12ITJuneTheory2024Paper.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

HIGH SCHOOL Examiner: Moderator: Information Technology P 2 Theory June Examination 2024 Grade 12 Marks: 150 Time: 3 hours This paper...

HIGH SCHOOL Examiner: Moderator: Information Technology P 2 Theory June Examination 2024 Grade 12 Marks: 150 Time: 3 hours This paper consists of 21 pages. Information Technology/P2 2 Grade 12 June 2024 INSTRUCTIONS AND INFORMATION 1. This question paper consists of SIX sections subdivided as follows: SECTION A: Short Questions (15) SECTION B: System Technologies (30) SECTION C: Communication and Network Technologies (25) SECTION D: Data and Information Management (25) SECTION E: Solution Development (20) SECTION F: Integrated scenario (35) 2. Answer ALL the questions. 3. Read ALL the questions carefully. 4. Number the answers correctly according to the numbering system used in this question paper. 5. Write neatly and legibly. 6. Number in the margin of the answer booklet. 7. Leave a line open between each answer. 8. Do NOT write one-word answers unless otherwise instructed. 9. The mark allocation generally gives an indication of the number of facts/reasons required. 10. START EACH SECTION ON A NEW PAGE. Copyright reserved Please turn over Information Technology/P2 3 Grade 12 June 2024 SECTION A: SHORT QUESTIONS QUESTION 1 1.1. Various options are provided as possible answers to the following questions. Choose the answer and write only the capital letter (A – D) next to the question numbers (1.1.1 to 1.1.10) in the ANSWER BOOK, e.g. 1.1.11 D. 1.1.1. Permanent software that is programmed onto the ROM. A. CMOS B. Anti-Virus C. Firmware D. Flashing (1) 1.1.2. Hardware that connects to the SATA port on the motherboard. A. Hard drive B. CPU C. Graphics card D. RAM (1) 1.1.3. Which of the following is NOT a function of the operating system? A. Manage storage devices. B. Provides a GUI for the user. C. Memory management. D. Virus management. (1) 1.1.4. An example of utility software. A. Google Chrome B. File Explorer C. Linux D. Delphi (1) 1.1.5. Rapidly switching from one process to another giving each process a small amount of CPU processing time. A. Multithreading B. Hyperthreading C. Multiprocessing D. Multitasking (1) Copyright reserved Please turn over Information Technology/P2 4 Grade 12 June 2024 1.1.6. People who use existing scripts and code developed by someone else, to hack into systems. A. Script Kiddie B. Virus Author C. Cyberbully D. Cyberslacker (1) 1.1.7. A file extension of a compressed file. A..xlsx B..zip C..mdb D..dpr (1) 1.1.8. The maximum amount of data that can be transmitted in a network from one point to the other in a certain period of time. A. Range B. Attenuation C. Bandwidth D. Broadband (1) 1.1.9. The fields, tables and relationships in the database can change, without having to rewrite the software that accesses the database. A. Physical independence B. Logical independence C. Normalisation D. Referential integrity (1) 1.1.10. The correct code to instantiate an object objTeddy based on the class TSoftToy. A. TSoftToy.create(‘Brown’,’Large’); B. objTeddy:= TSoftToy.create(‘Brown’,’Large’); C. TSoftToy:=.objTeddy.create(‘Brown’,’Large’); D. objTeddy.TSoftToy := create(‘Brown’,’Large’); (1) Copyright reserved Please turn over Information Technology/P2 5 Grade 12 June 2024 1.2. Give ONE word/term for each of the following descriptions. Write only the word/term next to the question numbers (1.2.1 to 1.2.5) in the ANSWER BOOK. 1.2.1. Creating a social media profile containing fake personal information, with the intention of luring someone into a relationship. (1) 1.2.2. A fake website created to trick users into entering their sensitive information such as passwords, by appearing to be for a legitimate organisation. (1) 1.2.3. A cyber-attack that redirects the web browser to a fake website with malicious intent when the user enters the domain name of a legitimate website. (1) 1.2.4. Electronic junk e-communication. (1) 1.2.5. An attack using multiple computers that all make requests to an online server at the same time, to cause the server to become unresponsive. (1) TOTAL SECTION A: Copyright reserved Please turn over Information Technology/P2 6 Grade 12 June 2024 SECTION B: SYSTEM TECHNOLOGIES QUESTION 2 Scenario: PlayTech is a small