Professional Documents
Culture Documents
GRADE 11
2020
FINAL EXAMINATIONS
MEMO
An intranet is a computer network with Internet like services for sharing information,
collaboration tools, operational systems, and other computing services within an
organization, usually to the exclusion of access by outsiders. ✓✓
The use of sophisticated software to examine a large volume of information stored in many
databases on-line to discover patterns and trends. Usually aimed at transforming large
volumes of unstructured data in a form that can be used to make decisions. ✓✓
Interrupt request (or IRQ) is a signal sent from either hardware or software to the processor
that temporarily stops a running program and allows a special program, an interrupt
handler, to run instead. ✓✓
Your school has decided that your teachers have such wonderful online teaching skills that
they are going to share their experiences of online teaching with teachers from other schools
that need some help. The IEB is going to provide some of the hardware that is needed for this
project and you will be asked to assist some of the teachers who might not be tech savvy.
Every person that is involved with this initiative will get a laptop/device to work on.
For teachers who need advice on acquiring a device, the IEB has provided the following
recommended specifications for an entry level laptop.
Storage 32 GB eMMC
2 x USB 3.0
I/O (Input/Output) Ports 1 x Type-C 3.0 HDMI
MicroSD Card Reader
Two ✓
2.2 The laptop has 2GB of RAM. What is the purpose of RAM in a laptop? (2)
RAM is volatile memory that stores data and instructions that the processor is currently
working with. ✓✓
2.4.2 Explain what it means if the integrated graphics utilises shared memory. (2)
Since there is no RAM on the graphics card, system RAM has to be shared for the
processing of graphics along with whatever the CPU is processing as well. ✓✓
An optical drive uses laser light to read and write and works with CD/DVD/BluRay disks. ✓
As everything is done online, cloud storage can be used as well as external storage can be
connected to the device so an optical drive will now be required. ✓
Will not be able to connect to a LAN via a cable and only rely on wLAN it’s speeds. ✓
Free space on the HDD reserved by the operating system to be used when RAM is full.✓
Pages of data are swapped from RAM to the HDD and vice versa. ✓
2.8 The laptop computer is issued with Windows 10 Home operating system.
List TWO primary functions of an operating system. (2)
Multitasking is when an operating system appears to run multiple programs at the same
time by splitting the CPU time between the tasks. ✓
A program can be divided into various tasks (such as browsing 2 websites on the WWW in
a web browser) and each task is carried out by the Operating System and app software
simultaneously and separately. ✓
Interpreter reads each line of program code, converts it to machine code, and executes it.✓
2.11 Looking at the scenario and the specifications of the suggested laptop, do you
think that this laptop will be suitable for what it is required to do?
Justify your answer by giving TWO specific reasons based on the laptop’s
specifications. (2)
Yes / No
MUST address TWO specifications listed in the advert and be related to the scenario. ✓✓
The teachers from the various schools participating in the project will connect to each other
and their students using either wired or wireless technology.
3.2 What is the difference between a wireless bridge and a wireless access point? (2)
A wireless bridge is a component that links network segments without using a cable. ✓
A wireless access points provide wireless access to a wired Ethernet network. ✓
3.3 Explain how a wireless mesh could be used to provide complete wireless
cover in a medium sized school. (2)
In a wireless mesh network, the network connection is spread out among hundreds of
wireless mesh nodes that share the network connection across a large area and is truly
wireless, where only one node needs to be physically wired to a network connection. ✓
That one wired node then shares its Internet connection wirelessly with all other nodes in
the vicinity. ✓
3.4 The teachers have decided to use VoIP and SMTP protocols to communicate
with the each other.
a) VOIP (1)
b) SMTP (1)
Sending an email ✓
3.5 All the teachers have decided to work together and create a database of their
shared resources and worksheets. The database was planned and created by a
consultant. The consultant has explained that the database security is
guaranteed as the server has RAID and the database is backed up daily.
