You are on page 1of 14

Western Cape Education Department

Directorate: Curriculum FET

INFORMATIONTECHNOLOGY

REVISION BOOKLET
2023 TERM 1

Grade 12

This revision program is designed to assist you in revising the critical


content and skills that was covered during the 1 st term. The purpose is to
prepare you to understand the key concepts and to provide you with an
opportunity to establish the required standard and the application of the
knowledge necessary to succeed in the NCS examination.

Link to the datafiles: https://wcedeportal.co.za/eresource/230496


1

Revision Term 1 – Theory

DATABASE MANAGEMENT
1. Indicate if the following statements are ‘True’ or ‘False’. Choose the answer and write ‘true’ or ‘false’
next to the question number Correct the statement if it is FALSE. Change the underlined word(s) to
make the statement TRUE. (You may not simply use the word ‘NOT’ to change the statement.)
a. Full verification is when someone randomly selects a sample of data and manually checks it for
systematic errors.
b. Gapminder provides free access to databases of South African matric results.
c. SMART strategies are Specific, Measurable, Achievable, Relevant and Time-bound.

2. Explain TWO ways RFIDS can be used to improve each of the following industries:
a. Retail stores
b. Train transportation systems.
c. Universities and colleges
d. Medical hospitals

3. Other than banking, name ONE other industry that can make use of database transaction tracking. Also
provide an example of a scenario in which they would use it.

4. Cherry wants to expand her small bakery business, by creating a website so that she can sell her goods
online. Cherry will need to make use of a DBMS and she will need to nd ways to secure her business’s
data.
a. Who would Cherry need to hire to help her keep her create, maintain and secure her database?
b. Mention ONE way location-based technology can help Cherry expand her business.
c. Mention ONE way Cherry can use data mining to improve and expand her business.

DATABASE DESIGN CONCEPTS


1. Choose the correct answer.
a. Which of the following scenarios does NOT need a database?
A. Storing the credentials of all Gmail accounts.
B. Backing up all the information on your personal computer.
C. Storing all the webpages of a website.
D. Storing all the information about a business’s inventory.
b. b. Which of the following is a characteristic of a good database?
A. Making copies of data in a database for backup.
B. Keeping the data and application connected and dependant on each other.
C. Preventing errors from occurring in the database.
D. Storing data in different formats.
c. Which of the following is needed to make each record in a database table different?
A. Secondary key
B. Foreign key
C. Primary key
D. Alternative key
2
2. List the four types of keys used to design a database. Design a table to use as an example.

3. In database design what are the requirements for 1NF, 2NF and 3NF?

HARDWARE
1. Consider the following 3 users:
a. Ahmed is a freelance graphic designer that travels a lot for business.
b. Belinda is a banker that must regularly check and edit accounting spreadsheets.
c. Nkosi is a professional gamer that plays at international gaming tournaments.
1.1. Which type of computer would be best suited for each user? Give ONE reason for each answer.
1.2. What type of user do you think Ahmed is? Give a reason for your answer.
1.3. Based on Belinda’s computing requirements, would she bene- t from using a smartphone or a mobile
computer. Give TWO reasons for your answer.
1.4. a. Name ONE piece of computing hardware Nkosi should financially invest in upgrading. Mention
TWO benefits of upgrading this piece of hardware.
b. Other than being potentially expensive, mention ONE other disadvantage or problem that could
occur because of Nkosi upgrading this piece of hardware.

2. Tokozile is a young entrepreneur who wants to open a computer centre for tourists in Cape Town. Her
goal is to have 16 computers with high-speed internet that can be used by tourists to browse the
internet or send messages home. However, she would also like the computers to be able to play
modern multiplayer games so that youths from the area will visit her centre.
She has obtained the following two quotations for her centre.
COMPUTER A COMPUTER B
3.2 GHz Quad Core CPU with 4 MB cache 3.6 GHz Dual Core CPU with 1 MB cache
8 GB DDR3 RAM 2 GB DDR3 RAM
2TB HDD 256 GB SSD
Gigabit (1 Gbps) network card 802.11 g (50 Mbps) wireless adapter
NVidia GeForce graphics card (4 GB VRAM) Integrated graphics (32 MB VRAM)
15’’ LCD monitor 17’’ LCD monitor
Windows Home 10 Ubuntu Linux
Microsoft Office OpenOffice
Skype (VoIP Software) Skype (VoIP Software)
R10 795 R7995
She starts her comparison by looking at the CPUs of the two computers.
a. Name TWO manufacturers of CPUs.
b. One CPU is a “dual core” CPU, while the other is a “quad core” CPU. What do these terms mean?
c. Which CPU will be faster for multitasking? Give reasons for your answer
d. The two CPUs have different amounts of cache memory. De- ne the term cache memory?
e. Tokozile expects that some of her customers will want to play games on the computers. Advise
her on which computer (according to the quotations) would be best for games and why.
f. The computers not only have different hardware, but also different software. List the operating
systems installed on each computer.
g. Which computer’s software will be the most expensive? Give reasons for your answer.
h. The operating systems of both computers support multitasking and multithreading. Define these
concepts and explain how they differ.
3
NETWORKS
1. Choose the correct answer.
a. Which of these devices does NOT usually have a built-in network adapter?
A. Desktop PC B. Laptop
C. Smartphone D. Tablet
b. Which of the following has the fastest mobile internet speeds?
A. 4G B. 3G
C. Ethernet D. Wi-Fi
c. Which of the following makes use of a SIM card?
A. Modem B. Switch
C. DSL cable D. Ethernet cable
d. Which of the following CANNOT be used in a wired network?
A. WAP B. Switch
C. Router D. Ethernet cable