company that manufactures and sells a range of toys, from classic dolls to advanced robotic toys. PlayTech manufactures a robotic car kit that connects to the Raspberry Pi computer. This allows children to program the car to follow instructions. The Raspberry Pi is a small computer that can perform many tasks, such as word processing, web browsing and programming. Photo by Kevin Partner from Pixabay Photo by Gabriel Vasiliu on Unsplash Raspberry Pi 5 has the following specifications:  Arm Cortex-A76 processor 2.4GHz quad-core, 512KB per-core L2 cache  2 x Micro HDMI ports  Graphics chip  LPDDR4X-4267 8GB RAM  Dual-band 802.11ac NIC  Bluetooth 5.0  microSD card slot, with support for 16GB to 2TB  2 × USB 3.0 ports, 2 × USB 2.0 ports  Gigabit Ethernet  PCIe 2.0 x1 interface for fast peripherals 2.1. The Raspberry Pi contains a motherboard. State TWO functions of a motherboard. (2) 2.2. Consider the specifications and identify one way that a user could connect a mouse to the Raspberry Pi. (1) 2.3. CPUs are an essential part of the computer system. 2.3.1. What is the speed of the Raspberry Pi’s CPU in the specifications? (1) Copyright reserved Please turn over Information Technology/P2 7 Grade 12 June 2024 2.3.2. Discuss how the CPU speed affects a computer’s performance. (2) 2.3.3. How many cores does the Raspberry Pi’s CPU have? (1) 2.3.4. This CPU is capable of multiprocessing. Which part of a computer system is responsible for managing the multiprocessing? (1) 2.3.5. All CPUs follow the machine cycle. Name and describe the step that is missing from the machine cycle given below. (2)  Fetch: The CPU requests instructions from RAM.  Execute: Instructions are executed.  Store to RAM: The result of the execution is stored back in RAM. 2.4. The Raspberry Pi does not have any built-in storage but has a microSD card slot. 2.4.1. Provide TWO reasons why this type of storage is suitable for use in a Raspberry Pi that is part of a robotic car, instead of a hard disk drive. (2) 2.4.2. Disk caching is still possible with a microSD card. Explain how disk caching works. (3) 2.5. The specifications of the Raspberry Pi indicate that it has a “Graphics chip”. 2.5.1. Provide another term for the “graphics chip”. (1) 2.5.2. This graphics chip is not dedicated. What type of graphics chip does the Raspberry Pi have and where would it be found? (2) 2.6. The Raspberry Pi does not have any VRAM. 2.6.1. What type of data is stored in VRAM? (1) 2.6.2. Will the lack of VRAM have a positive or negative effect on the performance of the Raspberry Pi? Clearly justify your answer. (3) 2.7. An architect is interested in buying one of the Raspberry Pi's. Would he be able to use the Raspberry Pi for his work? Besides any reference to VRAM, justify your recommendation by giving TWO reasons why the Raspberry Pi would be suitable or unsuitable. (3) Copyright reserved Please turn over Information Technology/P2 8 Grade 12 June 2024 2.8. FOSS Virtualisation software called QEMU can be installed on the Raspberry Pi to create a virtual machine. 2.8.1. Besides using it for virtualisation, what would a user be able to do with the QEMU software since it is distributed as FOSS. (1) 2.8.2. Describe what a virtual machine is. (2) 2.9. List the specification that indicates that the Raspberry Pi can be connected to a: 2.9.1. LAN (1) 2.9.2. WLAN (1) TOTAL SECTION B: Copyright reserved Please turn over Information Technology/P2 9 Grade 12 June 2024 SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES QUESTION 3 Ms Barbie is the CEO of PlayTech and will be using the company's network which connects the factory and administration office. 3.1. Ms Barbie has been advised that they should use a client-server network. 3.1.1. Give the definition of a computer network. (3) 3.1.2. The server needs a Network Operating System (NOS). Explain why it is necessary to have a NOS installed on the server. (3) 3.2. Below is a diagram of a suggested network layout. 3.2.1. Provide the names of the following devices in the network diagram. a) Device 1 (1) b) Device 2 and Device 3 (1) Copyright reserved Please turn over Information Technology/P2 10 Grade 12 June 2024 3.2.2. Which hardware device needs to be added to the factory LAN to change it into a WLAN? (1) 3.2.3. What communication medium is used in a WLAN? (1) 3.2.4. Discuss TWO advantages of having a WLAN in a factory environment. (2) 3.3. PlayTech’s network will be connected to the internet. 