Explain the difference between RAID and backups and how they work together
to ensure that the data is secure. (4)
RAID – configuration of multiple disks that protects data from hardware failure as data is
shared/duplicated between the disks. ✓
Backup – makes a copy of the data. ✓
If one hard drive in the RAID crashes, depending on the type of RAID (mirroring and parity
bit), the no data is lost or data can be recreated.✓
If all hard drives crash or are damaged, then data can be recovered from backup. ✓
3.6 The teachers were chatting about setting their laptops up as hotspots for their
students when they returned to their own schools.
What is the purpose of a hotspot and how is it used? (2)
3.8 Teachers and students like to use the Internet and particularly YouTube for
instructional videos on various topics.
How is Video On Demand (VOD) replacing video/DVD shops? (2)
You are able to select and watch a video at any time on your television and personal
computers. DSTV offers VOD streaming where you can rent a video and for a payment it
will be streamed to your television, this means that the viewer no longer need to go to a
video shop to rent a movie. ✓✓
3.9 What media compression formats would you use for the following:
Mpeg-4 ✓
MP3 ✓
Jpeg ✓
3.10.2 List TWO precautions you can take regarding your own personal Internet
privacy. (2)
Downloading a file would mean that a copy of the file is saved to a storage location on your
computer ✓ and streaming is the immediate watching of content, online. ✓
4.1 As the teachers will sometimes accept USB flash disks with their students work
or with media on from other teachers, the risk of infections of malware will
become a real threat.
Malware is a generic term used to refer to a variety of harmful or intrusive software aimed at
disrupting the normal usage of any computer system. ✓
Give the definition of the malware you choose and describe how it
deploys and replicates. (2)
The worker does not need a permanent office to visit daily. They can do their work as long
as they have the correct equipment with them. Can be available anywhere, 24/7. ✓
4.2.2 List ONE device / technology that is needed to set up a mobile office. (1)
4.4 Robots and AI have become an important part in our lives and some teachers are
worried that maybe their jobs might be taken over by this new technology.
Robots are often seen as an invasion of the job market.
List and discuss TWO robotic type “jobs” where they actually replace humans for
human safety/convenience. (4)
Data is raw unprocessed facts✓ whereas information is processed facts into something
meaningful. ✓
5.1.2 Once we have data and information, what do we still require in order to
make a decision? (1)
Knowledge ✓
5.3 SQLs are used to perform queries in a database so that one is able to filter data.
NB: the name of the tables and fields are in bold. (6)
SELECT * ✓
FROM tblStudents ✓
WHERE✓ Grade IN (10,11) ✓
ORDER BY✓ Surname, [Name] ✓
Learner
- name : string
- test1 : integer
- test2 : integer
- test3 : integer
+ constructor()
+ constructor(n : string, t1 : integer, t2 : integer, t3 : integer)
+ getAverage() : real
+ getName() : string
+ setHouse(houseColour : string)
+ setTest1(t1 : integer)
+ showMarks()
+ toString() : string
setTest1 ✓
getName ✓
6.1.2 Why are the fields declared as private and the methods declared
as public, in the class diagram? (2)
So that the fields can only be directly accessed by methods declared in the same class. ✓
Methods are declared public so that they can be accessed by another class, allowing the
other class to manipulate the class’s fields via these methods. ✓
6.1.3 Name and explain the two constructors in the class diagram. (4)
Parameterised✓ – used to assign values to the fields/attributes of the class, that are sent
from another class. ✓
6.1.4 What alternative data structure would you use to store test1, test2 and
test3? Give a reason to justify your answer. (2)
Array ✓
A loop could be used to process the data easily (input) and output the data into easily
readable formats, if the data is stored in an array. ✓
The number will be valid if the twentieth digit (20th) is equal to the remainder of
the sum of the first nineteen digits divided by 20.
Write Java code for the portion of a program that determines and displays
whether the number is valid or not. (8)
int sum = 0; ✓
if(rem == Integer.parseInt(“”+number.charAt(19))) ✓
{
output = number + “ is a valid number”;
} ✓
System.out.println(output);
TOTAL: 100