Prelim Scope
Prelim Scope
Notes
1
SECTION A
MULTICHOICE QUESTIONS
Inkjet printers uses tiny droplets of ink onto paper to create images or text.
You need to backup an entire hard drive. Portable hard drive is best suited for this purpose.
Drop Cap is a decorative letter that often takes up two or more lines of text, usually in a first
paragraph or section of a document.
2
GIGO is an acronym to illustrate that human error have an influence on computer output.
To print all comments and changes made in a document, Print-Markup must be enabled in the Print
dialog box.
3
COLUMN
4
TRUE OR FALSE
A modem/router/ADSL allows a computer to send and receive data via a telephone line.
The focus question is a question that is brief and to the point to cover aspects of a broad
research topic.
ISP is a company that provides a service, such as web page hosting.
Virtual reality (VR) refers to the technology where a person interacts with a simulation of a 3D
environment in a seemingly real or physical way.
The legend is a visual indicator on a graph of related sets of values in an Excel
worksheet/spreadsheet.
Secondary memory is used for storing all programs and data permanently.
Ergonomics is the study of the impact of technology on users.
The Braille keyboard is a device that would help blind users to enter data.
In word processing, auto numbering can also start when you type a number with a full stop,
then a space, followed by text.
The CPU is responsible for processing instructions.
The wild card character can be used in the Find and Replace feature of a word processor.
Disk cleanup is an utility that can be used to make more storage space available by deleting
unnecessary files.
Backward compatibility is an ability of software to open and use files created in previous (or
older) versions of the software.
Bandwidth refers to the total amount of data transferred over an internet connection in a given
period of time.
SYSTEM TECHNOLOGIES
Describe TWO ways in which communication in an information cycle takes place.
• Send and receive information between different devices (transfer of files, downloading files,
multimedia files).
• Sharing information between different networks.
• Information can be accessed and updated.
• Sharing of information via channels such as email, instant messaging, video conferencing.
• Transmission of feedback / error messages to requires response from user.
• Transmission of voice message from a user to a device / system.
• Allows ICT devices to connect with each other.
State TWO disadvantages of using a wireless mouse.
• Can easily be lost / stolen.
• Batteries should be replaced often.
• Prone to signal interference / disturbance.
• Bluetooth receiver can be lost / damaged then mouse won’t work / device out of range of
receiver.
5
Explain what biometric security is AND give ONE example of a biometric device.
• Biometric security is using unique biological features / to access devices / systems.
Give TWO possible solutions to resolve restrictions (bottlenecks) in data flow that appear in
local storage areas.
• Make use of a SSD / faster hard disk drive.
• Use drives / peripherals with high cache capacities.
• Optimize / defragment the storage.
• Compressing data.
• Increase capacity.
Motivate why using the hidden attribute will be better for protecting the data in a file
compared to the read-only attribute.
• Hidden: The user cannot see the file.
• Read-only: The user can see the file but cannot change the file.
OR
Hidden:
• Hides the file from view and layout.
• Not visible to a user if show / hide is not enabled.
OR
Read-only:
• Prevents user from editing the file but can still be opened.
• Immediately visible for user.
• Can be viewed and copied but not edited or deleted without changing the attribute.
Briefly explain the purpose of a user interface (UI) and give an example of an input
device commonly used with a user interface.
• It is a way to interact with your operating system or programs.
Example:
Mouse, touch screen, stylus or keyboard, any other input device.
Recommend THREE basic hardware components to consider when buying an end-user
computer.
• Processor (CPU).
• Memory (RAM).
• Storage (SDD / HDD).
• Motherboard.
• Graphics card (CPU).
• Network card (NIC).
• Power supply.
6
State TWO ways in which spooling can be utilized in a network printer.
Documents sent to the printer can be:
• Paused.
• Cancelled / Restarted.
• Given preference / prioritized.
• Placed in a queue.
Describe the purpose of a UPS compared to a permanent power supply.
Comparison: A power supply is designed to provide continuous power, while a UPS provides backup
power during outages.
OR
• A UPS has a battery backup system.
