computer applications technology book files/g…  · web view · 2014-07-18computer applications....

25
BRYLIN INDEPENDENT LEARNING CENTRE Computer Applications Technology GRADE 10 November Examination Theory – P2 Marks: 100 Examiner: L Merry Time: 2 Hrs Moderator: D Felkers This paper consists of 25 pages NAME:_____________________________________________________________ ___ Q1 + Q2 + Q3 + Q4 + Q5 + Q6 + Q7 + Q8 + TOTAL

Upload: lyphuc

Post on 15-Mar-2018

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

BRYLIN INDEPENDENT LEARNING CENTRE

Computer ApplicationsTechnology

GRADE 10

November Examination Theory – P2

Marks: 100 Examiner: L MerryTime: 2 Hrs Moderator: D Felkers

This paper consists of 15 pages

NAME:________________________________________________________________

Q1

+

Q2

+

Q3

+

Q4

+

Q5

+

Q6

+

Q7

+

Q8

+

TOTAL

10 10 5 20 18 12 8 17 100

Page 2: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

INSTRUCTIONS AND INFORMATION

1. This test consists of SECTION A and SECTION B.

2. Answer ALL the questions.

3. Read ALL the questions carefully before answering. Ensure you understand what is being asked BEFORE you answer.

4. Number the answers correctly according to the numbering system used in this question paper.

5. Write neatly and legibly.

Page 2 of 15

Page 3: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

SECTION A

QUESTION 1

Various possible options are provided as answers to the following questions. Write the correct letter next to the question number on the ANSWER SHEET e.g. 1.1 Z.

1.1 Which ONE of the following shows data measurements in ascending order?

A) b, MB, KB, GB, TB

B) TB, GB, MB, KB, b

C) b, KB, MB, GB, TB

D) b, KB, MB, TG, GB

1.2 The information processing cycle (for computers connected on a network) includes which one of the following?

A) Input, storage, output and processing

B) Input, storage, processing, output and internet

C) Input, communication, storage and output

D) Input, storage, processing, output and communication

1.3 Which one of the following would be examples of personal computer operating systems?

A) MS Windows, Android, Mac OS X, Unix

B) MS Windows, Linux, Mac OS X, Unix

C) MS Windows, Linux, Symbian, Unix

D) Apple iOS, Linux, Mac OS X, Unix

1.4 Which one of the following would be examples of media storage devices?

A) CD, Flash disk, DVD, Blu-Ray and Memory cards

B) CD, CPU, DVD, RAM and Memory cards

C) CD, CPU, DVD, Blu-Ray and Memory cards

D) CD, USB, DVD, Blu-Ray and Memory cards

1.5 Which one of the following would best describe someone who breaks into a computer system with the intention of performing a crime?

A) Hacker

B) Smacker

C) Cracker

D) Jacker

Page 3 of 15

Page 4: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

1.6 Which one of the following is not an example of a multi-purpose device?

A) Server

B) ATM

C) PDA

D) PC Tablet

1.7 Which of the file extensions would not indicate an image file?

A) *.gif

B) *.jpg

C) *.bmp

D) *.pdf

1.8 Which one of the following is not a type of website?

A) Educational

B) Astrological

C) Portal

D) Advocacy

1.9 Which of the following search strings would you use to find a MS Word 2007 file with ‘Gr10’at the start of the filename?

A) *Gr10*.docx

B) Gr10*.doc

C) * Gr10*.doc

D) Gr10*.docx

1.10 Which one of the following would be examples of malware?

A) Hoaxes, spam and viruses

B) Viruses, worms, Trojans and spyware

C) Phishing, pharming and spoofing

D) All of the above

10 x 1 10

Page 4 of 15

Page 5: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 2

Complete the crossword puzzle by using clues listed below to assist in filling the missing ICT terminologies. (The numbers in bracket after the clues indicate the number of words and number of letters in a word i.e. (7,3) = 2 words 1st 7 letters 2nd 3 letters). Write your answers in the crossword puzzle.

