TMS3706-Y1-24
Assignment 4
STUDENT NUMBER: 65789407
JURIEZELLE POTGIETER
Email:
[email protected] Mid-Year Examination
June 2024
COMPUTER APPLICATIONS TECHNOLOGY
Grade 11
Paper 2 – Written question paper
Time: 1 hour Total: 50
This question paper consists of 6 pages (Including the front page)
Instructions and information
1. This paper consists of three sections: Section A (10 marks), Section B (30 marks) and Section
C (10 marks).
2. Answer all the questions.
3. Read the questions carefully, taking note of the number of marks allocated to each of the
questions.
4. Number the questions as given on the question paper.
Section A
Question 1
Identify the correct answer for each question. Write down along the left side of your page only the
number of each question, and next to it the single capital letter which represents the best answer, for
example 1.11 A.
1.1. Which one of the following would not be considered a typical role that ICT plays in the
workplace?
A. Perform tasks that are difficult or dangerous for humans to do.
B. Store and make sense of vast quantities of data.
C. Provide more job opportunities for unskilled workers.
D. Complete repetitive mechanical tasks quicker and with consistent quality. (1)
1.2. Which one of the following correctly lists the four parts of the information processing cycle?
A. Input, Processing, Output and Storage
B. Input, Output, Processing and the Internet
C. Output, Automation, Storage and Input
D. Processing, Communications, Input and Research (1)
1.3. Which one of the following factors best represents the difference between general-purpose
computers and dedicated devices?
A. The presence of a processor and a hard drive
B. The ability to reduce or minimise the use of electrical power.
C. The presence of a processor
D. The ability to load programs to perform different tasks (1)
1.4. Which of the following generally places the computers or devices listed in increasing order
of processing power (from smallest to biggest)?
A. Netbook, smartphone, desktop computer
B. Desktop computer, server, consumer tablet
C. Netbook, laptop, server
D. Smartphone, desktop computer, Netbook (1)
1.5. Which one of the following represents the characteristics of feature that Ultrabooks,
Netbooks and Notebooks all have in common?
A. They always use the Windows range of operating systems.
B. They are designed to have a low power consumption.
C. They can use a maximum of 1 GB of RAM.
D. They all have Blu-ray drives installed. (1)
1.6. Which one of the following is an operating system that is most likely to be found on a
smartphone?
A. Unix
B. Windows 7
C. Office 365
D. Android (1)
1.7. When entering a cell phone number in spreadsheet, the leading zero keeps ‘disappearing’.
For example, 0821651234 becomes 821651234.
This problem can be solved by…
A. Changing the width of the column to the appropriate size.
B. Decreasing the number decimal places to zero.
C. Adding an equal sign (‘=’) in front of the number.
D. Changing the data type of the cell to text. (1)
1.8. Which one of the following refers to the state that a portable computer can switch to when it
has not been used for a period to conserve power?
A. Validation
B. Hibernation
C. Power acceleration
D. Safe Mode (1)
1.9. Which of the following data types in Access will guarantee that the field declared with this
type can serve as a primary key?
A. Hyperlink
B. OLE Object
C. Memo
D. AutoNumber (1)
1.10. Keyboards that are projected onto a screen or a flat surface are known as…
A. QWERTY keyboards
B. ergonomic keyboards
C. virtual keyboards
D. visual keyboards (1)
[10]
Section B
Question 2
2.1. Biometric flash drives are quite affordable.
Explain what the term biometrics refers to and why this might be a useful feature on a flash
disk. (2)
2.2. Input does not necessarily come via keyboard or mouse. Sensors can be used to provide.
input as well.
