IT Trial P2 2018 -...

27
MARKS: 150 EXAMINERS: V B RAMKILAWAN B GOVENDER MRS J REDDY TIME: 3 hours MODERATORS: MRS S NUNKUMAR MRS R PILLAY Copyright reserved Please turn over INFORMATION TECHNOLOGY P2 GRADE 12 TRIAL EXAMINATION SEPTEMBER 2018

Transcript of IT Trial P2 2018 -...

Page 1: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

MARKS: 150 EXAMINERS: V B RAMKILAWANB GOVENDERMRS J REDDY

TIME: 3 hours MODERATORS: MRS S NUNKUMARMRS R PILLAY

This question paper consists of 17 pages and an Annexure.

INSTRUCTIONS AND INFORMATION

Copyright reserved Please turn over

INFORMATION TECHNOLOGY P2

GRADE 12

TRIAL EXAMINATION

SEPTEMBER 2018

Page 2: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 2 September 2018NSC

1. This question paper consists of SIX sections:

Section A: Short questions (15)Section B: System Technologies (26)Section C: Communication and Network Technologies (24)Section D: Data and Information Management (24)Section E: Solution Development (24)Section F: Integrated Scenario (37)

2. Read ALL the questions carefully.

3. Answer ALL the questions.

4. The mark allocation generally gives an indication of the number of facts/reasons required.

5. Number the answers correctly according to the numbering system used in this question paper.

6. Write neatly and legibly.

Copyright reserved Please turn over

Page 3: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 3NSC

TRIALS/ 2018

SECTION A: SHORT QUESTIONS

QUESTION ONE

1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question number (1.1.1–1.1.5) in the ANSWER BOOK, for example 1.1.6 D.

1.1.1 Which ONE of the following refers to a data structure that is non-volatile?

A String B One-Dimensional ArrayC Two-Dimensional ArrayD Text File (1)

1.1.2 Study the following code:

Function findsum(num1,num2:integer):integer;Var sum:integer;Begin sum:= num1 + num2; Result:=sum;End;

The variable sum is an example of:

A Actual parameterB Formal ParameterC Global variableD Local variable (1)

1.1.3 Use of the HTTPS protocol means:

A The displayed webpage is using encryptionB The displayed webpage is not using encryptionC The displayed webpage is a phishing scamD The displayed webpage is definitely not a phishing scam (1)

1.1.4 Which of the following is FALSE with regard to passive RFID tags?

A Technology used in e-Toll tagsB Transmits over a very short rangeC Activates when within range of a receiverD Can transmit over wide distances (1)

Copyright reserved Please turn over

Page 4: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 4NSC

TRIALS/ 2018

1.1.5 How many times will the loop below be executed?

K:=1;While K>0 do…K:=K * 3 – 4 ;End;

A OnceB Not at allC Four timesD Infinitely (1)

1.2 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question number (1.2.1–1.2.10) in the ANSWER BOOK.

1.2.1 Cable/Connector which links the HDD to the Motherboard. (1)

1.2.2 Trend whereby separate technologies and functions from multiple devices are combined into a single multi-purpose device. (1)

1.2.3 Network facilities and/or webpages made available within the LAN of an organisation or business. (1)

1.2.4 An error in programming where the program executes, but the output is incorrect or invalid. (1)

1.2.5 The integration of an always-online Internet connection and interaction in everyday household appliances. (1)

1.2.6 A type of memory that stores the BIOS settings. (1)

1.2.7 A business which pays employees to click on web links to create inflated (increased) viewership / follower counts. (1)

1.2.8 Legal agreement between a user and a software publisher which has to be accepted before using the software. (1)

1.2.9 The principle in software development which promotes validation on the basis that: “where input data is invalid, the output will also be invalid.” (1)

1.2.10 Code written by a programmer in human-readable format, before it is compiled or interpreted. (1)

TOTAL SECTION A: 15

Copyright reserved Please turn over

Page 5: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 5NSC

TRIALS/ 2018

SECTION B: SYSTEM TECHNOLOGIES

QUESTION TWO

SCENARIOThe WriteLn (pronounced “Write Line”) is an tech-related newsletter written by IT students from many local schools. The newsletter has attracted attention for their contemporary writing style and humour. The launch of the newsletter hasn’t been easy, however, with several technical hiccups along the way.