2. Indicate if the following statements are ‘True’ or ‘False’. Choose the answer and write ‘true’ or ‘false’
next to the question number Correct the statement if it is FALSE. Change the underlined word(s) to
make the statement TRUE. (You may not simply use the word ‘NOT’ to change the statement.)
a. A Fibre optic cable makes use of telephone lines.
b. A Wireless Access Point can be used to create and facilitate an intranet.
c. 4G has the slowest internet speeds.
d. A notebook uses a switch to connect to the DSL cable that connects it to the router that connects
it to the internet.

3. List FOUR advantages of a local network.

4. List TWO advantages of using BitTorrents.

5. Thuli and a group of her university colleagues have decided to start up a small graphics design
company. They have decided to call the company United Designz and have a rented a whole floor of a
business building.
a. Being one of the lead graphic designers in the company, mention what type of computer Thuli will
need to do her work.
b. What type of network should her company use? Give a reason for your answer.
c. Do you think United Designz should make use of a wired or wireless network? Give TWO reasons
for your answer.
d. What type of downloading speed would be ideal for a company like United Designz? Also give a
reason for your answer.
e. Based on your previous answers and what is required to create an internet-enabled network,
identify THREE specific networking equipment United Designz should use?
f. To make le sharing easier amongst the company’s employees. Thuli has decided to set up a local
network for the company. List THREE user rights she should set up.
g. Some of the employees of United Designz travel a lot, so to access the company’s files and
documents. What type of remote access should these employees use? Give a reason for your
answer.
4
E-COMMUNICATIONS
1. A password is used to protect your computer from others accessing it. Answer the following questions
regarding security of a computer.
a. Explain how using a password for online services can protect you.
b. List THREE ways to make your password secure.
c. Explain how firewalls protect your computer.
d. List THREE types of firewalls.
e. What is encryption?
f. What do most websites use to enable encryption?

2. Give ONE word/term for each of the following descriptions. Write only the word/term next to the
question number in your homework book.
a. Before your browser can encrypt and send any data to a website using SSL, it first requests the
website’s _____
b. To stop hackers from intercepting personal information, websites can use HTTPS to encrypt any
traffic sent from the user to the website, and from the website to the user. HTTPS does this by
using _____, which adds a security layer to any web page.
c. The process of encoding a message or information in such a way that only authorised parties can
access it.
d. The encrypted message, data or information can only be decoded by another entity if they have
access to a _____

3. Travel agents must be able to conduct business from their office building or by using their mobile
office. As most of the business is conducted online, for example, customers need to book and pay
online, they must have access to the Internet.
a. Online transactions are encrypted. Explain the term encryption.
b. How do websites use encryption to secure the site?
c. Online security methods include the use of a public and private key encryption. Briefly explain the
difference and purpose of these keys?

4. The AmaNdlovhu Company plans to provide various services to members of the media during the
Soccer World Cup. To make sure that no other journalist can steal their data, the media people want to
have SSL connections to some websites.
a. a. What does SSL stand for?
b. b. What is an SSL certificate and how does it work?
c. c. Almost all computer security relies on passwords. State THREE rules to follow when creating a
password that will be very secure.

5. What is a firewall?

6. Briefly explain how a firewall works.

7. Explain the THREE general types of firewalls you can get.

8. Briefly explain what encryption is.

9. Give an example of how a bank uses encryption.


5
SOCIAL IMPLICATIONS
1. Mention any THREE mobile technologies that make life easier, how they have improved your life, and
the danger of using this technology.

2. Mention any THREE mobile technologies that make life easier, how they can improve a business, and
the danger of using this technology.