2.2.1. Give one specific situation where sensors would be used as input devices. (1)
2.2.2. Give one general advantage of using sensors as input devices. (1)
2.3. Give two advantages that the use of barcode systems and barcode scanners have for a shop
or business. (2)
2.4. Touch screens have become commonplace in fast-food outlets and restaurants. Give two
advantages that a touch screen provides in this specific situation. (2)
[8]
Question 3
3.1. Plug-and-Play technology has largely removed the need for a user to have to install drivers.
3.1.1. Explain what a driver is and what the function of a driver is. (2)
3.1.2. Does using Plug-and-Play technology do away with the need for drivers?
Motivate your answer. (2)
3.2. The Windows utility Disk Cleanup helps to free up space on your hard drive.
List two ways in which the Disk Cleanup utility attempts to free up disk space. (2)
[6]
Question 4
4.1. Most organisations have an AUP (Acceptable Usage Policy) for their computer facilities.
4.1.1. Briefly explain what the function or purpose of an AUP is. (1)
4.1.2. Give two items that would typically appear in or be covered in an AUP. (2)
4.2. It is not advisable to do e-banking in public venues such as cyber cafés because of the danger
of keyloggers.
4.2.1. To what general class of software do programs such as keyloggers belong? (1)
4.2.2. Explain what keyloggers are and the dangers they pose to applications such as
e-banking. (2)
4.3. The usability of websites often determines whether a user will bother returning to that site
in the future. The usability is in influenced by issues such as the consistency and readability
of the website as well issues related to navigation. Give two factors related to the navigation
of a website that influences the usability of the site. (2)
[8]
Question 5
5.1. A friend set up a database table to keep track of her friends’ contact details. An extract from
the database table is shown below.
Use this table to answer the questions that follow:
5.1.1. Explain what a primary key is in the context of a database and comment on whether
there is a suitable primary for this table. (2)
5.1.2. Your friend created the following query to produce an alphabetical list of all her
friends in Grade 11 and 12 who are on both WhatsApp and Facebook.
Give all the reasons why the query above will not produce the results or records she
wants. (4)
5.2. Explain how you can place just one of the pages in a portrait document in landscape format.
(You are not required to refer to specific tabs or menu options in your answer.) (2)
[8]
Section C
Question 6 – Integrated Scenario
Your mother has been given finance from a small business development agency to set up a business
which she will run from home. She will need to purchase the necessary software and hardware to set
up a small network to help her run her business.
6.1. Your mother found the following advert for a computer:
6.1.1. What component does the dual-core specification refer to and what is the
significance or meaning of this specification? (2)
6.1.2. Write down how much memory this computer has in terms of Gigabytes (GB). (2)
6.1.3. Write down the specification that most strongly suggests or indicates that the
computer is a portable computer. Briefly motivate your choice. (2)
6.2. Your mother’s administrative assistant suffers from motor problems that affect her ability to
use her hands.
Mention two hardware items that could be purchased to help the assistant to use the
computer in terms of her limited motor skills. (2)
6.3. Your mother has been encouraged to make use of an online storage service such as SkyDrive
or Dropbox for backing up her data.
6.3.1. Give two advantages of using an online storage service for backing up data. (2)
[10]
Mid-Year Examination
June 2024
COMPUTER APPLICATIONS TECHNOLOGY
Grade 11
Paper 2 – Written question paper
Memorandum (Grading Tool)
Time: 1 hour Total: 50
This question paper consists of 6 pages (Including the front page)
Instructions and information
5. This paper consists of three sections: Section A (10 marks), Section B (30 marks) and Section
C (10 marks).
6. Answer all the questions.
7. Read the questions carefully, taking note of the number of marks allocated to each of the
questions.
8. Number the questions as given on the question paper.
Section A
Question 1
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10
C A D C B D D B D C
Section B
Question 2
2.1. Biometrics refers to technology that measures/scans something biologically unique to each
person for identification purposes.
In this way, only the authorised user of the flash disk would be able to use it.
2.2.1. Any ONE of:
• Detecting motion
• Vital signs of patients e.g. blood pressure, pulse etc.
• Monitoring/measuring weather data e.g. temperature, humidity, air pressure etc.