2.1 The newsletter has setup a Central Server to store all article data.

The Central Server displays the following error:REVOLT SERVERLaunching POSTKeyboard… OKRAM… 32GB… OKStorage… 8TB… Bad sectors detectedOperating System: Windows 7 Starter 32 bit versionOPERATING NOT FOUND! BOOT HALTED.Press any key to restart…

2.1.1 Identify the amount of Primary Memory on the Server. (1)

2.1.2 With regard to its purpose, explain the reason for the difference between the amount of Primary and Secondary memory. (2)

2.1.3 List TWO functions of the operating system. (2)

2.1.4 Suggest a possible reason why the BIOS was unable to locate the Operating System. (1)

2.1.5 Describe a possible solution (in steps) to remedy the missing Operating System. (1)

2.1.6 The missing Operating System is described as the “32 bit version”. What effect would installing a 32 bit Operating System have on the performance of the Server? (1)

2.2 A newly purchased printer describes itself as being “Plug and Play Compliant”.

2.2.1 What is a Device Driver? (1)

2.2.2 The following statement is FALSE:“Plug and Play devices neither need nor use Device Drivers.”Explain why the statement is false. (1)

Copyright reserved Please turn over

Page 6: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 6NSC

TRIALS/ 2018

2.3 Most of the PCs in the Editorial Office have extended the graphical capabilities of their computers by adding on a Daughterboard-style Dedicated Graphics Card.

2.3.1 Name the slot where a Dedicated Graphics Adaptor is connected. (1)

2.3.2 Explain why laptops are less-likely to have a Dedicated Graphics Adaptor compared to a Desktop PC. (1)

2.3.3 Describe the consequences of running a graphical-intensive program such as AutoCAD on a PC without a Dedicated Graphics Card. (1)

2.4 An older office-PC with only 1GB of RAM “froze” (stopped responding). The IT team informed the staff that the computer would have to be soft-reset as it displayed evidence of “thrashing” – an occurrence when RAM and Virtual Memory are both full.

Copyright reserved Please turn over

Page 7: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 7NSC

TRIALS/ 2018

2.4.1 What is virtual memory? (1)

2.4.2 Is it better to increase the size of virtual memory or add more RAM? Motivate your answer fully. (2)

2.5 An article described the CPU as the ‘brain’ of the computer.

2.5.1 Explain the function of the CPU. (1)

2.5.2 List TWO aspects of the CPU that influence the performance of a computer. (2)

2.5.3 Explain what CPU cache memory is and how it impacts the processing speed of a computer. (2)

2.6 The WriteLn covered a story in September 2018 where users complained that anti-piracy software (DRM) VMProtect was slowing down processes in the apps it protected. According to the article, VMProtect uses multithreading techniques and runs each thread in a separate Public-Key encrypted Virtual Machine.

2.6.1 Give one difference between multithreading and multiprocessing. (2)

2.6.2 Define Virtualisation. (1)

2.6.3 Describe the function of the Public and Private keys in Asymmetric Encryption. (2)

TOTAL SECTION B: 26

SECTION C: COMMUNICATION AND NETWORK TECHNOLOGIES

QUESTION THREE

3.1 The roll-out of ‘Fibre’ has been rapid in the main centres of South Africa.

Differentiate between Fibre Optic cables and UTP cables with regard to the way data is transferred through each medium. (2)

3.2 Excluding Fibre, Telecom Networks have been strongly promoting their LTE packages.

With reference to mobile generations, explain what LTE is. (1)

3.3 To centralise data, a Star Topology will be used the newsletter office.

3.3.1 State one advantage of having a Centralised Server. (1)

Copyright reserved Please turn over

Page 8: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 8NSC

TRIALS/ 2018

3.3.2 State one difference between a Client and a Server. (1)

3.3.3 Many writers are surprised when they see the Star Topology being setup like this:

Suggest one reason why the physical setup of a network may differ from the logical setup. (1)

3.3.4 A client on the network has lost connectivity to the server. Failure to connect to the network could be hardware-related or software-related.

