You are on page 1of 15

INFORMATION TECHNOLOGY

GRADE 11
2020

FINAL EXAMINATIONS

PAPER 01 – THEORY (100 MARKS)

MEMO

QUESTION ONE: TERMINOLOGY (10 Marks)


Write down the definition for each of the terms below.

1.1 Intranet (2)

An intranet is a computer network with Internet like services for sharing information,
collaboration tools, operational systems, and other computing services within an
organization, usually to the exclusion of access by outsiders. ✓✓

1.2 Data mining (2)

The use of sophisticated software to examine a large volume of information stored in many
databases on-line to discover patterns and trends. Usually aimed at transforming large
volumes of unstructured data in a form that can be used to make decisions. ✓✓

1.3 Overclocking (2)

Overclocking is the practice of increasing the clock rate of a computer components to


exceed that certified by the manufacturer. Commonly, operating voltage is also increased to
maintain a component's operational stability at accelerated speeds. ✓✓

1.4 RFID (2)

Radio-frequency identification (RFID) is the wireless use of radio-frequency electromagnetic


fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects. ✓✓

1.5 IRQ (2)

Interrupt request (or IRQ) is a signal sent from either hardware or software to the processor
that temporarily stops a running program and allows a special program, an interrupt
handler, to run instead. ✓✓

Page 1 of 15 IT11 - P01: Final Exam 2020 MEMO


SCENARIO:

Your school has decided that your teachers have such wonderful online teaching skills that
they are going to share their experiences of online teaching with teachers from other schools
that need some help. The IEB is going to provide some of the hardware that is needed for this
project and you will be asked to assist some of the teachers who might not be tech savvy.
Every person that is involved with this initiative will get a laptop/device to work on.

QUESTION TWO: SYSTEM TECHNOLOGIES (20 Marks)

For teachers who need advice on acquiring a device, the IEB has provided the following
recommended specifications for an entry level laptop.

Lenovo Ideapad 120S-11IAP N3350 11.6" Laptop

Processor Intel® Core™ i3 (dual core) 3.40 GHz

Memory 2GB LPDDR4

Graphics Intel HD Integrated graphics

Storage 32 GB eMMC

2 x USB 3.0
I/O (Input/Output) Ports 1 x Type-C 3.0 HDMI
MicroSD Card Reader

WLAN: 1 x 1 WiFi 802.11 ac


Connections
Bluetooth: Bluetooth 4.0

Operating System Windows 10 Home

Page 2 of 15 IT11 - P01: Final Exam 2020 MEMO


2.1 How many cores does the processor have? (1)

Two ✓

2.2 The laptop has 2GB of RAM. What is the purpose of RAM in a laptop? (2)

RAM is volatile memory that stores data and instructions that the processor is currently
working with. ✓✓

2.3 The laptop that is being considered has 32 GB eMMC storage.


What does this refer to? (1)

Secondary storage, in this case the size of the SSD. ✓

2.4 The laptop has integrated graphics.

2.4.1 What is meant by integrated graphics? (1)

Built into the motherboard. ✓

2.4.2 Explain what it means if the integrated graphics utilises shared memory. (2)

Since there is no RAM on the graphics card, system RAM has to be shared for the
processing of graphics along with whatever the CPU is processing as well. ✓✓

Page 3 of 15 IT11 - P01: Final Exam 2020 MEMO


2.5 Would the user of this laptop, in terms of the scenario, need an optical drive?
Motivate your answer by explaining what an optical drive is. (2)

An optical drive uses laser light to read and write and works with CD/DVD/BluRay disks. ✓
As everything is done online, cloud storage can be used as well as external storage can be
connected to the device so an optical drive will now be required. ✓

2.6 The laptop does not have a LAN Ethernet port.


Explain the impact of this on the user. (1)

Will not be able to connect to a LAN via a cable and only rely on wLAN it’s speeds. ✓

2.7 Virtual memory does not appear as a specification.


Explain what virtual memory is and how it is used. (2)