• Meter readers e.g. water/electricity consumption
• Monitoring ‘system’ readings such as pressure, radioactivity levels etc.
2.2.2. Any ONE of:
• Can be used in situations that are difficult/hazardous for humans.
• Automatically captured, without human interaction.
• Captured immediately/faster than human input.
• No chance of human error in data capture i.e. accurate etc.
2.3. Any TWO of:
• Improved accuracy
• Quicker to process (scan or capture data) goods/items.
• Easy to update/change prices.
• Easy to track stock levels (if linked to a stock system) etc.
2.4. Any TWO of:
• Provides more space (no keyboard)
• Ideal for restaurants/fast-food outlets with a standard/fixed set of options
• Users have a feeling of ’intimacy/immediacy’ interacting with device/data.
• Intuitive to use.
• Can use hand gestures e.g. ‘swiping’ etc.
Question 3
3.1.1. A driver is software that is used to control a specific hardware device.
3.1.2. No Although most devices are automatically detected and the drivers are automatically
installed, you still need the drivers.
(Do not award mark for 'No’ if no motivation is given.)
3.2. Any TWO of:
• Emptying Recycle Bin
• Removing temporary files from Internet
• Removing temporary files created by operating system / Windows.
• Uninstalling components of the operating system not needed
• Uninstalling programs, you never use
Question 4
4.1.1. An AUP is a policy document that outlines the rights/privileges/responsibilities of a user in
terms of the usage of computer facilities.
4.1.2. Any TWO of:
• Privacy issues
• Ethical/safe use of facilities
• Restrictions on volume and type of downloads/material from the Internet
• Policy on use of portable storage devices
• Policy/restrictions in terms of installing software/hardware.
• Procedures to follow in terms of online dangers and malware.
• Consequences of violations of terms of AUP etc.
4.2.1. Spyware
(Also accept malware)
4.2.2. A keylogger is software that tracks and records keystrokes as you type.
to find out what your usernames, passwords and PINs are.
4.3. Any TWO of:
• Hyperlinks are easy to locate/consistently placed on web pages.
• Links are concise / easy to understand.
• Links formatted consistently.
• No broken links
Question 5
5.1.1. A primary key is a field that has unique/different value in that field for every record. / A field
that uniquely identifies a record.
The CellNo field is the only field that can serve as a primary key.
(Do not accept Email field as a primary key as some entries are blank.).
5.1.2. Criteria for Grade field should be 11 or 12 (accept >=11)
Criteria for WhatsApp field should ‘move 1 line up’
(accept description where all criteria are repeated)
No sorting is specified
The Surname and Name fields need to have their ‘Show’ properties selected/ticked.
5.2. Add section breaks before and after the page
and change the page orientation of that section to landscape.
(Also accept highlighting text and applying landscape format to selected text.)
Section C
Question 6 – Integrated Scenario
6.1.1. CPU / Processor
Chips that are ‘Dual Core’ have 2 processors
6.1.2. 4 GB
(Award one mark if 4096 used.)
6.1.3. 15.6" (HD LED)
Small screen is indicative of a portable computer.
6.4. Any TWO of:
• Eye tracking devices
• Head movement devices.
• Large key (outsize) keyboards
• Large trackballs
• Joysticks
• Foot pedal control devices
• Sip and puff devices.
6.5.1. Any TWO of:
• Saves space on local computer.
• Backups are stored safely off-site.
• Can access files/data wherever you have Internet access.
• Certain amount of storage is provided for free.
Declaration
I: Juriezelle Potgieter
Student number: 65789407
Module code: TMS376
Hereby declare the following:
I understand Unisa’s policy on plagiarism. This examination is my original work produced by
myself. I have duly acknowledged all other people’s work (both electronic and print) through
the proper reference techniques as stipulated in this module.
I have not copied the work of any other person and handed it in as my own. I have also not
made my work available to any fellow students to submit as their own.
Signature: __________________________ Date: ___24/05/2024_____