3.3.1. Describe how the internet differs from an intranet. (2) 3.3.2. Ms Barbie will be connecting to the office network from home via a VPN. Explain to her why a VPN is a secure connection. (1) 3.3.3. One of the factory computers needs to have a driver installed for the 3D printer. IT support staff are not allowed on the factory floor. Should IT support staff use a VPN or remote desktop connection to install the drivers? Justify your answer. (3) Copyright reserved Please turn over Information Technology/P2 11 Grade 12 June 2024 3.4. PlayTech uses BitTorrent to share video tutorials on how to use different toys. Below is a depiction of James downloading some of these tutorials for his son. 3.4.1. The torrent file is represented as being on James’ computer. Clearly explain what a torrent file is. (2) 3.4.2. Name ONE example of the software that James needs to install on his computer to use BitTorrent. (1) 3.4.3. One of the computers in the diagram is a peer called a seeder. What effect will the number of seeders have on the videos’ downloading progress? (2) 3.4.4. BitTorrent is a peer-to-peer protocol. Describe the role of a peer in a computer network. (2) TOTAL SECTION C: Copyright reserved Please turn over Information Technology/P2 12 Grade 12 June 2024 SECTION D: DATA AND INFORMATION MANAGEMENT QUESTION 4 Mr Ken, the Human resources manager uses a database to manage the staff details and the tasks they have been assigned to complete. Below is a description of the tables in the Job card database. The design of the tblEmployee table is as follows: Field Name Description ID Primary key for each employee record StaffID The unique staff number that appears on their security access tag Name Employee name and surname Position Employee’s job description ContactNumber Employee phone number HourlyRate The amount that an employee is paid for every hour they work Extract of the contents of the tblEmployee table: The design of the tblTasks table is as follows: Field Name Description TaskID Primary key assigned to each task Description Description of the task to be completed Status Whether the task is “In Progress”, “Pending” or “Completed” Overdue Is the task not completed after the due date? Daysleft How many days are left before the task should be completed Copyright reserved Please turn over Information Technology/P2 13 Grade 12 June 2024 Extract of the contents of the tblTasks table: 4.1. Use the examples of data in the tblEmployee and tblTasks tables to suggest a suitable data type for the following fields in the tables. 4.1.1. HourlyRate (1) 4.1.2. Overdue (1) 4.2. Consider the design and content of the tblEmployee table and answer the following questions. 4.2.1. Name and describe the type of validation that should be performed on the HourlyRate field. (2) 4.2.2. Discuss ONE reason why validation is important. (1) 4.2.3. The employee table contains an alternate key. a) What do a primary key and alternate key have in common? (1) b) Identify the field name of the alternate key field in the table. (1) 4.3. PlayTech would like to start paying their staff in cryptocurrency. 4.3.1. Cryptocurrency uses blockchain technology. Explain why blockchain transactions are secure. (1) 4.3.2. Discuss ONE disadvantage of blockchain technology. (1) Copyright reserved Please turn over Information Technology/P2 14 Grade 12 June 2024 4.4. The number of days left before the task must be completed is stored in the Daysleft field. 4.4.1. Explain why storing the data like this is not the most suitable solution. (1) 4.4.2. Provide an alternative solution to determine when the task should be completed. (2) 4.5. The two tables need to be linked in a relationship to create a relational database. Staff members are assigned multiple tasks at a time. 4.5.1. Draw an ERD of the database showing the following: (3)  The relationship type between the entities  A suitable action verb describing the relationship 4.5.2. From the ERD, identify the foreign key field and the table it should be included in. (2) 4.6. The manager needs to check the database to monitor task progress and the staff need to update their own task progress. 