• A UPS provides backup power during outages.
• A UPS protects your device against power surges.
• A UPS allows user to save their work before switching off the device.
Give ONE example of a device that can be classified as an input device and output device.
• (Multi) touchscreen / Smartphone / Smartwatch / Tablet.
• Force feedback steering wheel / joystick / headset.
• Visual / Multi-function scanner / printer.
• Interactive whiteboard.
Describe TWO accessibility features that a deaf person can use.
• Caption / subtitles for spoken dialog.
• Speech-to-text.
• Visual (flashing) notifications for sounds.
• Motion (vibration) notifications for sounds.
Describe TWO ways how you could determine if your computer has been infected by malware.
• Drastic decrease in performance / computer slows down.
• Pop-ups (ransomware message) or error message or anti-virus notification.
• Changes to your browser settings.
• High amounts of network traffic / unexplained high data usage.
• Decrease storage space.
• Information / files / folders on the computer goes missing.
• Changes to your Windows settings / programs not working.
• Computer sending messages autonomously.
Suggest TWO ways how a user can customize the graphical user interface ( GUI) to suit their
preferences.
Display / Visual settings:
• Adjust screen resolution.
• Change background.
• Themes.
• Font size / colour.
• Brightness of screen.
7
Desktop layout / organization:
• Add / remove shortcuts / icons.
• Format shortcuts / icons.
Input / device settings:
• Custom keyboard.
• Change cursor size / shape.
Sound settings:
• System sound.
• Notification sound.
Menu customisation:
• Quick access menus.
• Accessibility.
Windows behaviour:
• Multiple desktop.
System preference:
• Date / time format
• Notification tray icons.
8
Data and information are crucial elements in an ICT system.
Describe what is meant by data and give an example:
Data refers to raw facts which as such does not have any meaning / unprocessed facts / not
analyzed.
Example: a list of numbers or words.
The new monitor you connected to your computing device displays a resolution error
message.
Where would you change the resolution to resolve / fix this error message?
• Research bar: Type resolution: System setting: Display.
• Right click on desktop: Display settings.
• Right click on Start: Setting / System: Display.
• Windows + i
A data projector has been set up and displays a ‘No Signal’ error.
Identify TWO possible reasons why this error occurs.
• Cable / signal (WiFi, Bluetooth) not connected properly.
• Faulty cable / port.
• Incorrect display settings.
• Computer is off or on sleep mode.
• Faulty / outdated drivers.
• Correct source is not selected.
Give TWO disadvantages of frequently defragmenting a hard drive.
• Can increase the wear and tear of the hard drive, which can cause it to fail more quickly /
9
decrease life span of the hard drive.
• Can be a time-consuming process.
• It slows down the overall performance of the computer while it is running.
• Could result in corrupted files.
• A single-user system is limited to only one active user / one user at a time.
• Multi-user system allows more than one user at the same time.
• Online gaming.
• Online platforms.
• (Networked) companies / institutions (e.g., school university, banks, SARS)
Give TWO reasons why a company would choose to use gird computing:
Study the following advertisement and answer the questions that follow:
Identify the feature in the advertisement that indicates that it is a portable computer.
The processor in this advertisement has 2x cores. Explain why a processor with two cores
(Dual Core) would have a better performance than a single core processor.
• When dual core or quad core or any other core is used to describe a CPU, this tells you how many
physical CPUs are on the chip.
• A dual core has two physical CPUs making it possible for the computer to work more efficiently.
• HDMI carries high quality video and audio signals so there is no need for separate audio cables as
with VGA.
Name TWO differences between a build in Graphics Card and an external Graphics Card
besides anything relating to cost.
Which one of the storage mediums (SSD / HHD) is best suited for storage of large quantities
of data?
• HHD
a) Silent operation.
There are no physical moving parts when writing or reading on an SSD.
b) Faster performance.
There is no time spent to move to the position where the file is saved can access it immediately.
OR
Solid state drives operate much faster than traditional hard drives as they store data electronically
and not magnetically.
11
Every now and then your computer displays the following message:
Explain when the operating system will make use of virtual memory?