State one possible:

(a) Hardware-related cause. (1)

(b) Software-related cause. (1)

3.5 Cable theft caused the newsletter’s connection to the Internet to be broken. This caused confusion among staff members who assumed that loss of Internet access meant that they wouldn’t be able to print on network-connected printers.

Explain how network resources would still be available even if the Internet was offline. (2)

3.6 Laptops will be used to connect to the internet, using the school’s wireless connection.

3.6.1 What hardware will a laptop computer require to connect wirelessly to the Internet? (1)

3.6.2 State TWO disadvantages of wireless communication. (2)

3.7 The website of the newsletter will utilize Web 2.0 features; as well as an official Android and iOS app.

Web 2.0 sites often include app-like features made possible by integrated app code executed either locally (eg: Javascript) or Server-side (eg: Perl). Differentiate between local execution and server-side execution by making clear reference to where/when code is executed. (2)

Copyright reserved Please turn over

Page 9: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 9NSC

TRIALS/ 2018

3.8 Instant Messengers such as Whatsapp have introduced voice-calling facilities advertised as “free”.

3.8.1 State the protocol used for Internet-based voice calling. (1)

3.8.2 Many reports reach the newsletter of students accruing high cellphone bills whilst using the services advertised as “free”. Explain how it is both correct and incorrect to describe Internet-based voice-calling via Whatsapp as free. (2)

3.9 Many websites employ DDoS protection using services such as CloudFlare.

Describe the most common way DDoS attacks are orchestrated (carried out). (2)

3.10 The writers have been advised to utilise a virtual private network (VPN).

3.10.1 Give one practical benefit to the writers from using the VPN. (1)

3.10.2 Name the technique that is used to maintain the privacy of information during transmission on a VPN. (1)

3.10.3 Give TWO possible reasons why the writers may encounter problems trying to connect to a VPN. (2)

TOTAL SECTION C: 24

Copyright reserved Please turn over

Page 10: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 10NSC

TRIALS/ 2018

SECTION D: DATA AND INFORMATION MANAGEMENT

QUESTION FOUR

Meta-data on articles written for TheWriteLn are captured in a database for cataloguing purposes and analysis. The database currently contains only 1 table, tblArticles, which consists of the following fields:

Field Name DescriptionArticleID Unique code used to identify an articleTitle Title of articleNoOfWords Number of words in the articleNoOfViews Number of times the article was viewed onlinePeakViews Date when the article was read the most number of times

(most popular)Writer Name of the writer of the articleSalary The writer’s monthly salary

Sample Data from the DatabaseArticleID Title NoOfWords NoOfViews PeakViews Writer SalaryA108 LTE launches in SA 480 356 14/07/2015 N Ngiba 13000A109 Conficker Worm strikes 250 1050 13/03/2016 A Ramdin 12800A110 Denuvo DRM cracked 332 1125 22/06/2016 N Ngiba 13000A111 Revolt Group shut

down160 821 16/05/2017 E Naidoo 13500

A112 Cracker Voksi arrested 500 305 11/01/2018 A Ramdin 12800

4.1 “tblArticles is not normalised.”Provide one form of evidence from the sample data which proves the statement above. (1)

4.2 State one advantage and one disadvantage of normalising a table. (2)

4.3 Using an example from the sample data, explain the following anomalies:

4.3.1 Insert

4.3.2 Delete

4.3.3 Update

NOTE: You MUST use an example from the sample data in your explanation. (3)

4.4 Data Capture on articles take place at two separate offices meaning the magazine will have to make use of a Distributed Database. Describe one challenge the designers will have to overcome when working with Distributed Databases. (1)

Copyright reserved Please turn over

Page 11: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 11NSC

TRIALS/ 2018

4.5 In order to ensure only authorised personnel have access to the database, several security measures have been suggested. Discuss one way how the magazine can implement each of the following measures:

4.5.1 Access Policies (1)

4.5.2 Physical Security (1)

4.5.3 Logical Security (1)

4.6 Data Validation and Data Verification are important aspects of Data Integrity. Data Integrity means ensuring that the data captured is accurate and relevant. With reference to the field NoOfWords, explain how the input data can be:

4.6.1 Validated (1)

4.6.2 Verified (1)

4.7 As the magazine grows, programmers expect the Database file size to grow very quickly. The Design Team have suggested that a Data Warehouse be considered in the long run.