4.6.1. Which type of database would be best suited for this scenario, a desktop or server database? Motivate your recommendation. (2) 4.6.2. Explain to the manager why a distributed database is not necessary for PlayTech. (1) 4.6.3. Use the description of how the database will be used in 4.6 above, to explain how record locking works. (2) 4.7. All the staff at PlayTech have been warned about invisible data collection and their digital footprint. 4.7.1. Explain what invisible data collection is. (1) 4.7.2. List TWO examples of data that is collected from a user to create their digital footprint. (2) TOTAL SECTION D: Copyright reserved Please turn over Information Technology/P2 15 Grade 12 June 2024 SECTION E: SOLUTION DEVELOPMENT QUESTION 5 PlayTech needs a program to manage all the different Lego sets they sell. 5.1. PlayTech needs to store identifying details about their Lego sets such as the set’s name, how many pieces are included, the release date and price. The UML class diagram below was designed for the TLegoSet class. TLegoSet -fName, fCode : String -fNumPieces: Integer -fReleaseDate : tDate -fPrice : Real +Constructor Create(pName: string; pNumPieces: Integer; fReleaseDate : tDate) +GenerateCode: string +SetPrice(pAmount : real) +ToString : string 5.1.1. A unique code is generated for a Lego set by the GenerateCode method using the set’s name, number of pieces and release date. a) Generatecode is a private method. How should this be indicated in the UML diagram? (1) b) Declare the accessor method that should be added to the class so that the fCode attribute is accessible to the form’s unit. (2) 5.1.2. For each of the following statements below indicate whether they are True or False. a) An object must be instantiated before any other methods can be called. (1) b) If a constructor is not defined, a default constructor will be used. (1) c) All the methods of a class must be encapsulated. (1) d) All functions have a built-in variable named result. (1) Copyright reserved Please turn over Information Technology/P2 16 Grade 12 June 2024 5.2. Lego sets belong to different themes such as Technic, Creator and Ninjago themes. Extracted from: https://jaysbrickblog.com/monday-musings/monday-musings-1-having-to-limit-the-lego-themes- you-collect/ Each set gets a unique stock code that starts with the theme name with all the vowels removed. For example, a set belonging to the Technic theme would have a code that starts with Tchnc. A junior programmer has written the following Delphi code to remove the vowels from a theme name entered by the user. Study the code below and answer the questions that follow: 5.2.1. Copy the trace table below in your ANSWER BOOK and complete the table to determine the output from the code above if the theme ‘Creator’ is entered in edtTheme. (5) Line No sCode K Is Upcase(sCode[k]) in Output ['A','E','I','O','U']? 1 Creator 5.2.2. The code executes when the program runs but produces the incorrect output. What is this type of programming error called? (1) 5.2.3. The use of a For loop in the provided code is the reason for the incorrect output. Rewrite the For loop as a While loop without changing the If- statement. NOTE: It is not necessary to rewrite the entire If- statement. It can be written as just IF… (3) 5.2.4. Identify ONE example of a built-in function in the provided code. (1) Copyright reserved Please turn over Information Technology/P2 17 Grade 12 June 2024 5.3. An array declared below stores the names of the top 5 highest selling Lego themes at PlayTech. arrBest : array[1..5] of string; 1 Architecture 2 Creator 3 Technic 4 Star Wars 5 Ninjago The Creator theme in the 2nd position, has just become the new best seller and needs to swap with the Architecture theme to move into the 1st position. Write down the algorithm in pseudocode to swap the values in the first and second elements of the array. (3) TOTAL SECTION E: Copyright reserved Please turn over Information Technology/P2 18 Grade 12 June 2024 SECTION F: INTEGRATED SCENARIO QUESTION 6 The staff at PlayTech use ICT to design, build and sell the toys. 6.1. PlayTech fully embraces ICT and the Gig economy. 