Study the image below and answer the questions that follow.
• Drone technology.
• Battery life.
• Weather changes.
• The use of drones may be limited by air space rules / laws.
• Flight license may be necessary for some models.
Explain TWO ways in which the computers will be financially beneficial for the insurance
company.
• Greater productivity – time is saved by producing electronic documents versus type writers /
electronic communication enhance productivity.
• Information availability – access to current / accurate data / availability of information on the web.
• Fewer employees – will save on payroll expenses.
• Cost saving – do not have to print everything which saves paper, save on communication costs.
12
Besides switching off all computers at night, state TWO other ways in which the electricity
usage of computing devices can be decreased.
• Defragmented rearrange parts of files on your hard drives whereas a backup copies (complete)
files / folders to a secondary storage medium for safekeeping.
Give TWO reasons why it is necessary to have an operating system installed on a computer
by referring to the functions of an operating system.
Consider the two images below on Virtual Reality and answer the questions that follow.
13
Explain the basic working behind VR.
• A technology that combines multiple inputs and outputs, so that the computer creates a whole ne
world for you to experience.
• Malware that encrypts data (making it unavailable) until you pay the hacker a ransom fee.
Explain why it is not a good idea by stating TWO disadvantages of using Bluetooth in the
environment.
• The speed of transferring data is very slow compared to other wireless technologies.
• The range is limited to a few meters / can loose signal if you move away from the source.
• You can only connect a limited number or devices.
• Bluetooth has a lower bandwidth.
• May experience some security issues while transferring.
• Bluetooth cannot transfer large amounts of data.
• Connectivity issues can occur between different versions of Bluetooth devices.
A service provider has the right to ‘throttle’ a user’s internet connection, if necessary.
What will be the results of this to the user AND also explain why the service provider decided
to do this?
• ‘Shape’ is a technique where certain network (internet) services e.g. emails, are given preference
while others such as social networking services are given less priority, thus the services are given
priority to more critical activities.
• Uncapped data means that there is no limit on the amount of data that can be used over a specific
period of time.
14
Analyse the picture below and give the term and description for the process.
• Throttling / policing
• Occurs when the ISP slows down the internet speed due to excessive data / downloads / Not
adhering to FUP (Fair Use Policy)
John received an e-mail marked as high priority and decided to flag it.
• The subject line does not indicate the topic of the e-mail.
• High priority: These emails are marked as important by the sender/should be addressed
promptly.
• Flagging: flagging is a way for you to organize / categorize / prioritize / follow up or keep track of
e-mails.
Discuss TWO factors that may decrease upload and download speeds in an internet
connection.
• File size / multiple files open.
• Bandwidth size.
• Background applications running.
• The type of internet connection.
• The quality / stability / reliability of the connection / network traffic / congestion.
• Distance from the service provider / router.
• Hardware capabilities.
• Shaping.
• Throttling.
15
• Capacity of the ISP’s infrastructure.
• Efficiency of the user’s devices.
State TWO good guidelines / hints for users using video conferencing.
• A device that allows other wireless devices to connect to a wired / wireless network.
Give TWO reasons why you would choose a wireless network for a home or a small business.
• Easy to install.
• Less cables clutter / no wires.
• Easy to connect to.
• Added mobility / flexibility.
• Easy to expand.
State TWO advantages of using tabbed browsing.
16
What is the function of an NIC?
• The NIC is used to connect a device to a network cable.
Give TWO reasons why a company may choose NOT to use an intranet
• Company too small to justify cost of intranet / often tied to licencing.
• Staff can bring in unauthorized devices and infect the intranet with malware.
• Requires integration and maintenance.
• Often overly complex for employees / Inaccessible / challenging to access for employees working
from home / personal PCs or smartphones / rarely equipped with online functionality / employees
need to be trained.
State TWO factors to consider when installing wireless access points in a network.
17
INFORMATION MANAGEMENT
Study the extract from the database report below:
A learner wants to show how the number of e-book readers have increased / decreased
over a period of time using a chart.
18
State TWO ways to present research information to a target audience.