3. What is your ultimate smart device, either real or invented? Explain its benefits. Design an
advertisement and present your smart device to the class.
6

MEMORANDUM
DATABASE MANAGEMENT

1. a. False. Sample verification is when someone randomly selects a sample of data and manually
checks it for systematic errors.
b. False. Code for South Africa provides free access to databases of South African matric results.
c. True

2. Teacher discretion. Answers need to be relevant.


a. Retail stores: Tag all products stored in a warehouse. When an item can be removed from the
warehouse, it is automatically scanned and removed from the database.
b. Train transportation systems: Users can use a pre-loaded tag to gain access to the train.
c. Universities and colleges: Users can use a pre-loaded tag to gain access to the campus.
d. Medical hospitals: Nurses can use their tag to gain access to medication prescribed by the doctor.

3. Loyalty cards to gain points with each purchase at that retailer. The points entitle the customer to
benefits.

4. a. She can see where there is a market for her bakery.


b. To conduct research on what products the customers want.
c. Data mining is a process used to identify trends and patterns between different sets of data in large
databases. Selecting the right data from such large amounts of data (called big data) can help show
trends and patterns between data sets, which can improve decision making dramatically. For
example: Marketing: Data mining is used to explore increasingly large databases to improve market
segmentation. By extracting data like customer age, gender, tastes etc. and looking for patterns
and trends between them, it is possible to guess their behaviour in order to direct personalised
loyalty campaigns. Data mining in marketing also predicts which users are likely to unsubscribe
from a service, what interests them based on their searches, or what a mailing list should include to
achieve a successful response rate.

DATABASE DESIGN CONCEPTS


1. a. B. Backing up all the information on your personal computer.
b. C. Preventing errors from occurring in the database.
c. C. Primary key

2. Teacher discretion for the student’s designed table as an example, it must relate to the keys and
answers must be supported.
• Primary key: the field selected by the database creator to uniquely identify each record on a table.
For example, each song in your music database might have a primary key field called “song_id”.
• Alternative key: a field containing unique values that could be used as the primary key but is not
currently set as the primary key e.g. the artist_id.
• Foreign key: the foreign key is defined in a second table, but it refers to the primary key or a unique
key in the first table e.g. “type of music” that links the song to a specific table on examples of types
of music table.
• Composite key: a combination of more than one field that uniquely identifies each record on a
table e.g. song_id and artist_id.
7
3. Normalisation rules are divided into the following normal forms:
First Normal Form (1NF)
For a table to be in the First Normal Form, it should follow the following 4 rules:
• It should only have single valued attributes/columns.
• Values stored in a column should be of the same domain.
• All the columns in a table should have unique names.
• And the order in which data is stored, does not matter.
Second Normal Form (2NF)
For a table to be in the Second Normal Form,
• It should be in the First Normal Form.
• And, it should not have Partial Dependency.
Third Normal Form (3NF)
• It is in the Second Normal form.
• And, it does not have Transitive Dependency.
This is an indirect relationship between values in the same table.

HARDWARE
1.1. a. Laptop
b. Business user, computer
c. Gamer, computer

1.2. Power user, processing speed and RAM are important


1.3. Mobile computer, screen size and storage speed
1.4. a. GPU, increased graphic processing and speed
b. CPU not being able to process and store necessary data

2. a. Intel, AMD
b. Each “core” is the part of the chip that does the processing work. Essentially, each core is a central
processing unit (CPU). There is always only one processor chip. That chip can have one, two, four,
six or eight cores. More cores are faster only if a program can split its tasks between the cores. Not
all programs are developed to split tasks between cores. It is not about how many cores you are
running; it is about what software you are running on them.
c. Quad core as it has a higher cache
d. Cache memory is computer memory that provides high-speed data access to a processor and stores
frequently used computer programs, applications and data. It is the fastest memory in a computer
and is typically integrated onto the motherboard and directly embedded in the processor or RAM.
e. Computer A as the graphics card can store 4GB
f. Computer A: Windows Home 10
Computer B: Ubuntu Linux
g. Computer A as you need to pay for the software
h. Multitasking: With multitasking, a single processor splits its time between different processes.
Multithreading: Multithreading completes the instructions for multiple different tasks inside the
same program (called threads) by quickly switching between them.
8
NETWORKS
1. a. A. Desktop PC
b. A. 4G
c. A. Modem
d. A. WAP

2. a. False. An ethernet cable makes use of telephone lines.


b. True
c. False. EDGE/3G/ADSL has the slowest internet speeds.
d. True

3. The ability to share files and folders on one computer with other computers on the networks. Once
shared, people on the network can open and view the files or folders or they can copy the files to their
own computers. Depending on the setup, these users might also be allowed to modify the files or
delete the files.