Free space on the HDD reserved by the operating system to be used when RAM is full.✓
Pages of data are swapped from RAM to the HDD and vice versa. ✓

2.8 The laptop computer is issued with Windows 10 Home operating system.
List TWO primary functions of an operating system. (2)

Any TWO: ✓ each


• Provide a GUI
• Run applications
• Control hardware and software

Page 4 of 15 IT11 - P01: Final Exam 2020 MEMO


2.9 A computer system can use several different processing techniques.
Explain the following processing techniques:

2.9.1 Multitasking (1)

Multitasking is when an operating system appears to run multiple programs at the same
time by splitting the CPU time between the tasks. ✓

2.9.2 Multithreading (1)

A program can be divided into various tasks (such as browsing 2 websites on the WWW in
a web browser) and each task is carried out by the Operating System and app software
simultaneously and separately. ✓

2.10 Distinguish between a compiler and an interpreter. (2)

Compiler transforms program code into an executable form before running.✓

Interpreter reads each line of program code, converts it to machine code, and executes it.✓

2.11 Looking at the scenario and the specifications of the suggested laptop, do you
think that this laptop will be suitable for what it is required to do?
Justify your answer by giving TWO specific reasons based on the laptop’s
specifications. (2)

Yes / No
MUST address TWO specifications listed in the advert and be related to the scenario. ✓✓

Page 5 of 15 IT11 - P01: Final Exam 2020 MEMO


QUESTION THREE: COMMUNICATION & INTERNET TECHNOLOGIES (27 Marks)

The teachers from the various schools participating in the project will connect to each other
and their students using either wired or wireless technology.

3.1 List ONE advantage of having a network, setup. (1)

Any TWO: ✓ each


• Sharing devices such as printers saves money.
• Site (software) licences are likely to be cheaper than buying several standalone
licences.
• Files can easily be shared between users.
• Network users can communicate by email and instant messenger.
• Security is good - users cannot see other users' files unlike on stand-alone machines.
• Data is easy to backup as all the data is stored on the file server.

3.2 What is the difference between a wireless bridge and a wireless access point? (2)

A wireless bridge is a component that links network segments without using a cable. ✓
A wireless access points provide wireless access to a wired Ethernet network. ✓

3.3 Explain how a wireless mesh could be used to provide complete wireless
cover in a medium sized school. (2)

In a wireless mesh network, the network connection is spread out among hundreds of
wireless mesh nodes that share the network connection across a large area and is truly
wireless, where only one node needs to be physically wired to a network connection. ✓
That one wired node then shares its Internet connection wirelessly with all other nodes in
the vicinity. ✓

3.4 The teachers have decided to use VoIP and SMTP protocols to communicate
with the each other.

3.4.1 What is a protocol? (1)

Set of rules governing the transfer of data across a network. ✓

Page 6 of 15 IT11 - P01: Final Exam 2020 MEMO


3.4.2 Provide an example of where each protocol below would be used:

a) VOIP (1)

Skype, Viber, Whatsapp call, Facebook messenger, etc. ✓

b) SMTP (1)

Sending an email ✓

3.5 All the teachers have decided to work together and create a database of their
shared resources and worksheets. The database was planned and created by a
consultant. The consultant has explained that the database security is
guaranteed as the server has RAID and the database is backed up daily.

Explain the difference between RAID and backups and how they work together
to ensure that the data is secure. (4)

RAID – configuration of multiple disks that protects data from hardware failure as data is
shared/duplicated between the disks. ✓
Backup – makes a copy of the data. ✓
If one hard drive in the RAID crashes, depending on the type of RAID (mirroring and parity
bit), the no data is lost or data can be recreated.✓
If all hard drives crash or are damaged, then data can be recovered from backup. ✓

3.6 The teachers were chatting about setting their laptops up as hotspots for their
students when they returned to their own schools.
What is the purpose of a hotspot and how is it used? (2)

Wireless access to internet✓ typically in a public spaces, broadcasted over


WiFi ✓ and controlled to some degree.

