Sunteți pe pagina 1din 5

Randfontein High School

COMPUTER APPLICATIONS TECHNOLOGY


THEORY PAPER 2
GRADE 12
EXAMINER: Mrs A. Herbst-Smit
MODERATOR: Mr W. v. Vliet

DATE: MAY 2014


TIME: 90 Minutes
MARKS: 60

INSTRUCTIONS AND INFORMATION


1.

This question paper consists of SECTION A and SECTION B

2.

Answer ALL the questions.

3.

Number the answers correctly according to the numbering system used in this
question paper.

4.

Start EACH question on a NEW page.

5.

Leave a line between each sub question.

SECTION A
QUESTION 1: MATCHING ITEMS
Choose a term/concept from COLUMN B that matches a description in COLUMN A. Write
only the letter (AG) next to the question number (1.11.5) in the ANSWER BOOK, for
example 1.11 G.
COLUMN A
A

COLUMN B
ISP

Router

Facebook

1.3 A company that provides Internet connectivity and services


for a fee.
1.4 A social network that makes use of short text messages.

Twitter

Wifi

1.5 An example of so-called cloud computing software


where programs are executed via the Internet.

Hotspot

Google docs

1.1 A device used to connect to internet


1.2 A public place (such as a coffee shop, airport or hotel) with a
wireless network that you can use to connect to the Internet

(5 x 1)
QUESTION 2: MULTIPLE-CHOICE QUESTION
Various options are given as possible answers to the following questions. Choose the answer
and write only the letter (AD) next to the question number (2.12.5) in the ANSWER BOOK,
for example 2.1 B.
2.1

Which one of the following correctly arranges the networks in ascending order of
size (from smallest to biggest)?
A
B
C
D

2.2

Which one of the following websites does not logically belong with the others?
A
B
C
D

2.3

WAN, LAN, GAN, PAN.


PAN, LAN, WAN, GAN.
LAN, PAN, GAN, WAN.
GAN, WAN, LAN, PAN.

BidorBuy.
Amazon.
Yahoo!
Kalahari.net

Which one is not directly associated with e-mail?


A
B
C
D

Cc
Mail Merge
Bcc
Attachment
2

2.4

Which one of the options is not an advantage of online storage?


A
Cost effective
B
File extensions are blocked
C
System backups
D
Synchronization

2.5

Which one of the following is not considered a technique or tool to commit a


computer crime?
A
B
C
D

Adware
Trojan
Spoofing
Firewall
TOTAL SECTION A:

[5]
10

SECTION B
QUESTION 3
The school has decided to network the new office computers. The principal does not know much about
networks, but wants to be involved in the whole process even though in the beginning he needed to be
convinced!
3.1

Discuss two ways in which a network would be beneficial with regard to the above scenario.

3.2

The principal asks you about a LAN and a WAN.


3.2.1 Would a LAN or a WAN be installed in the school?
Motivate your answer by explaining the difference between these terms.
3.2.2 He was informed that a file server would have to be purchased. Explain the difference
between a file server and any other computer on the network and its function.

3.3

(2)

(3)
(3)

The secretaries were amazed to see that the network was connected without any cabling and
that everything is connected via wireless.
Discuss one advantage and one disadvantage of having a wireless network rather than a cabled
Network.
(2)

3.4

The principal is concerned other staff members could access confidential files. Name two
ways access to certain files could be restricted in a network

(2)
[12]

QUESTION 4
Once the computers had been networked, they decided to install Internet access. From the research
done they have read about terms such as ADSL, 3G, broadband, iBurst and are quite confused.
4.1

The school decided that ADSL was the best choice


3

4.1.1 When the governing body saw the cost of ADSL as opposed to that of a
dialup connection they asked why a dialup connection was not chosen
Give two reasons other than cost why ADSL was the better choice of the
school rather than a dial-up connection.
4.1.2 Explain how the cost of a wired connection is calculated.
4.1.3 They were confused by the fact two speeds, as shown below, were
mentioned for the ADSL connection. Explain why the two speeds are listed.
256 kbps / 1 mbps
4.1.4 The teachers requested that they would be allowed to download personal
movies and music files over the weekend. They were refused as they were
told that it would use up the cap too quickly.
Explain what a cap is and why downloading these files would affect it.
4.2

(2)
(2)

(2)

(2)

The principal is planning to attend a conference later in the year overseas.


4.2.1 In the evenings when he is not attending the conferences he would like to
access his school e-mail account. List two places that he might be able to do
so.
4.2.2 Someone suggested that he keep in contact with the school each day by
using Skype. Explain what this means.

(2)
(2)
[12]

QUESTION 5
A parent on the Governing Body has raised concerns about safety and security issues now that the
school is connected to the Internet and are considering Internet banking. She asked the school to
make sure that all necessary precautions are taken and that they have a firewall, anti-virus and antispyware software installed.
5.1

The school decides to use online banking to do the banking for the school.

5.2

5.1.1 They see a warning on the banking site about phishing. Explain what
phishing is and discuss one way in which it can occur.
5.1.2 Give two benefits for the school of making use of Internet banking.
5.1.3 Give two ways in which a bank can protect their clients who use online
banking.
The secretaries are informed that anti-virus software has been installed.
5.2.1 Explain clearly to them what a computer virus is.
5.2.2 One of the secretaries asked if she could prevent her PC from being infected
by a virus by not using the Internet. Give her some advice in this regard.

(3)
(2)
(2)

(2)
(2)

5.2.3 Explain what is meant by keeping anti-virus software up-to-date and why it
is necessary to do so.
5.3

Why does the school need a firewall if they already have anti-virus software?
Explain your answer by referring to the function of a firewall.

(2)

(2)

5.4

5.5
5.6

5.7

The secretaries complain that the home page on their web browser often changes
without them doing anything. They were told that it could be an indication of
spyware
6.2.1 Why is the general aim of spyware?
6.2.2 Mention one way in which an anti-spyware program works to help you
prevent becoming infected with spyware.
The teachers discuss starting a blog and mailing list for the school.
Briefly explain what each of these terms mean
The school needs to simultaneously send messages to all parents about meetings.
etc.
Name two ways the school can communicate with them using modern
communication technology (without using paper).
One of these secretaries sent the following message to a friend.
To
sarahjohnes@mweb.co.za
Cc
mtetelsapuka@webmail.co.za
Bcc
Subject
Attach Photo.bmp (12.57 MB)
HI GUYS

(1)
(1)
(3)

(2)

THE HOLIDAY IN CAPE TIWN WAS GREAT! I HAVE ADDED PHOTOS


BUT I MUST JUST TELL YOU THAT MY BOSS IS GETTING ANOTHER
BONUS OF MORE THAN R100 000 THIS YEAR AND HE IS GETTING
DOVORCED!
BEST WISHES
TERSIA
5.7.1 List three netiquette errors she has made with this e-mail.
5.7.2 Explain what difference it would make if she moved the address under the Cc
field to the Bcc field

(3)
(2)
[26]

TOTAL SECTION B:

75

GRAND TOTAL:

60

S-ar putea să vă placă și