• Weather changes.
• The use of drones may be limited by air space rules / laws.
• Flight license may be necessary for some models.

Explain TWO ways in which the computers will be financially beneficial for the insurance
company.

• Greater productivity – time is saved by producing electronic documents versus type writers /
electronic communication enhance productivity.
• Information availability – access to current / accurate data / availability of information on the web.
• Fewer employees – will save on payroll expenses.
• Cost saving – do not have to print everything which saves paper, save on communication costs.

12
Besides switching off all computers at night, state TWO other ways in which the electricity
usage of computing devices can be decreased.

• Decrease brightness settings of the screen.


• Unplug charges when not in use.
• Change the balance between power consumption and performance.
• Set devices on sleep / hibernate mode.
• Buy energy efficient devices.

Explain how defragmentation is different from making backups.

• Defragmented rearrange parts of files on your hard drives whereas a backup copies (complete)
files / folders to a secondary storage medium for safekeeping.

Give TWO reasons why it is necessary to have an operating system installed on a computer
by referring to the functions of an operating system.

• Controls all resources (hardware and software).


• Responsible for the loading of programs and running programs.
• Provides user interface.
• File handling.
• Provide basic security.

Internet and network technologies


Which communication medium is used for a high-speed internet connection?

• Fibre optic cable.


• Copper cable (coaxial).
• DSL (Digital Subscriber line)
• Ethernet.
• Radio waves 4G / 5G / LTE cellular networks.
• Satellite.

Consider the two images below on Virtual Reality and answer the questions that follow.

13
Explain the basic working behind VR.

• A technology that combines multiple inputs and outputs, so that the computer creates a whole ne
world for you to experience.

Describe TWO potential uses for VR, besides entertainment.

• Health care – training.


• Automotive – analysis road scenarios and the behaviour of cars.
• Space and Military – these two industries have to operate in rather dangerous environments that
can’t be easily accessed, VR provides conditions for making thins as closes to reality as possible
for training.
• Tourism – try a holiday before you buy it.
• Flight simulation – training.

Define the term ‘Ransomware’.

• Malware that encrypts data (making it unavailable) until you pay the hacker a ransom fee.

Explain why it is not a good idea by stating TWO disadvantages of using Bluetooth in the
environment.

• The speed of transferring data is very slow compared to other wireless technologies.
• The range is limited to a few meters / can loose signal if you move away from the source.
• You can only connect a limited number or devices.
• Bluetooth has a lower bandwidth.
• May experience some security issues while transferring.
• Bluetooth cannot transfer large amounts of data.
• Connectivity issues can occur between different versions of Bluetooth devices.

Briefly explain what a broadband connection is.

• Broadband refers to a high-speed, high-bandwidth connection to the internet.

A service provider has the right to ‘throttle’ a user’s internet connection, if necessary.

What will be the results of this to the user AND also explain why the service provider decided
to do this?

• ‘Throttle’ will slow down a user’s internet connection.


• A service provider will slow down a user’s internet connection if they have exceeded their data cap
for the specific period / downloaded an excessive amount of data.

What does it mean if your data connection is ‘shaped’?

• ‘Shape’ is a technique where certain network (internet) services e.g. emails, are given preference
while others such as social networking services are given less priority, thus the services are given
priority to more critical activities.

Explain what an uncapped data package is.

• Uncapped data means that there is no limit on the amount of data that can be used over a specific
period of time.

14
Analyse the picture below and give the term and description for the process.

• Throttling / policing
• Occurs when the ISP slows down the internet speed due to excessive data / downloads / Not
adhering to FUP (Fair Use Policy)

John received an e-mail marked as high priority and decided to flag it.

Motivate why the ‘Subject’ line is inappropriate.

• The subject line does not indicate the topic of the e-mail.

Differentiate between high priority and flagging.

• High priority: These emails are marked as important by the sender/should be addressed
promptly.
• Flagging: flagging is a way for you to organize / categorize / prioritize / follow up or keep track of
e-mails.