6.1.1. List TWO components of an ICT system. (2) 6.1.2. Provide the CEO with an example of how the company can make use of the Gig economy. (2) 6.1.3. Why would an expert programmer not be interested in being a part of the Gig economy? (2) 6.2. One of the toys they sell is an educational toy called the Merge Cube. The following description comes from the merge cube website. https://mergeedu.com/cube The Merge Cube lets you hold digital 3D objects. Now students can explore a galaxy in the palm of their hand, hold fossils and ancient artifacts, explore a DNA molecule, investigate the Earth’s core, dissect a virtual frog, hold and share their own 3D creations. https://www.robot-advance.com/EN/art-merge- https://educationalgamedesign.com/using-merge-cubes- holographic-cube-2686.htm for-education.html 6.2.1. The Merge Cube interacts wirelessly with a mobile device. What type of network will be established between the mobile device and the Merge Cube? (1) Copyright reserved Please turn over Information Technology/P2 19 Grade 12 June 2024 6.2.2. Besides the wireless communication, discuss TWO reasons why a smartphone is the better choice to use with this toy compared to a desktop computer? (2) 6.2.3. A toy like the Merge Cube increases the digital divide. Explain what the digital divide is. (2) 6.2.4. “A white hat (ethical) hacker is a digital citizen”. Do you agree with this statement or not? Support your answer by describing what a digital citizen and ethical hacker do. (3) 6.3. To use the Merge Cube, a user needs to install an app on their mobile device. 6.3.1. Provide the name of ONE proprietary operating system represented by the icons labelled A, B and C at the bottom of the image. (1) 6.3.2. How could the user connect to the internet to download the Merge Cube app onto the mobile device, if they were far away from any Wi-Fi networks? (1) 6.4. Mobile devices contribute to 12% of e-waste globally. 6.4.1. Define the term e-waste. (2) 6.4.2. Why is e-waste harmful to the environment? (1) Copyright reserved Please turn over Information Technology/P2 20 Grade 12 June 2024 6.5. The app will allow the child to view the Merge Cube on the mobile device screen so that it looks like a 3-dimensional representation of an object. The child will be able to rotate the Cube and view the object from all directions. 6.5.1. Is this technology an example of AR, VR or MR? Give a reason for your answer. (2) 6.5.2. List TWO reasons why a teacher would choose to use the Merge Cube to teach a lesson about the solar system. (2) 6.6. PlayTech is working on some new, top secret toy designs that must be stored securely on a server so that their competitors cannot get access to them. 6.6.1. One way to protect the sensitive data is through physical access control. Besides cloud storage, discuss ONE way that PlayTech can restrict physical access to the data. (1) 6.6.2. What makes cloud storage a more secure way to store the sensitive data than on their own server? (1) 6.6.3. PlayTech uses Multi-Factor Authentication to protect the data from unauthorised access. One of the factors used is a password. Name ONE other factor that could be used to authenticate the user. (1) 6.6.4. A UPS can be used to protect data in the event of a power failure. Expand the acronym UPS. (1) Copyright reserved Please turn over Information Technology/P2 21 Grade 12 June 2024 6.7. Mr Ken the human resources manager needs help with using ICT effectively. He needs to send the message below to all the factory staff including an attachment. Dear Factory Staff, It is important to note that factory work is not a work from home job. You are required to be at work every day unless you are unwell. Attached is the leave form you must submit when you miss work for a legitimate reason. Unexplained absenteeism will result in a day’s salary being deducted for every missed day. Kind Regards Mr Ken HR Manager The manager needs to decide how to send the message. They could choose from SMS, IM, microblogging or e-mail. Which would be the most appropriate communication method to use? Include TWO functions of your chosen method to justify your recommendation. (3) 6.8. A factory worker has recommended that Mr Ken follow a Vlog about toy making. 6.8.1. Explain to Mr Ken what a Vlog is. (2) 6.8.2. Name ONE example of a popular Vlog app. (1) 6.9. Mr Ken’s computer hard drive is getting too full. Recommend, with a reason, whether he should backup or archive some of his data to free up storage space. (2) TOTAL SECTION F: GRAND TOTAL: 150 Copyright reserved Last page

Use Quizgecko on...
Browser
Browser