Page 7 of 15 IT11 - P01: Final Exam 2020 MEMO


3.7 One of the schools have decided to implement a star topology network.
Discuss TWO advantages of using this topology. (2)

Any TWO: ✓ each


• Easy to setup and maintain
• If there is a problem with one computer it will not affect the entire network
• Adding/removing a node does not upset the network
• Easy to extend the network if there are free ports

3.8 Teachers and students like to use the Internet and particularly YouTube for
instructional videos on various topics.
How is Video On Demand (VOD) replacing video/DVD shops? (2)

You are able to select and watch a video at any time on your television and personal
computers. DSTV offers VOD streaming where you can rent a video and for a payment it
will be streamed to your television, this means that the viewer no longer need to go to a
video shop to rent a movie. ✓✓

3.9 What media compression formats would you use for the following:

3.9.1 Video (1)

Mpeg-4 ✓

3.9.2 Sound (1)

MP3 ✓

3.9.3 Picture (1)

Jpeg ✓

Page 8 of 15 IT11 - P01: Final Exam 2020 MEMO


3.10 It is important that a web site is secure.

3.10.1 Explain how pharming affects a user. (2)

Pharming is a cyberattack intended to redirect a website's traffic to another, fake site.


Pharming can be conducted either by changing the hosts file on a victim's computer or by
exploitation of a vulnerability in DNS server software. ✓✓

3.10.2 List TWO precautions you can take regarding your own personal Internet
privacy. (2)

Any TWO: ✓ each


• Don’t enter too much info online
• Run antivirus
• Disconnect when not using Internet
• Set privacy settings to high security
• Don’t “friend” people you don’t know
• Don’t trust everyone – be suspicious

3.11 Distinguish between downloading and streaming. (2)

Downloading a file would mean that a copy of the file is saved to a storage location on your
computer ✓ and streaming is the immediate watching of content, online. ✓

Page 9 of 15 IT11 - P01: Final Exam 2020 MEMO


QUESTION FOUR: SOCIAL IMPLICATIONS (10 Marks)

4.1 As the teachers will sometimes accept USB flash disks with their students work
or with media on from other teachers, the risk of infections of malware will
become a real threat.

4.1.1 Define the term 'malware'. (1)

Malware is a generic term used to refer to a variety of harmful or intrusive software aimed at
disrupting the normal usage of any computer system. ✓

4.1.2 Select ONE of the following forms of malware:

Worm; Trojan Horse; Spyware

Give the definition of the malware you choose and describe how it
deploys and replicates. (2)

Any ONE: ✓✓ each


• Worm: self-replicating, relies on security failures or holes, act without the knowledge of
the user, doesn't require user to have done anything.
• Trojan Horse: most often spread via social engineering (also accept drive-by download),
relies on the user acting on a message/attachment, not spread by attaching to system
files), can spread over a network.
• Spyware: installs without the knowledge of the user, doesn't self-replicate, often uses
security holes in software such as web browsers.

4.2 One of the effects of Digitalisation on the workplace is mobile offices.

4.2.1 Explain the concept of a mobile office. (1)

The worker does not need a permanent office to visit daily. They can do their work as long
as they have the correct equipment with them. Can be available anywhere, 24/7. ✓

4.2.2 List ONE device / technology that is needed to set up a mobile office. (1)

Any ONE: ✓ each


• Mobile device(s) - laptop, tablet and / or mobile phone
• Access to the internet

Page 10 of 15 IT11 - P01: Final Exam 2020 MEMO


4.3 Instagram is one of the many social networking apps which many of the
teachers don’t use, but it seems that the students do.

Why do you think younger generations prefer Instagram to Facebook? (1)

Younger users prefer sharing photographs – “the selfie generation”


Specifically designed for selfies, has filters that adapt to individual faces, photos are only
stored for a few seconds.