Discuss TWO factors that may decrease upload and download speeds in an internet
connection.
• File size / multiple files open.
• Bandwidth size.
• Background applications running.
• The type of internet connection.
• The quality / stability / reliability of the connection / network traffic / congestion.
• Distance from the service provider / router.
• Hardware capabilities.
• Shaping.
• Throttling.

15
• Capacity of the ISP’s infrastructure.
• Efficiency of the user’s devices.

State TWO good guidelines / hints for users using video conferencing.

• Formal etiquette protocols:


Dress appropriately, use formal language, no multi-tasking, fair participation, correct posture.
• Equipment:
Good speakers, good speakers, good microphone, good web camera, good internet connection,
UPS (continuous power supply).
• Software:
Close unused application, record and transcribe.
• Environment:
Quiet environment, suitable lighting, appropriate location.

Explain what is meant by a wireless access point.

• A device that allows other wireless devices to connect to a wired / wireless network.

Give TWO reasons why you would choose a wireless network for a home or a small business.
• Easy to install.
• Less cables clutter / no wires.
• Easy to connect to.
• Added mobility / flexibility.
• Easy to expand.
State TWO advantages of using tabbed browsing.

• Efficient use of screen space.


• Faster navigation / saves time to access websites.
• Access to more than one website.
• Organize tabs in groups.
• Allow multiple home pages that all open simultaneously.
• Convenient for multitasking.

Give TWO disadvantages of using a PAN.


• Limited range – only a few meters.
• Data transmission may be slow
• Prone to interference.
• Limited number of devices can be connected / paired

A network can be used to provide better security.

Indicate ONE method that can be used to secure a network.


• Firewalls.
• VPN.
• Access controls / Authentication / Logins (Username and Password)
• Antivirus or anti-malware security.
• Use security protocols for password encryption.
• Network data / files can be encrypted.

16
What is the function of an NIC?
• The NIC is used to connect a device to a network cable.

Give TWO reasons why a company may choose NOT to use an intranet
• Company too small to justify cost of intranet / often tied to licencing.
• Staff can bring in unauthorized devices and infect the intranet with malware.
• Requires integration and maintenance.
• Often overly complex for employees / Inaccessible / challenging to access for employees working
from home / personal PCs or smartphones / rarely equipped with online functionality / employees
need to be trained.

State TWO factors to consider when installing wireless access points in a network.

• Security it offers e.g. strong passwords.


• Distance / Area it covers.
• Different WiFi standards: Differ in speed, transmission ranges and frequency.
• Number of clients connecting.
• Signal interference.
Name any TWO technologies that form part of the Fourth Industrial Revolution (4IR)
• Artificial intelligence (AI).
• Augmented reality (AR).
• Virtual reality (VR).
• 3D / 4D printing.
• Cloud Computing
• IoT
• Robotics
• Quantum computing.
• Block chain.
• Automation, self-driving cars, machine learning.
• Genetic engineering.
• Drone technology.

Give TWO advantages of cloud computing in terms of storage.

• Save storage space on local drive.


• Storage can be accessed from anywhere.
• Storage can be accessed on any device.
• Faster access because of more powerful processors.
• It offers back-up and recovery functions.
• Latest updates, scalability and security are catered for.

Explain what the Fourth Industrial Revolution (4IR) is.

• Integration of technologies in the physical, digital, biological world.

17
INFORMATION MANAGEMENT
Study the extract from the database report below:

Give TWO findings of this report.

• The average age for participants of the bike race is 32.


• The number of participants for the bike race is 5.
• 3 of the participants for the bike race are older than 30 / 2 participants for the bike race are 30
years and younger.
• More participants in their 30’s choose to bike.
• More runners than bikers.

State TWO aspects to consider when planning a questionnaire.

• Identify research aims and the goal of the questionnaire.