• Write a report.
• Create a presentation.
• Create a website.
• Podcast / Vodcast
• Social media
• Printed media.
Give ONE example of the type of data you could add to acknowledge the source.
19
• Ask questions that will not guide people to specific answers / unbiased
• Passing off someone else’s work as your own without their permission.
Recommend TWO contactless biometric access control systems can consider using.
Give TWO ways to produce fewer, but more relevant results with a web search (in general).
Give TWO reasons why it would be better for the researcher to conduct a survey online
instead of using a hardcopy questionnaire.
20
• Do not have to decipher bad handwriting.
SOCIAL IMPLICATIONS
An E-learning app was developed to help train new employees to use the equipment in the
laboratory (see below).
Explain why this technology will be more useful compared to watching a video about the same
equipment.
• It adapts to / is applied to the environment / equipment YOU see (not just a generic example).
• A method of computer program design which focuses on the user’s specific needs and
requirements.
Discuss how a DDoS attack can be used by a Hacktivist group like Anonymous to wage
cyberwarfare against enemies, such as during the Ukraine / Russia war?
They could use it to attack / take down an enemy’s / another country’s services such as:
Suggest a software accessibility option that will help a person suffering from tremors when
giving input to a computer.
21
• Filter keys.
• Voice typing / speech recognition / speech-to-text / ‘narrator’.
Give TWO examples how Artificial Intelligence is used in our everyday lives. Do NOT just list
the names of the apps.
• Voice assistant apps / apps you can ask for help looking up information: Alexa, Siri, Google
Assistant, Bixby.
• Personalized suggestions in (entertainment) apps like: Spotify, Apple Music, Netflix, You Tube.
• Financial institutions can identify fraud / calculate credit scoring.
• The retail / online shopping sector can offer personalized suggestions.
• Personalized healthcare assistants (can act as life coaches).
• Facial recognition in apps can identify people.
Which term describes all the ways in which confidential information is obtained by abusing
the trusting nature of people?
• Social engineering.
State TWO ways how a company can prevent data loss when unscheduled power failures
occur.
• Use Autosave.
• Install a UPS.
• Install inverter.
• Make use of solar panels, battery bank.
• Software / program / app that is designed for malicious intent / unwanted / unexpected.
Explain TWO ways in which a virus can affect the performance of a computer.
22
• Program(s) or file(s) are suddenly missing.
• Program / file changes without explanation / stop operating properly.
System:
23
• More economically viable.
Your friend wanted to download a song from the internet and clicked the download button, but
was redirected to a malicious page.
• Click-jacking / Pharming
Recommend TWO actions that your friend can take to prevent this from happening again.
Briefly describe what data protection is AND give ONE method to protect data/information,
excluding any physical methods.
Data protection is about safeguarding your data / information from unauthorised access.
Method:
• Passwords.
• Firewalls.
• VPN.
• Encryption.
• Backup.
• Two factors are authentication.
SOLUTION DEVELOPMENT
Give TWO reasons for using the ‘Save as’ option in any program.
Differentiate between the output of the <p> and the <br> tags in HTML.
• The <p> tag is used to indicate a new paragraph and creates a space before and after the
paragraph.
• The <br> tag is used to indicate a line break in the current paragraph without any paragraph
spacing.
24
List THREE elements, besides an image, that appear in most built-in cover pages, in Word.
• Text boxes.
• Shapes.
• Content controls.
• Borders.
• Paragraphs.
• Yes / True / On / -1
Mail merge is commonly used to create labels in word processing. Consider the screenshot
below.
Besides using the ‘Insert Merge Field’ command repeatedly, what is the better way to instantly
insert the fields from the first label on all the other labels?
• Update labels.
Suppose you’ve successfully inserted the fields on the other labels. Describe the output one
can expect to see if the <<Next Record>> rule was not on all the labels.
• The information on the first label would be repeated on all other labels.
25
Correct the error in the VLOOKUP function in cell E2.
Compare the difference between the purpose of a validation rule in a database table and
criteria in a query.