Across1 A type of screen that one can input data by pressing on buttons. (5,6)

2 Technology that uses a unique biological feature to recognise a person. (9)

5 An email that attempts to make people believe something that is false. (4)

7 The main circuit board of the computer. (11)

9 To gain unauthorised access to a computer. (4)

10 A computer that provides communication and storage on a network. (6)

Down

3 A device that stores data permanently. (8)

4 The study of people in their work environments. (10)

6 An electronic storage medium (5,4)

8 The abbreviation for a company the provides internet access. (3)

10 x 1 10

Page 5 of 15

1 3 4 6

2 8

5

7

9

e.g.C O M P U T E R 10

Page 6: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 3

Choose an item/word from COLUMN B that matches a description in COLUMN A. Write only the letter (A – J) next to the question number (2.1 – 2.5) on the ANSWERSHEET, for example 2.1 G.

COLUMN A COLUMN B

2.1 A network that is used in a homeA RSI

B RAM

C CRT

D HAN

E ROM

F RWI

G OLE

H LED

I OCR

J PAN

2.2 Technology that enables a computer to recognize characters on a scanned image

2.3 Volatile storage space for data

2.4 Injuries caused by repetitive tasks

2.5 Modern screens use this technology

5 x 1 5

TOTAL SECTION A 25

Page 6 of 15

Page 7: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

SECTION B

Scenario:The well known band Black Eyed Peas is coming to your school for a concert. The social committee have asked you to assist them with setting up computer hardware and software to assist with managing the concert.

QUESTION 4 – SYSTEM TECHNOLOGY

The chairperson of the committee, Susan Socialite, knows very little about computers. Help her to understand by explaining the following to her:

4.1 Name the TWO main components that a computer consists of. (2)

4.2 Personal computers come in many shapes and forms. List TWO examples of personal computers and briefly discuss each one. (4)

4.3 Computers are said to be either multi-functional/general purpose or dedicated devices. Complete the table below by stating which devices are dedicated and which are multi-functional. Write your answer in the space provided. (2)

4.3.1 ATM, iPod’s, MP3 players, cellphones

4.3.2 PC’s, smartphones, servers, tablets

4.4 The term ICT (Information and Communication Technology) keeps coming up. Briefly explain what an ICT System consists of. (3)

4.5 Susan Socialite keeps talking about data and information as if they are the same thing. Explain to Susan the difference between data and information. (2)

Page 7 of 15

Page 8: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

4.6 Susan Socialite noticed that the mouses and keyboards were not connected to the computers and couldn’t understand why the technicians had not finished their work.

4.6.1 What technology could the mouses and keyboards using to communicate with the computers? Name two types of technologies. (2)

4.6.2 Name TWO advantages of using wireless technology. (2)

4.7 Susan Socialite said she will have to get someone to do all the data capturing because her aunt used to type a lot and she ended up having very sore wrists.

4.7.1 What is this type of injury known as? (Give the full names NOT the abbreviations) (1)

4.7.2 Give TWO health tips for using computers. (2)

20

Page 8 of 15

Page 9: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 5 –NETWORK AND INTERNET TECHNOLOGY

Susan Socialite wants the show to be “just perfect” and wants to advertise on the internet. However, she doesn’t seem to know about the advantages, disadvantages, expenses and technology involved in setting up a network.

5.1 What are the two main reasons for having a network? (2)

5.2 Networks have many advantages, but also have disadvantages. List and briefly discuss TWO disadvantages of having a local area network. (2)

5.3 What is the purpose of a ‘switch’ on a network? (2)

5.4 Name TWO types of small networks. (2)

5.5 List the FIVE components required to connect to the internet (5)

5.5.1

5.5.2

5.5.3

5.5.4

5.5.5

5.6 Complete the table below by providing the name for each of the following descriptions. Write the answer in the space provided. (3)

5.6.1 Unwanted electronic junk mail

5.6.2 Fraudulent process of attempting to obtain a person’s user name, password, banking details.

5.6.7 Process of obtaining a person’s personal information by redirecting a user from a legitimate website to a fake website.