• Target audience.
• Type of questionnaire – electronic or written.
• Consider the type of question (open / closed) / information needed.
• Design question sequence and overall layout.
Give ONE reason why you would choose to use information from older sources.
• Factual information that won’t change.
• Established authority and credibility of the author.
• Historical information.
• The information is still relevant.
• Can be compared to newer sources.

A learner wants to show how the number of e-book readers have increased / decreased
over a period of time using a chart.

What spreadsheet feature can be used to show this on the chart?

• Trend line / Drop Lines

18
State TWO ways to present research information to a target audience.
• Write a report.
• Create a presentation.
• Create a website.
• Podcast / Vodcast
• Social media
• Printed media.

You need to add an image to a document.


Name ONE word processing feature that may be used to acknowledge a source for an image,
excluding citations.
• Bibliography.
• Endnote / Footnote.
• Caption

Give ONE example of the type of data you could add to acknowledge the source.

• Include the image creator / author / photographer / artist name.


• Name of image.
• Website / Hyperlink (URL) to the original source.
• Date of creation, publisher.

Evaluation of the contents of a website is essential in research.

Briefly explain why evaluation is essential.

• There are no guidelines for publishing on the web.


• Most information that is published on the web is not filtered and evaluated like books,
journals, magazines, or newspapers
• To ensure / assess quality / credibility / sustainability of the website.
• Currency – is the information up to date?

State TWO criteria used for evaluating websites.

• Affiliation (e.g. who supports the website?)


• Audience (e.g. level at which it is written / who is it intended for?)
• Authority (e.g. who is the author credentials?0
• Coverage (e.g. organization of content and working links?)
• Currency (e.g. is the information up-to-date?)
• Objectivity (e.g. does it reflect any bias?)
• Accuracy (e.g. does it correlate with other sources?)
Give TWO guidelines to follow when setting questions for a questionnaire.
• Use mostly closed questions.
• Keep questions short.
• Categorise / Group questions.
• Limit number of questions / Time to complete questionnaire.
• Use easily understandable language.
• Relevant questions / Target audience.
• Give options to choose from.

19
• Ask questions that will not guide people to specific answers / unbiased

What is the importance of report writing in the PAT?

• Reader must have a clear understanding of the content.


• Displays a clear link between the original task / problem, research, discussion and conclusion.
• Share findings with the target audience.
• Gives a summary of your findings.

Give TWO considerations when formulating a task definition.

• Understand the current situation / describe the problem area.


• Identify the information needed to solve the information problem.
• Determine the focus area / question.
• Determine the steps to complete the task.
• Determine the target audience.

Explain what plagiarism is.

• Passing off someone else’s work as your own without their permission.

Recommend TWO contactless biometric access control systems can consider using.

• Face recognition access device.


• Voice recognition access device.

Explain what biometric access is.

• Biometric access – fingerprint scanners OR retina scanners OR voice scanners OR whole-hand


scanners are used for access for the user.
OR
• Biometric scanning device needed to input the data of the user.

What is the difference between data and information?

• Data is raw and unprocessed stats while information is processed data.

Give TWO ways to produce fewer, but more relevant results with a web search (in general).

• Use a more precise search phrase or use synonyms.


• Exclude certain words from the search by using Boolean operators.
• Use the search engine operators.
• Specify date ranges, file types.
• Use quotation marks.
• Use more than 1 word but not more than 10 words in a phrase.

Give TWO reasons why it would be better for the researcher to conduct a survey online
instead of using a hardcopy questionnaire.

• Much larger possible audience.


• Data will already be electronic / do not have to retype data.
• Better validation can be done.
• Much easier to distribute to / retrieve from respondents.

20
• Do not have to decipher bad handwriting.

SOCIAL IMPLICATIONS
An E-learning app was developed to help train new employees to use the equipment in the
laboratory (see below).

What is the name of the technology used by this E-learning app?


• Augmented reality.

Explain why this technology will be more useful compared to watching a video about the same
equipment.

• It adapts to / is applied to the environment / equipment YOU see (not just a generic example).