• The purpose of validation rule is to limit possible entries / control what can be typed in.
• Query criteria is used to extract / only display specific records.
Your friend is working on a spreadsheet and is trying to calculate 50 minus 30 and then divide
the answer by 4. The answer he’s getting is 42.5 instead of 5.
What’s the most likely reason for the error AND how can it be corrected?
(correction)
Your friend generated a spreadsheet for stationery items sold to a customer. However, the
total for all the stationery items displays zero as an answer.
Study the screenshot below and give TWO reasons why the function returns a zero.
26
Study the screenshot below.
Which word processing feature has been used to create the list?
• Multilevel list.
Explain why the date ’15 July 2024’ is not one of the list items AND how the date can be
displayed as a list item.
• The date is till part of the same paragraph because a line break / soft enter / Shift+Enter was used.
• A new number will only display for a new paragraph break / enter.
Discuss TWO reasons why you would use page headers and page footers in a document AND
give an example of the type of information that can be included in a header or a footer.
Example:
Name TWO data types that can be used for text in a database table.
• Short text.
• Long text.
• Lookup
<0 or >=5
• The number entered is less than 0 (negative numbers) or numbers 5 and above / Numbers from 0
to 4 are excluded.
27
Tab stops can be used to align text neatly in columns.
A leader line can be added with tab stops. Why would you add a leader line?
Name TWO features that can be used to set tab stops in a word processing document.
The following criteria appears for the Username field in a database query:
Like”??an*’’
Explain the difference between the <th> and the <td> tags.
• <th> Creates a header cell in a table / text tha is bold and centred.
• <td> Creates a cell to add data in a table.
Microsoft Access provides field property settings such as validation rules to improve the
accuracy of data capturing.
• Input masks.
• Field sizes.
• Default values.
• Lookup values like List Box, Combo Box, Check Box.
• Formatting e.g. Medium date.
Give a word processing feature that will allow a user to format all the headings in a document
at the same time.
• Styles.
Name a word processing feature which will force certain text to move to the beginning of the
next column.
• Column break.
28
Which THREE functions were combined to extract the user from the e-mail address in the
screenshot below?
• LEFT OR MID
• LEN
• FIND
Give ONE reason why you would use the button in the image below in an Access database
table.
Examine the piece of HTML code below, which is used to insert the image on the web page:
SECTION C
The management of the community hall decided to open a gaming room. The gaming room will
include access to broad games and video games
A small network needs to be created with ten computers in the gaming room.
Give ONE reason why this network would NOT require a server.
29
• System compatibility.
• Wireless capability.
• Cost per page.
• Budget available.
• Mobility.
• Future needs.
• Affordability.
• Energy saving features.
• Print from storage device.
What type of cabled media will most likely be used to connect the computers? Motivate your
answer.
• UTP / STP (Twisted pair)
• CAT 5 / 6
• Ethernet / LAN cable.
Motivation:
• Most cost-effective solution.
• Easy to set up than fibre optics.
The management needs to purchase PCs for the gaming room and are considering PCs with
the specifications below:
Suggest TWO additional hardware devices that can be bought for this computer.
• Blue Ray / Rom / DVD Rom.
• VR glasses.
• Printer.
• Scanner.
• Screen / Big Screen.
• Speakers.
• Webcam
• Video capture card.
• Microphone.
What kind of computer user will most likely use a computer with these specifications?
• Power / Super user / (gamer)
Name TWO types of utility software that can be used on this computer.
30
• Antivirus.
• Disk clean-up
• Disk defragment
• Backup
• File compressing
• Task scheduler
• File management.
How is the size of monitors normally measured?
• Monitors are measured diagonally.
The new computers must be secured and protected.
What technology can the management add to all devices / equipment to ensure easy tracking /
monitoring of devices / equipment?
• RFID.
• Barcode / QR codes / stickers.
• Bluetooth tracking devices.
Name TWO physical safeguards to protect the computers.
• Burglar bars.
• Security guard.
• Steel doors.
• Mesh in the roof.
• Locks.
• Alarm system.
• Cameras.