4.7.1 What is a Data Warehouse? (1)

4.7.2 Data Mining is commonly associated with Warehousing. Data Mining is largely machine-driven (handled by computers).

(a) Name one task in the Data Mining process which is the responsibility of people rather than machines. (1)

(b) Based on the Sample Data, suggest one way that Data Mining can prove valuable to management of the magazine. (1)

4.8 After the database is designed and created, the programming team have to design a Graphical User Interface (GUI) so that users can interact with the database. This stems from the concept of Data Independence. State one aim of Data Independence. (1)

4.9 When interacting with a database, queries (in SQL) are used. The following query was written with the aim of changing the salary of writer “N Ngiba” to 15000.

UPDATE tblArticles SET Salary = 15000

4.9.1 The query is incomplete. Explain what would happen to the table if the query was executed. (1)

4.9.2 Correct the SQL by adding the missing condition. (1)

Copyright reserved Please turn over

Page 12: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 12NSC

TRIALS/ 2018

4.10 Normalise the table tblArticles.Use the supplied Entity Relationship Diagram (ERD) structure (ANNEXURE A on Page 18) to clearly indicate the following:

(a) Primary Key for Table 1 (1)

(b) Primary Key for Table 2 (1)

(c) Name of Table 2 (You have to provide an appropriate name) (1)

(d) Foreign Key (1)

(e) Clearly indicate the relationship and type of relationship (2)

TOTAL SECTION D: 24

Copyright reserved Please turn over

Page 13: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 13NSC

TRIALS/ 2018

SECTION E: SOLUTION DEVELOPMENT

QUESTION FIVE

5.1 Records on writers are stored electronically in a database. When locating information on a particular writer, the user types in a search query (which is stored in a variable called sSearch) and the requested name is then identified by iterating (looping) through the database table. The programming team have coded the search using 3 different looping structures: Code A, Code B and Code C. Study the code below and answer the questions that follow.

Code A Code B Code CsSearch := edtSearch.Text;bFound := FALSE;iNum := tblData.RecordCount;for i := 1 to iNum doBegin if tblData[‘Name’] = sSearch then Begin bFound := TRUE; End; tblData.Next;End;

sSearch := edtSearch.Text;bFound := FALSE;While ((NOT tblData.EOF) AND (NOT bFound)) doBegin if tblData[‘Name’] = sSearch then Begin bFound := TRUE; End; tblData.Next;End;

sSearch := edtSearch.Text;bFound := FALSE;Repeat if tblData[‘Name’] = sSearch then Begin bFound := TRUE; End; tblData.Next;Until … (5.1.2)

5.1.1 Copy the table (below) into your answer booklet and complete it, indicating the Minimum and Maximum number of times the Loops (in Code A, B and C) can run. If the minimum or maximum run cannot be predicted, write “X” in the corresponding block.

Code A Code B Code CMinimum Runs (3)Maximum Runs (3)

5.1.2 The Repeat loop (Code C) is missing its condition (Until …). Complete the Until statement by writing the necessary condition(s). (3)

5.1.3 “Code A is the least efficient.” (Efficient means completing a task with as little repetition as possible.)Is this statement TRUE or FALSE? Substantiate your answer by comparing conditional and unconditional loops. (2)

Copyright reserved Please turn over

Page 14: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 14NSC

TRIALS/ 2018

5.1.4 For this question, assume the table tblData contains the following data:

RecordNo NameR1 Nathan

R2 ElenaR3 SullivanR4 Chloe

There are 4 records in the database and the iterator (pointer) is currently pointing at Record 2.