Explain the concept ‘User-centered design’ (UCD).

• A method of computer program design which focuses on the user’s specific needs and
requirements.

Discuss how a DDoS attack can be used by a Hacktivist group like Anonymous to wage
cyberwarfare against enemies, such as during the Ukraine / Russia war?

They could use it to attack / take down an enemy’s / another country’s services such as:

• (military / broadcast) communications.


• Nuclear sites (launch / disable missiles).
• Infrastructure (e.g. water, sanitation, power grid).
• Transport.

Describe the role of a bot in a DDoS attack.

• (a bot): a computer being controlled by an attacker.


• (DDoS attack): is used to send requests to / flood a (host) website / online service with unwanted
traffic until it is no longer available.

Suggest a software accessibility option that will help a person suffering from tremors when
giving input to a computer.

• Slower mouse speed.

21
• Filter keys.
• Voice typing / speech recognition / speech-to-text / ‘narrator’.

Give TWO examples how Artificial Intelligence is used in our everyday lives. Do NOT just list
the names of the apps.

• Voice assistant apps / apps you can ask for help looking up information: Alexa, Siri, Google
Assistant, Bixby.
• Personalized suggestions in (entertainment) apps like: Spotify, Apple Music, Netflix, You Tube.
• Financial institutions can identify fraud / calculate credit scoring.
• The retail / online shopping sector can offer personalized suggestions.
• Personalized healthcare assistants (can act as life coaches).
• Facial recognition in apps can identify people.

Name TWO common internet attacks, other than malware.


• Denial-of-Service (DoS) attacks.
• Phishing.
• Spoofing.
• Cyberterrorism.
• Sniffer attacks.
• Code (SQL) injection attacks.
• Supply chain attacks.
• Insider threats.
• Zero-day exploit.

Which term describes all the ways in which confidential information is obtained by abusing
the trusting nature of people?

• Social engineering.

State TWO ways how a company can prevent data loss when unscheduled power failures
occur.

• Use Autosave.
• Install a UPS.
• Install inverter.
• Make use of solar panels, battery bank.

There are various types of viruses that affect a computer.

What is a computer virus?

• Software / program / app that is designed for malicious intent / unwanted / unexpected.

Explain TWO ways in which a virus can affect the performance of a computer.

Programs and files:

• File(s) become corrupt.


• Unknown program(s) or file(s) / folders suddenly appears.
• Additional programs start to run when the computer is started.
• Size of a file changes without explanation.

22
• Program(s) or file(s) are suddenly missing.
• Program / file changes without explanation / stop operating properly.

System:

• Settings of security software changed / switched off.


• Strange / unexpected message / pop ups / image / error messages displayed on the computer
screen.
• Computer suddenly begins to start or run slowly.
• Unauthorized changes made to the registry.
• The available memory is less than it should be.
• System properties change.
• Free hard drive space suddenly gets reduced.
• Network performance is influenced.
• Computer no longer boots.

What are the responsibilities of a network administrator to ensure network security?

• Keep records of software.


• Keeps records of hardware.
• Ensure that only approved software is installed / updated.
• Ensure privacy.
• Manage usernames and passwords.
• Putting security measures in place e.g. access rights / blocking access of external storage device.
• Develop an acceptable user policy (AUP).
• Backup and recovery.

Green computing should be considered by all computer users.

Explain the term green computing.

• Using computers in a way that is not harmful to the environment.

Name ONE energy-saving method that contributes to green computing.

• Switch off devices / unplug devices when not in use.


• Enable sleep / hibernate function if computer is not in use.
• Reduce screen brightness.
• Enable battery saving mode.
• Use energy saving devices e.g., LCD screen, SSD.

Briefly describe the positive impact of ICT on the global community.

• Ease of global travel.


• Improved global communication.
• Important information or news can be shared.
• New learning opportunities and different ways if learning.
• New ways to do business / health care.
• Reduced impact on ecosystem – less driving, flying, printing.
• Telecommuting.
• Virtual communities.