4. For one, the data used to upload the file is shared between all the users downloading the file. The
bandwidth is also shared, allowing users to download the file more quickly. Furthermore, since the file
is not uploaded to a single website or hosted by a single user, people may continue to share it for years
after it was first shared. Finally, for websites using torrents to share pirated material, the website itself
is not sharing the illegal materials nor the files linking to the illegal materials. This makes it a lot harder
to prosecute the website owners for copyright infringement.

5. a. Laptop
b. Peer-to-peer (p2p) network, each computer on the network connects directly to the network and
the other computers on the network. Peers on this network are visible to each other and can share
files and resources with each other
c. Wireless, easier without cables, quicker speed
d. 4G & 5G as they will have large data files to download
e. Computer, internet connection channel, internet communication device
f. Who can read, write or modify the files
g. BitTorrent, can be used to share files

E-COMMUNICATION
1. a. By adding a password to a computer, only people who know the password can access the computer
and its files.
b. • Choose a password that is long (at least 8 characters). Passwords become exponentially
harder to crack with each additional character.
• Include uppercase and lowercase letters, as well as numbers, in your password.
• Never use personal information such as a birthdate or the name of your favourite sports
team as a password.
• Create a password made up of 3 or 4 random words. This will be easy to remember but
hard to crack.
• Create different passwords for different websites. In this way, if someone hacks your social
media account, they cannot use the same password for your online banking.
• Do not share your passwords with other people and do not write your passwords down.
9
c. Firewalls prevent malicious users and viruses from sending data to and receiving data from your
computer
d. • Software firewalls that are installed on the user’s computer and protects a single computer.
• Software firewalls that are installed on a server or router that protects all the computers on
the network.
• Hardware firewalls that are installed between a local network and the Internet and
protects all the computers on the network.
e. Encryption is the process of encoding a message or information in such a way that only authorised
parties can access it.
f. By encrypting personal data such as usernames and passwords, websites provide an extra layer of
protection for users

2. a. Certificate
b. SSl
c. Encryption
d. Key

3. a. Encryption is the process of encoding a message or information in such a way that only authorised
parties can access it.
b. Websites can use HTTPS to encrypt any traffic sent from the user to the website, and from the
website to the user.
c. Public key and a private key. Anything locked by the public key can only be unlocked by the private
key, and anything locked by the private key can only be unlocked by the public key. The public key
is public, which means that all the messages you send and all information you submit on the
Internet contains this public key. Even though hackers can easily see this public key, they cannot
use it to unlock information encrypted with the public key. To unlock this information, they need
your private key. Unlike your public key, your private key is kept a secret by your computer and
never shared with anyone.

4. a. Secure Sockets Layer


b. Websites use this certificate to prove their identity.

c. Any of the following:


• Choose a password that is long (at least 8 characters). Passwords become exponentially
harder to crack with each additional character.
• Include uppercase and lowercase letters, as well as numbers, in your password.
• Never use personal information such as a birthdate or the name of your favourite sports
team as a password.
• Create a password made up of 3 or 4 random words. This will be easy to remember but
hard to crack.
• Create different passwords for different websites. In this way, if someone hacks your social
media account, they cannot use the same password for your online banking.
• Do not share your passwords with other people and do not write your passwords down.

5. A firewall is a network security system that monitors, and controls incoming and outgoing network
traffic based on predetermined security rules.
10
6. A firewall typically establishes a barrier between a trusted internal network and untrusted external
network, such as the Internet

7. There are three basic types of firewalls that are used by companies to protect their data and devices to
keep destructive elements out of network, viz. Packet Filters, Stateful Inspection and Proxy Server
Firewalls

8. Encryption is the process of encoding a message or information in such a way that only authorized
parties can access it and those who are not authorised cannot.

9. If you forget your password, the bank knows the encryption key, it can decrypt the data and verify that
you have sent the correct password.

SOCIAL IMPLICATIONS
1. Mention any THREE mobile technologies that make life easier, how they have improved your life, and
the danger of using this technology. Teacher discretion, this needs to relate to the learner

2. Mention any THREE mobile technologies that make life easier, how they can improve a business, and
the danger of using this technology. Teacher discretion, this needs to relate to a businessman

3. Teacher discretion
11

Revision Term 1 – Practical

QUESTION 1: Object Oriented Programming (Open project in folder Question 1)

A constellation is a group of related stars that covers the night sky. Some stars are considered to be
navigational, while others are passive. A navigational star is used to assist with calculating direction and
movement. The application you will be using has the following user interface.