Page 9 of 15

Page 10: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

5.7 E-mail is an extremely useful communication tool, however, it does have some disadvantages. List TWO disadvantages of communicating via e-mail. (2)

18

Page 10 of 15

Page 11: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 6 – SOCIAL IMPLICATIONS & ETHICAL USE OF COMPUTERS

Susan Socialite wants everyone to know about the Black Eyed Peas, so she would like the event advertised on all the social networks and an advertisement sent to everyone in the school e-mail address book. Teach Susan about social networks and ethics by answering the following questions.

6.1 Would sending a message to all contacts in the school address book be considered spam? Motivate your answer. (2)

6.2 Would advertising via social networks be a recommended why of informing people about the event? Motivate your answer. (2)

6.3 Susan Socialite found an advert that she ‘downloaded’ (copied) from an advertising agency on the internet and has asked you to use it for the event, she says “it will be fine ‘cos no one will ever know”.

6.3.1 What is this act called? (1)

6.3.2 Briefly explain what the act in 6.3.2. means. (2)

6.4 After printing some brochures for the event the toner cartridge needed to be replaced. You saw Susan Socialite throw the old cartridge in the bin.

6.4.1 How should she have disposed of the cartridge to conform with green computing? (1)

Page 11 of 15

Page 12: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

6.4.2 List TWO other means of green computing. (2)

(2)

12

Page 12 of 15

Page 13: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 7 – SOLUTION DEVELOPMENT

Susan Socialite has attempted to create certain documents and spreadsheets to manage the event, but she really doesn’t know what she is doing. Help her to sort out the following problems.

7.1 Susan created a table in the word processing package to keep track of the event expenses.

7.1.1 Was this the correct application to use? (1)

7.1.2 What type of application should she have used? Give ONE example to support your answer. (2)

7.2 Susan Socialite made a mistake when she typed a letter to the parents, she called the band “Black Eye Peas”, what feature can she use to correct this mistake without manually searching for each occurrence. (1)

7.3 Susan Socialite has rented a colour laser printer to print the pictures she intends taking at the event.

7.3.1 Would you recommend this printer for printing pictures? Motivate your answer. (2)

7.4 Susan Socialite tried to e-mail an attachment to the Black Eyed Peas that was 56 Mb in size. The e-mail wouldn’t go through.

7.4.1 Why do you think the e-mail would not go through?

(1)

7.4.2 Recommend one solution to the problem in 7.4.1.

(1)

8

Page 13 of 15

Page 14: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

QUESTION 8 – INTEGRATED SCENARIO

Susan Socialite has insisted that absolutely nothing can go wrong on the night of the event. She has asked you to give her a list of necessary ‘things’ that must be implemented to ensure a successful event.

8.1 Backups need to be done in case something happens to either the data or hardware. The total amount of data is just under 1 Gb, what backup media would you recommend? Motivate your answer. (3)

8.2 You saw Susan Socialite attempting to create a graph in the word processing application. What would be a better method to create a graph? (2)

8.2.1 Using the method in 8.2 how could Susan Socialite ensure the graph would remain updated in the word processor. (1)

8.3 Susan Socialite wants to buy one copy of the application software and install it on all the computers.

8.3.1 Is this legal? Motivate your answer (2)

Page 14 of 15

Page 15: Computer Applications Technology Book files/G…  · Web view · 2014-07-18Computer Applications. Technology. GRADE 10. November ... PC Tablet 1.7 Which of the file ... Advocacy

GRADE 10 CAT EXAM THEORY – P2 NOVEMBER 2012

8.3.2 Complete the table below by providing the correct type of licence for the descriptions. Write the answers in spaces provided. (3)

8.3.2.1 Licence that allows one copy of the software to be installed on one computer.

8.3.2.2 Software that you can change the source code.

8.3.2.3 A licence that allows the software to be installed on multiple computers within an organisation.

8.4 Susan Socialite is concerned that the ‘staff’ will abuse the internet if they are given access.

8.4.1 Name TWO methods that can help prevent internet usage abuse? (2)

8.5 Susan Socialite would like to “Skype” the Black Eyed Peas, but she does not know how to go about it.

8.5.1 What is the correct term for “Skype”? (1)

8.5.2 What is the definition for 8.5.1? (3)

17

TOTAL SECTION B 75

GRAND TOTAL 100

Page 15 of 15