23
• More economically viable.

Your friend wanted to download a song from the internet and clicked the download button, but
was redirected to a malicious page.

Give the term for the threat described above.

• Click-jacking / Pharming

Recommend TWO actions that your friend can take to prevent this from happening again.

• Download songs only from well-known websites.


• Verify that the website URL is correct and matches the official site.
• Use browser settings that require you to click to play multimedia content.
• Install pop-up blockers.
• Use browser extensions that provide additional security features.
• Keep your web browser up-to-date.
• Before clicking on a download link, hover over it to see the actual URL.
• Avoid clicking on any pop-ups, banners, or unexpected buttons that appear while you’re trying to
download.
• Keep your antivirus software updated and running.
• Check reviews and ratings of the download services or file before proceeding.
• Ensure the website uses HTTPS.

Briefly describe what data protection is AND give ONE method to protect data/information,
excluding any physical methods.

Data protection is about safeguarding your data / information from unauthorised access.

Method:

• Passwords.
• Firewalls.
• VPN.
• Encryption.
• Backup.
• Two factors are authentication.

SOLUTION DEVELOPMENT
Give TWO reasons for using the ‘Save as’ option in any program.

• To save a file in a new directory / folder / location.


• To sav a file under a new name.
• To save it as a different file type / export the file to another file type / change file type.

Differentiate between the output of the <p> and the <br> tags in HTML.

• The <p> tag is used to indicate a new paragraph and creates a space before and after the
paragraph.
• The <br> tag is used to indicate a line break in the current paragraph without any paragraph
spacing.

24
List THREE elements, besides an image, that appear in most built-in cover pages, in Word.

• Text boxes.
• Shapes.
• Content controls.
• Borders.
• Paragraphs.

Study the extract below from a database table.

Suggest a suitable default value for the ‘Volunteer’ field.

• Yes / True / On / -1

Mail merge is commonly used to create labels in word processing. Consider the screenshot
below.

Besides using the ‘Insert Merge Field’ command repeatedly, what is the better way to instantly
insert the fields from the first label on all the other labels?

• Update labels.

Suppose you’ve successfully inserted the fields on the other labels. Describe the output one
can expect to see if the <<Next Record>> rule was not on all the labels.

• The information on the first label would be repeated on all other labels.

Study the partial screenshot below.

25
Correct the error in the VLOOKUP function in cell E2.

• Column argument should be 2.


• =VLOOKUP(D2,A2:B39,2,FALSE)
• =VLOOKUP(D2,A2:B39,2)

Compare the difference between the purpose of a validation rule in a database table and
criteria in a query.

• The purpose of validation rule is to limit possible entries / control what can be typed in.
• Query criteria is used to extract / only display specific records.

Your friend is working on a spreadsheet and is trying to calculate 50 minus 30 and then divide
the answer by 4. The answer he’s getting is 42.5 instead of 5.

What’s the most likely reason for the error AND how can it be corrected?

(reason for error)

• The 30 is being divided by 4 before being subtracted.


• Order of operations.
• Division is done before subtraction.

(correction)

• Type it this way =(50-30)/4


• Put brackets around the subtraction before you divide.

Your friend generated a spreadsheet for stationery items sold to a customer. However, the
total for all the stationery items displays zero as an answer.

Study the screenshot below and give TWO reasons why the function returns a zero.

• Incorrect cell range: B7:B13 instead of C7:C13.


• Incorrect function: CountA(B7:B13).
• Column B is text / Cannot calculate text.

26
Study the screenshot below.

Which word processing feature has been used to create the list?

• Multilevel list.

Explain why the date ’15 July 2024’ is not one of the list items AND how the date can be
displayed as a list item.

• The date is till part of the same paragraph because a line break / soft enter / Shift+Enter was used.
• A new number will only display for a new paragraph break / enter.

Discuss TWO reasons why you would use page headers and page footers in a document AND
give an example of the type of information that can be included in a header or a footer.