1.1 Write code for a constructor method that will receive the name of the star, its magnitude, its distance
from the Earth and the constellation it belongs to as parameters. Set the FOUR respective attributes to
the received parameter values and initialise the fNavigationalStatus attribute to FALSE.
1.2 Write code to create an accessor method for the constellation attribute fConstellation.
1.3 Write code for a mutator method called setNavigationalStatus, which will receive a Boolean value as a
parameter and set the navigational status attribute to the received value.
1.4 Write code for a method called determineVisibility that will determine and return a description of the
visibility of the star. The visibility of a star depends on its distance from Earth in light years and its
magnitude.
Use the following criteria to determine the description of visibility that applies to a star:
DISTANCE MAGNITUDE DESCRIPTION OF VISIBILITY
Fewer than 80 light years Any value Clearly visible
Between 80 and 900 light years Up to 2 Hardly visible to the naked eye
(inclusive) Larger than 2 Visible by means of standard optical aid
More than 900 light years Any value Only visible by means of specialised optical
aid
1.5 Write code to create a toString method which returns a string formatted as follows:
 <name of star> belongs to the <constellation> constellation.
 The star has a magnitude of <magnitude> and is <distance from Earth> light years away from
Earth.
If the star is a navigational star, add the following line:
 <name of star> is a navigational star.
Otherwise, add the line:
 <name of star> is a passive star.
12
1.6 For the [Instantiate Object] button, the user is required to select the name of a star in the combo box.
Once done, write code to do the following:
 Extract the name of the selected star from the combo box.
 Use a conditional loop and search in the text file for the name of the selected star. The loop
must stop when the name of the star has been found in the file.
 If the name of the star has been found, do the following:
o Instantiate a TStar object using the objStarX object variable that has been declared globally
as part of the given code.
o Test whether the star is a navigational star using the aNavigationStars array and set the
value for the navigational status attribute accordingly.
 If the name of the star has NOT been found in the text file, display a message to indicate that
the star was not found.
1.7 When the [Display] button is clicked:
 Display the details of the star in the rich edit component redDescription using the toString
method.
 Load the image of the constellation that the star belongs to into the imgStar component. The file
name of the image to be displayed is the name of the constellation the star belongs to. All image
files have the extension “.bmp”.
1.8 The brightness and visibility of a star is dependent on the magnitude and the distance of the star from
Earth. When the [Visibility] button is clicked, call the relevant methods to display the name and visibility
of the star as a Message Box.
For example, if Mimosa is selected and the [Visibility] button is clicked, you should see the following
message.
 Star: Mimosa
Visibility: Hardly visible to the naked eye

QUESTION 2: Database and SQL (Open project in folder Question 2)

The Petersen Group CC wants to use software to assist their staff in answering queries from management.
In the development of the software, a database called BandB.mdb has been created. The program is
incomplete. Your task will be to complete the program that will be used to answer queries from
management.
13
2.1 Open the data module and ensure that all the database components have been connected correctly.
You should see the user interface as displayed on the previous page.

Complete the SQL statements for each button as indicated by questions 2.2 to 2.7 that follow:
2.2 Complete the code in the [List] button by formulating an SQL statement to display all the fields from
tblClients table sorted by Surname and then by FName (first name).
2.3 Complete the code in the [Mr. Ferreira] button by creating a query that will calculate the total amount
owed by Mr. Ferreira (ClientNo, field equal to 1). This is a calculated answer. The name of the
calculated field must be Total Due, and the result must be formatted to display the amount with TWO
decimal places.
2.4 All the bookings for the English football fans have been cancelled. Complete the code for the [English]
button by creating a query to delete all English clients (Nationality field equal to English).
2.5 The group uses a 25% mark-up when calculating the selling price. Using the tblOrders table, complete
the code for the [Cost] button by creating a query that will list the Date, Category, SellingPrice and Cost
(selling price minus the 25% mark-up) for each item ordered by Guiseppe Ferreira (ClientNo field equal
to 1). Cost is a calculated field and must be named Cost.
Use the following formula to calculate the cost: Cost = Selling price × 0.75
2.6 The Petersen Group has decided that they want to support all tourists by giving them a R5 discount on
the selling price of every item they have ordered if the item’s selling price is R30 or more. Complete the
code for the [Discount] button by writing a query that will reduce the selling price of the relevant items
by R5 in the tblOrders table.
2.7 Complete the code for the [Faltemeyer] button by writing a query that will add the following client data
to the tblClients table:
Mr. Harald Faltemeyer, ID 7407185683074, Swedish
NB: IDNumber field only accepts strings, while the SA field only accepts boolean values.

You might also like