If sSearch contains ‘elena’, state the value/result of the following variables/expressions:

(a) tblData.EOF (1)

(b) NOT tblData.EOF (1)

(c) tblData[‘Name’] = sSearch (1)

(d) NOT bFound (1)

5.2 The processing of data on freelancers (non-permanent writers) are handled by software programmed using Object-Orientated Principles. Objects are commonly designed using a Unified Modelling Language (UML) diagram / Class Diagram. Below is the UML for object class clsWriter.

clsWriter- Name : String- Age : Integer- Salary : ???+ Create+getName : String+setName(name : String)+calculateYearOfBirth : Integer

5.2.1 From the UML, Identify ONE:

(a) Accessor (1)

(b) Mutator (1)

5.2.2 Is auxiliary method calculateYearOfBirth a Procedure or a Function? Give a reason for your answer. (2)

5.2.3 Write the declaration (in UML format) for a mutator, for the Salary attribute. (2)

Copyright reserved Please turn over

Page 15: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 15NSC

TRIALS/ 2018

5.3 Income from adverts placed in the magazine are captured in a text file named adverts.txt. It has been suggested by the programming team that the text file data be copied at run-time to an array (arrAdverts) before processing. The rationale (main reason) for doing this is the fact that text files are accessed sequentially whilst arrays can be accessed randomly.

Example of data in the adverts.txt Text File:

Line 1: 208.62Line 2: 603.52Line 3: 359.11Line 4: 116.22Line 5: 655.26

Example of data in Array arrAdverts at run-time

arrAdverts[1] [2] [3] [4] [5]

208.62 603.52 359.11 116.22 655.26

5.3.1 With aid of an example from the data provided above, explain the difference between sequential access and random access. (2)

5.3.2 State one advantage text files have compared to arrays. (1)

TOTAL SECTION E: 24

Copyright reserved Please turn over

Page 16: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 16NSC

TRIALS/ 2018

SECTION F: INTEGRATED SCENARIO

QUESTION SIX

6.1 Read the following excerpt from the newsletter and answer the questions that follow:

Spyware “Red Shell” bundled with many popular games

About 20 PC games — including The Elder Scrolls Online and Conan Exiles — have removed a piece of third-party spyware tracking users’ activity outside of the game, and dozens more are said to still have it more than a week after it came to light on Reddit and Steam forums. The software creates “cookies” which enable Red Shell to track user activity across different web activities including social networks and streaming sites, even when the game is not running.

6.1.1 Explain the term “Invisible Data Capture”. (1)

6.1.2 When using a public computer, users are advised to “clear cookies" after using a web service such as Facebook or online banking.

(a) Is it necessary to delete cookies on a private device such as a personal laptop or mobile phone? State Yes or No and motivate your answer. (2)

(b) Assuming the cookie for Facebook is deleted, what effect will this have when the user accesses the Facebook website again? (1)

(c) Many users confuse clearing cookies and clearing the web cache. With specific reference to their function, explain the difference between cookies and the web cache. (2)

6.1.3 Many users reported the spyware “Red Shell” was not detected by their antivirus packages. State one possible reason their antivirus did not detect the malware. (1)

6.1.4 The developers of Red Shell argue that their product is not spyware as it does not track any personal information; only system information. Gamers argue that Red Shell is spyware as it installs without asking and then runs in the background spying on your web activity.

Do you consider Red Shell a form of spyware? State Yes or No and motivate your answer. (2)

Copyright reserved Please turn over

Page 17: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 17NSC

TRIALS/ 2018

6.2 Cryptocurrency miners found on popular websitesCryptocurrency miners have been found on popular torrent and news websites, a noteworthy example being SALON.COM.

The miners were detected by the Firefox Web Browser add-on AdBlock when the website attempted to execute the Javascript miner. A spokesperson from SALON.COM stated that the miner only runs if users are blocking advertisements on their site, comparing the use of an AdBlocker to piracy.