The management of the community hall decided to host a gaming tournament.
The management wants to send a standard letter to all tournament participants to thank them.
What word processing feature can be used to quickly generate a personalised, standard
thank-you letter for each participant?
• Mail merge.
Special gaming chairs were bought for the tournament. Give ONE feature that a gaming chair
should have.
• Adjustable armrest.
• Adjustable height.
• Movable base.
• Breathable material.
• Gaming related enhancements.
Give TWO examples of how ICT can be used to advertise the tournament.
• Social media.
• Website.
• E-mail
• Radio and television broadcast.
What Microsoft Office applications is best suited to capture and store the individual entries for
the tournament?
31
• Access
The secure storage area is protected by a lock which opens by scanning a fingerprint. Briefly
explain what this type of security is called and give ONE disadvantage.
• Biometric security.
• Dirty fingerprint will not scan.
• Changes in fingerprint structure will not allow access.
• Cannot be shared, person must be present.
• If the surface of the biometric device is dirty, it will not scan the finger correctly.
Briefly explain what virtual reality is.
• The use of technology to create a simulation of a 3D environment that can be interacted with by a
person in a seemingly real or physical way.
Give TWO disadvantages or limitations of virtual reality.
• Physical effects: motion sickness, injuries.
• Psychological: moral and ethical concerns, (inability to distinguish between what is real and what is
virtual).
• Limited availability to the special equipment like VR glasses, video cameras.
State TWO advantages for the committee to design an e-magazine instead of a hard-
copy version.
• Interactive elements.
• Saving of printing cost.
• Easy to change / update.
• Reach larger audience / easier to share.
• Saves the environment.
• Accessibility features.
What network policy should the school and committee have in place?
• AUP.
Explain why the network might be slow while the committee is working on the e-
magazine.
32
State TWO advantages of storing photos on the cloud compared to local storage.
• Convenient access from any device anywhere / anytime with internet connection.
• Serves as storage space to backup.
• Service provider may provide more security than local storage.
• Saves local storage space on local devices.
• Synchronization services between devices.
• Megapixel.
Explain why interviews would be a better option to collect the information rather than
using questionnaires.
Name ONE good practice the committee should consider when conducting the
interviews online.
Name TWO types of application software the committee can use to design the e-
magazine.
33
• Web design software.
Which HTML tag AND attribute will be used to create a link to the order form?
Which word processing feature can be used to move an image next to a paragraph?
• Text wrapping
• Payments are made by bringing POS and devices / bank card in close contact / tapping
allowing them to transfer data wirelessly.
Your school will host a triathlon competition which includes swimming, running and bike riding.
Learners from the school will assist by creating posters, taking photos and also with the
general administration of the competition.
Suggest TWO reasons why the organisers should use electronic forms to register
participants.
• Accuracy.
• Participants can complete the form in a shorter time / more efficient to complete by
participants.
• Less chance of processing errors.
• Perform data validation.
• Store / process / analyse information.
• Share with / reach a larger audience.
• More environmentally friendly.
• Flyers / Stickers.
• Online platforms.
• Printed newspaper / magazines.
• Billboards.
• Radio / TV.
34
What happens when the QR code is scanned?
• The QR code will provide a link to the website / document / additional information.
Name an online method used to raise small amounts of money from a large number of
people.
• Crowdfunding.
• Kickstarter.
• Indiegogo.
• GoFundMe.
• seedInvest.
• Kiva.
• Patreon.
• CrowdQueb.
• Back a buddy.
Expect for resolution, name TWO other camera specifications that impacts the quality
of the images.
35
The track layout below will be used for the competition. Participants will be issued with a
device that is embedded with an RFID tag.
Give TWO reasons why the school will be using RFID tags for the participants.
• A self-driving car that can sense its environment and move safely with little or no human input.
Apart from ergonomically designed equipment, recommend TWO other ways for the
organisers to prevent strain on their bodies.
36
Explain what ergonomic design is.
• The design of future and other devices to make working more comfortable and safer.
The organisers want to move the information from the spreadsheet to a database without
opening the database.
• Export.
37