• To repeat information at the top / bottom of every page.


• Provides a description of the document contents.
• Provide information about different sections of a multi-page document.
• Easy navigation.

Example:

Document information, properties, fields, dates, page number, file name.

Fields in a database tale can consist of various data types.

Name TWO data types that can be used for text in a database table.

• Short text.
• Long text.
• Lookup

Explain when an OLE object data type will be used.

• Used for linking / embedding / inserting images / files / videos as data.

Briefly explain the criteria of the following validation rule:

<0 or >=5

• The number entered is less than 0 (negative numbers) or numbers 5 and above / Numbers from 0
to 4 are excluded.

27
Tab stops can be used to align text neatly in columns.

A leader line can be added with tab stops. Why would you add a leader line?

• To improve the readability / alignment of the text in documents.


• Visually connect and guide the reader’s eye across the space between tab stops.
• To add signature / date lines.

Name TWO features that can be used to set tab stops in a word processing document.

• Using the ruler.


• Using tab settings.

The following criteria appears for the Username field in a database query:

Like”??an*’’

Explain the output of this query.

• ?? – Compulsory 2 start characters, followed by


• ‘an’ – the characters ‘an’ as the 3rd and 4th characters, followed by,
• ‘*’ – a string of length 0 or more.

Explain the difference between the <th> and the <td> tags.

• <th> Creates a header cell in a table / text tha is bold and centred.
• <td> Creates a cell to add data in a table.

Microsoft Access provides field property settings such as validation rules to improve the
accuracy of data capturing.

Name TWO other additional field properties that can be used.

• Input masks.
• Field sizes.
• Default values.
• Lookup values like List Box, Combo Box, Check Box.
• Formatting e.g. Medium date.

Give a word processing feature that will allow a user to format all the headings in a document
at the same time.

• Styles.

Name a word processing feature which will force certain text to move to the beginning of the
next column.

• Column break.

28
Which THREE functions were combined to extract the user from the e-mail address in the
screenshot below?

• LEFT OR MID
• LEN
• FIND

Give ONE reason why you would use the button in the image below in an Access database
table.

• Show / hide column totals.


• To display a summary of a field by using a total function / aggregate function.

Examine the piece of HTML code below, which is used to insert the image on the web page:

<img src = “School.jpg” width = “120” alt = “image of school”>

• The image will resize proportionally (maintain aspect ratio).

SECTION C

INTEGRATED SCENARIO (I)

The management of the community hall decided to open a gaming room. The gaming room will
include access to broad games and video games

A small network needs to be created with ten computers in the gaming room.

Give ONE reason why this network would NOT require a server.

• Each computer is managed on its own.


• No server is required on a gaming network.
• No need for centralized access to files.
• Games are often hosted on a local computer.
A printer will be added for administration purposes.
State TWO factors that should be considered when buying a printer.
• Type of printer.
• Colour.
• Speed.
• Resolution (dpi) / Graphics capability / photo printing.
• Paper type and size.

29
• System compatibility.
• Wireless capability.
• Cost per page.
• Budget available.
• Mobility.
• Future needs.
• Affordability.
• Energy saving features.
• Print from storage device.
What type of cabled media will most likely be used to connect the computers? Motivate your
answer.
• UTP / STP (Twisted pair)
• CAT 5 / 6
• Ethernet / LAN cable.
Motivation:
• Most cost-effective solution.
• Easy to set up than fibre optics.
The management needs to purchase PCs for the gaming room and are considering PCs with
the specifications below:

Suggest TWO additional hardware devices that can be bought for this computer.
• Blue Ray / Rom / DVD Rom.
• VR glasses.
• Printer.
• Scanner.
• Screen / Big Screen.
• Speakers.
• Webcam
• Video capture card.
• Microphone.
What kind of computer user will most likely use a computer with these specifications?
• Power / Super user / (gamer)
Name TWO types of utility software that can be used on this computer.