6.2.1 Give one example of a popular cryptocurrency. (1)

6.2.2 AdBlockers are plug-ins / add-ons used to block adverts on websites.

(a) Suggest one reason why users would want to block adverts on websites. (1)

(b) What is a Browser “add-on”? (1)

(c) Do you think the spokesperson from SALON.COM is justified in comparing AdBlockers to piracy? State YES or NO and justify your choice by directly comparing piracy to AdBlocking. (2)

6.3 ISPs have been accused of “throttling” P2P traffic in order to limit the use of Torrent sites.

6.3.1 Peer-to-Peer Torrents are commonly used to share copyrighted material. With reference to the way torrents function, explain why it is nearly impossible for authorities to shut down torrent sites. (2)

6.3.2 “Throttling” is casual term for “softcapping”. With regard to bandwidth, describe one effect softcapping would have on the end-user. (1)

6.3.3 Torrent-style downloads have been implemented in Windows 10 when receiving updates. Suggest one reason why Microsoft has chosen to use torrents to deliver updates rather than downloading the updates directly from Microsoft’s servers. (1)

Copyright reserved Please turn over

Page 18: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 18NSC

TRIALS/ 2018

6.4 A member of the magazine’s writing team received the following email:

6.4.1 The email is identified as an attempt at Phishing.

(a) Identify one form of evidence from the email to indicate that this email is not legitimately (really) from Apple. (1)

(b) Discuss the potential (possible) consequences if the user clicks on the “Click here” button. (1)

(c) Describe how a user can verify that their browser has connected to the correct Apple website and not an impersonating phishing website. (1)

(d) Phishing attacks are commonly associated with Email Spoofing. Explain how email spoofing can be used in a Phishing scam. (1)

Copyright reserved Please turn over

Page 19: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 19NSC

TRIALS/ 2018

6.5 Many writers have started working from home. Articles are written and emailed to the Editorial Team. Staff members have been urged to use Microsoft Office 365, the SaaS version of Office which uses cloud technology to enable many people to work on a document together.

6.5.1 Name the trend of working from home, using technology such as fax and email to submit completed work. (1)

6.5.2 With reference to how Cloud Computing works, explain how “many people” can “work on a document together”. (2)

6.5.3 Expand the acronym “SaaS”. (1)

6.5.4 Microsoft and many other major software distributors have been promoting SaaS and the “power of the cloud”. Suggest one reason why they are encouraging the use of SaaS instead of software license purchases. (1)

6.5.5 Many employees working at home have complained of headaches and backaches. With reference to ergonomics related to computer systems, describe a possible cause of the employees’ health issues and suggest a potential solution. (2)

6.6 The Publishers’ Association have informed the editorial staff of the magazine that their articles should not use Wikipedia and other Wiki websites as references, as they are not considered reliable sources by academic institutes.

6.6.1 Explain what a wiki website is. (1)

6.6.2 Wikis are a major feature of Web 2.0 technology. With regard to content, explain the biggest difference between Web 1.0 and Web 2.0. (2)

6.6.3 Give a reason why many academic institutes do not accept Wikis as a reliable source of information. (1)

6.7 The magazine team are concerned of various threats to their infrastructure (hardware, software) and data. In order to ensure the long-term success of the magazine, they are seeking advice from professionals in the field. Describe a possible solution to each of the following concerns:

6.7.1 Electricity interruptions due to load-shedding. (1)

6.7.2 Theft of hardware. (1)

6.7.3 Loss of important files due to hard-disk failure. (1)

Copyright reserved Please turn over

Page 20: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 20NSC

TRIALS/ 2018

6.7.4 Unauthorised persons gaining access to their unreleased data either physically or via the network. (1)

TOTAL SECTION F: 37

GRAND TOTAL: 150

Copyright reserved Please turn over

Page 21: IT Trial P2 2018 - stanmoresecondary.co.zastanmoresecondary.co.za/.../uploads/2017/05/IT-Trial-P2-2018.docx  · Web viewWhat is a Device Driver? (1) ... What hardware will a laptop

Information Technology/P2 ANNEXURE ANSC

TRIALS/ 2018

NAME: ________________________________________________

Detach this sheet and include it with your Answer Booklet.

Use this sheet to answer Question 4.10.

ENTITY RELATIONSHIP DIAGRAM (ERD):

tblArticles 4.10 (c) _________________4.10 (a)4.10 (d) 4.10 (e)

4.10 (b)

4.10 (e)

Copyright reserved