4.4 Robots and AI have become an important part in our lives and some teachers are
worried that maybe their jobs might be taken over by this new technology.
Robots are often seen as an invasion of the job market.
List and discuss TWO robotic type “jobs” where they actually replace humans for
human safety/convenience. (4)

Any TWO: ✓ for listing, ✓ for discussion


• Medicine
• Manufacturing
• Warehouse Operations
• Bomb-Detection
• Etc.

Page 11 of 15 IT11 - P01: Final Exam 2020 MEMO


QUESTION FIVE: DATA & INFORMATION MANAGEMENT (15 Marks)

5.1 Data and information play a very import role in computing.

5.1.1 What is the difference between data and information? (2)

Data is raw unprocessed facts✓ whereas information is processed facts into something
meaningful. ✓

5.1.2 Once we have data and information, what do we still require in order to
make a decision? (1)

Knowledge ✓

5.2 List and explain TWO characteristics of quality data. (4)

Any TWO: ✓ for listing, ✓ for explanation


• Accuracy
• Correctness
• Currency
• Completeness
• Relevance

5.3 SQLs are used to perform queries in a database so that one is able to filter data.

5.3.1 When manipulating data in a database, we often use the concept of


CRUD. What does this acronym stand for? (2)

Create, Read, Update and Delete ✓✓

Page 12 of 15 IT11 - P01: Final Exam 2020 MEMO


5.3.2 Write an SQL statement that will display all the details of Grade
10 and 11 students stored in a table called tblStudents, sorted
alphabetically by their Surname and Name.

NB: the name of the tables and fields are in bold. (6)

SELECT * ✓
FROM tblStudents ✓
WHERE✓ Grade IN (10,11) ✓
ORDER BY✓ Surname, [Name] ✓

QUESTION SIX: SOLUTION DEVELOPMENT (18 Marks)

6.1 IT professionals use the object-oriented approach for program development.


The class diagram below should display all IT learners' names and test marks.
Study the class diagram and then answer the questions that follow:

Learner
- name : string
- test1 : integer
- test2 : integer
- test3 : integer
+ constructor()
+ constructor(n : string, t1 : integer, t2 : integer, t3 : integer)
+ getAverage() : real
+ getName() : string
+ setHouse(houseColour : string)
+ setTest1(t1 : integer)
+ showMarks()
+ toString() : string

Page 13 of 15 IT11 - P01: Final Exam 2020 MEMO


6.1.1 Given an example of the following from the class diagram.

a) Mutator method (1)

setTest1 ✓

b) Accessor method (1)

getName ✓

6.1.2 Why are the fields declared as private and the methods declared
as public, in the class diagram? (2)

So that the fields can only be directly accessed by methods declared in the same class. ✓

Methods are declared public so that they can be accessed by another class, allowing the
other class to manipulate the class’s fields via these methods. ✓

6.1.3 Name and explain the two constructors in the class diagram. (4)

Default✓ – used to assign default values (either empty or 0 or specific) to fields/attributes of


the class. ✓

Parameterised✓ – used to assign values to the fields/attributes of the class, that are sent
from another class. ✓

6.1.4 What alternative data structure would you use to store test1, test2 and
test3? Give a reason to justify your answer. (2)

Array ✓
A loop could be used to process the data easily (input) and output the data into easily
readable formats, if the data is stored in an array. ✓

Page 14 of 15 IT11 - P01: Final Exam 2020 MEMO


6.2 A 20-digit number is entered in by the user and stored in number (a string value).

The number will be valid if the twentieth digit (20th) is equal to the remainder of
the sum of the first nineteen digits divided by 20.

Write Java code for the portion of a program that determines and displays
whether the number is valid or not. (8)

String output = number + “ is NOT a valid number”;

int sum = 0; ✓

for(int i = 0; i < 19; i++)✓


{
sum += Integer.parseInt(“”+number.charAt(i)); ✓✓
}
int rem = sum % 20; ✓✓

if(rem == Integer.parseInt(“”+number.charAt(19))) ✓
{
output = number + “ is a valid number”;
} ✓

System.out.println(output);

TOTAL: 100

Page 15 of 15 IT11 - P01: Final Exam 2020 MEMO

You might also like