30
• Antivirus.
• Disk clean-up
• Disk defragment
• Backup
• File compressing
• Task scheduler
• File management.
How is the size of monitors normally measured?
• Monitors are measured diagonally.
The new computers must be secured and protected.
What technology can the management add to all devices / equipment to ensure easy tracking /
monitoring of devices / equipment?
• RFID.
• Barcode / QR codes / stickers.
• Bluetooth tracking devices.
Name TWO physical safeguards to protect the computers.
• Burglar bars.
• Security guard.
• Steel doors.
• Mesh in the roof.
• Locks.
• Alarm system.
• Cameras.
The management of the community hall decided to host a gaming tournament.
The management wants to send a standard letter to all tournament participants to thank them.
What word processing feature can be used to quickly generate a personalised, standard
thank-you letter for each participant?
• Mail merge.
Special gaming chairs were bought for the tournament. Give ONE feature that a gaming chair
should have.
• Adjustable armrest.
• Adjustable height.
• Movable base.
• Breathable material.
• Gaming related enhancements.
Give TWO examples of how ICT can be used to advertise the tournament.
• Social media.
• Website.
• E-mail
• Radio and television broadcast.
What Microsoft Office applications is best suited to capture and store the individual entries for
the tournament?

31
• Access
The secure storage area is protected by a lock which opens by scanning a fingerprint. Briefly
explain what this type of security is called and give ONE disadvantage.
• Biometric security.
• Dirty fingerprint will not scan.
• Changes in fingerprint structure will not allow access.
• Cannot be shared, person must be present.
• If the surface of the biometric device is dirty, it will not scan the finger correctly.
Briefly explain what virtual reality is.
• The use of technology to create a simulation of a 3D environment that can be interacted with by a
person in a seemingly real or physical way.
Give TWO disadvantages or limitations of virtual reality.
• Physical effects: motion sickness, injuries.
• Psychological: moral and ethical concerns, (inability to distinguish between what is real and what is
virtual).
• Limited availability to the special equipment like VR glasses, video cameras.

INTEGRATED SCENARIO (II)


Your school is celebrating its 50th birthday. A committee has been chosen to create and design
an e-magazine as part of the celebration.

State TWO advantages for the committee to design an e-magazine instead of a hard-
copy version.

• Interactive elements.
• Saving of printing cost.
• Easy to change / update.
• Reach larger audience / easier to share.
• Saves the environment.
• Accessibility features.

What network policy should the school and committee have in place?

• AUP.

Explain why the network might be slow while the committee is working on the e-
magazine.

• Not enough bandwidth / network traffic / congestion.


• Files being shared are too large.
• Weak signal.
• Faulty / outdated hardware.
• DDoS attacks.

Explain what a network adapter is.

• A component in a computer that enables network connection.

32
State TWO advantages of storing photos on the cloud compared to local storage.

• Convenient access from any device anywhere / anytime with internet connection.
• Serves as storage space to backup.
• Service provider may provide more security than local storage.
• Saves local storage space on local devices.
• Synchronization services between devices.

What does MP stand for in camera resolution?

• Megapixel.

Why would you not recommend scanning old photos?

• Poor quality scanned image.


• All imperfection (like tear and cracks) will also be included in the image.
• Time consuming process.
• Fragile photos might be damaged.

Why would the committee make use of OCR software?

• To produce an editable soft copy from a scanned document.

Explain why interviews would be a better option to collect the information rather than
using questionnaires.

• Deeper insight / clarification and follow up.


• Non-verbal cues.
• Response is immediate.
• Building relationships.

State TWO disadvantages of using video conferencing.

• Requires a fast internet connection.


• Consumes a lot of data when using video / depletes CAP quickly.
• Lack of physical face to face contact / non-verbal cues.

Name ONE good practice the committee should consider when conducting the
interviews online.

• Eliminate background noises.


• Equipment must be set up correctly.
• Make sure that the interview is recorded.
• Make sure there is good lighting.
• Speak clearly / audible.

Name TWO types of application software the committee can use to design the e-
magazine.

• Desktop publisher software.


• Designing software.
• Presentation software.
• Word processing software.

33
• Web design software.

Which HTML tag AND attribute will be used to create a link to the order form?

• <a> anchor tag href.

Which word processing feature can be used to move an image next to a paragraph?

• Text wrapping

Explain how NFC payments are made.

• Payments are made by bringing POS and devices / bank card in close contact / tapping
allowing them to transfer data wirelessly.

Name TWO methods used to make online payments from home.

• Online banking / EFT


• Electronic card payments.
• Money sending service.
• Crypto currency.
• Payment gateways.

INTEGRATED SCENARIO (IlI)

Your school will host a triathlon competition which includes swimming, running and bike riding.

Learners from the school will assist by creating posters, taking photos and also with the
general administration of the competition.

Suggest TWO reasons why the organisers should use electronic forms to register
participants.

• Accuracy.
• Participants can complete the form in a shorter time / more efficient to complete by
participants.
• Less chance of processing errors.
• Perform data validation.
• Store / process / analyse information.
• Share with / reach a larger audience.
• More environmentally friendly.

Briefly explain what information is.

• Information is processed data that has meaning.

Name ONE other method of advertising this event.

• Flyers / Stickers.
• Online platforms.
• Printed newspaper / magazines.
• Billboards.
• Radio / TV.

34
What happens when the QR code is scanned?

• The QR code will provide a link to the website / document / additional information.

Name an online method used to raise small amounts of money from a large number of
people.

• Crowdfunding.

Give ONE example of a popular online platform to raise money.

• Kickstarter.
• Indiegogo.
• GoFundMe.
• seedInvest.
• Kiva.
• Patreon.
• CrowdQueb.
• Back a buddy.

Expect for resolution, name TWO other camera specifications that impacts the quality
of the images.

• Quality of the lens.


• Quality / size / type of sensor.
• Colour depth.
• Contrast ratio.
• On-board software / software filters.
• ISO rating.
• Digital vs optical zoom.
• Image stabilization.
• Image processor.
• Shutter speed.
• Flash

State TWO advantages of a card reader.

• Faster transfer of images to a computer from a digital camera.


• Use less energy / power.
• Photos can be transferred to the laptop without the camera being present.
• Allows you to read from or write many different cards.

35
The track layout below will be used for the competition. Participants will be issued with a
device that is embedded with an RFID tag.

What type of network is displayed?

• WLAN / LAN / WAN

What technology does RFID tags use to transmit data?

• Radio-frequency signals / radio waves.

Give TWO reasons why the school will be using RFID tags for the participants.

• Tracking the participants progress / safety during the race.


• Keep record of participant’s time.
• Determining the position / rank of the participant.

Define the concept autonomous car.

• A self-driving car that can sense its environment and move safely with little or no human input.

Apart from ergonomically designed equipment, recommend TWO other ways for the
organisers to prevent strain on their bodies.

• Stand up and take regular breaks.


• Sit up straight / back against the chair.
• Stretch back / shoulders / neck.
• Sit with both feet flat on the floor.
• Don’t slouch / bend your neck / correct posture.
• Look away from the computer screen every 15 minutes.

36
Explain what ergonomic design is.

• The design of future and other devices to make working more comfortable and safer.

After the competition, data was captured in a spreadsheet.

The organizers created a participant code as follows:


The participant’s name, followed by
Random integer numbers.

Which spreadsheet functions were used to generate the participant code?


• CONCCATENATE/& and RANDBETWEEN.

How can conditional formatting be used to analyse the data above?

• Highlight cell: ranking of participant’s according to events.


• Top or bottom rules: Identify the first or last position.
• Data bars: to indicate the data graphically.
• Colour scales: indicate the ranking in colours.
• Icon sets: indicate the ranking in icons.

The organisers want to move the information from the spreadsheet to a database without
opening the database.

Name the spreadsheet feature that can be used.

• Export.

37

You might also like