Home

National Question Paper November 2011

Question 3 - Scenario
The scenario below sets the scene for the questions that follow.
A team of Computer Applications Technology (CAT) learners have decided to work at a cyber café to raise funds for their school. They will be required to answer computer-related questions for the owner, Mr Wu.

The first task is to replace the old administration computer. Mr Wu saw the following advertisement for a laptop:

ABC 21" LAPTOP
Processor: Intel Celeron 1.8 Hz
RAM: 4 GB
Hard drive: 150 GB
Connectivity: WLAN/LAN
Dual-layer DVD writer
Integrated webcam
Windows 7 Professional
Multidata card reader
12 month on-site warranty
3.1 The reason why the old administration computer has to be replaced is that it often crashes.
Give TWO reasons why a computer would crash.

Answer

• Some hardware components are damaged
• Operating system error (accept changes to CMOS/BIOS settings)
• Software faulty (do not accept if only the word 'software' is given -
reason must be included e.g. corruption or new installation)
• Power surge / fluctuation
• Problems caused by malware (e.g. viruses)
• Hard drive/CPU and RAM failure.


3.2 Name TWO hardware components from the advertisement above that will play a significant role in determining the overall performance of this computer.

Answer

• Processor/CPU (accept processor names and/or specifications) such as Intel and AMD
• Hard drive
• RAM/Memory



3.3 State TWO advantages of purchasing a laptop computer rather than a desktop computer.

Answer

• Allows owner to do some work at home/mobility/no cables
• Takes up less space/smaller – does not need a big office for
administration
• Can use battery power for limited period of time, etc.
• Contributes to green computing/uses less electricity
• Mobile Internet connectivity


3.4 Mr Wu wants to experiment with video editing using the laptop.
Name TWO hardware components from the advertisement where the specifications are not suitable for video editing. Briefly motivate the use of each hardware component in the context of video editing.

Answer

Processor type/speed
Video editing requires lots of calculations and processing
AND/OR
Hard drive size
Video files are large, requiring lots of hard drive space
AND/OR
Accept RAM
Video editing requires a lot of memory


3.5 Many of the devices that can be connected to the laptop connect via USB ports and are therefore plug-and-play.
What do we mean when we say a device is plug-and-play?

Answer

The device can be plugged in and used automatically/immediately without the user having to configure or install anything themselves (such as the driver)


3.6 The DVD drive is listed as a 'dual-layer' drive.
How could Mr Wu benefit from a dual-layer drive?

Answer

A dual-layer DVD drive can store more data on DVD discs.


3.7 Explain the function of the card reader listed in the advertisement.

Answer

A card reader has various slots which allows for different types of portable storage media/cards to be inserted so that data can be read/transferred to the computer


3.8 The advertisement for the laptop lists an 'integrated webcam'.
3.8.1 Briefly explain what the term integrated means in this context.

Answer

Integrated in this case means that it is built into the computer/screen


3.8.2 State ONE advantage of having an integrated webcam on a laptop.

Answer

• No need to buy another device
• Do not need an additional USB port
• Mobility – can be used wherever laptop is taken
• Facial recognition
• Would not be easily lost or stolen

3.8.3 Mr Wu used Skype to contact his cousin in Taiwan. Mr Wu complained that his cap soon 'disappeared' when he used the webcam during the Skype session.
Explain why this happened by referring to the concept of a cap in your answer.

Answer


3.8.4 Mr Wu thinks it would be a good idea to have webcams installed in the cyber café for surveillance purposes. Give ONE reason why some customers could consider this practice unethical.

Answer

Invasion of privacy


3.9 The advert refers to an 'on-site warranty'. Explain what an on-site warranty means.

Answer

The computer supplier will come to the business and repair the
machine on site.
OR
It is not necessary to take the computer to the supplier to be repaired as
they will come to your office.


3.10 Mr Wu is considering purchasing an external hard drive to backup the data on his new administration computer.
State TWO advantages of using an external hard drive for backup copies.

Answer

• Easy to use (usually plugs into USB port)
• Easy to transfer data/Mobility of data
• Storage of large amounts of data
• Enables you to move backups off-site/security


3.11 Mr Wu connected a printer to his laptop to print his accounts but then experienced some problems with his printing. The first problem was a message that appeared, that said that a printer driver could not be found. 3.11.1 Briefly explain what a driver is by referring to its function.

Answer

Software that enables devices to work and communicate with your computer


3.11.2 Suggest TWO places where Mr Wu can try and find this driver.

Answer

• On the disk that came with printer
• Supplied as part of driver database in the operating system
• Download driver from the Internet


3.11.3 The problem with the driver was successfully sorted out. However, Mr Wu found that the printer did not print any hard copies and no error message appeared when he tried to print.
Give TWO possible reasons for this.

Answer

• Wrong printer was selected/print to file/pdf selected
• Printer was switched off/ off-line
• Printer queue (spooling) paused
• No ink in printer
• Printer not connected to computer
• Faulty printer cable
• No paper in printer/paper jam


Answer

Software that enables devices to work and communicate with your computer


3.12 A number of customers are visually impaired and struggle to use the computers in the cyber café.
Name TWO utilities or features of the operating system that can be used to try and help these customers to use the computers more easily.

Answer

• Magnifier/magnifier utility/large font/zoom
• Text-to-speech (narrator output)/audio prompts
• Contrast (colour scheme choices)
• Cursor options
• On screen keyboard
• Voice recognition


Question 4

4.1 Mr Wu cannot understand why a computer needs an operating system and application programs.
4.1.1 Name THREE functions of an operating system.

Answer

• Provides a user interface
• Controls/allocates hardware resources
• Provides basic security
• Coordinates activities in the computer
• Access and communication with input and output devices


4.1.2 State TWO advantages of using an office suite rather than the individual programs available.

Answer

• Interface is the same for all the packages/same look and feel • User can easily move from one application program to the other • Data can be transferred between applications/ integration, etc. • Widely used/promoted


4.2 Give ONE reason why many people still use proprietary software such as Microsoft Office instead of an open-source software package, such as OpenOffice, which is free.

Answer

• Open-source software is not supported in all geographical areas
• Some people may not understand the technical help offered on
the Internet
• No one to hold responsible
• Various versions of the same software
• Resistance to change/comfortable with what they know
• Not as widely used.


4.3 Mr Wu says that there are too many programs on his computer and decides to remove some.
Give TWO reasons why a program should be uninstalled rather than just deleted.

Answer

• Hidden files which form part of the program may remain on the
hard disk and take up space
• May delete files which are used by other programs
• Entries may not be removed from registry.


4.4 Mr Wu finds that his computer has suddenly become slower.
Name TWO instances where, or reasons why, software might cause a computer to become slower.

Answer

• Spyware
• Viruses/malware
• Not using updated drivers
• Too many programs running at the same time (including updates
and virus scanning)
• Utilising software that requires higher hardware
specifications/Using software that requires extensive resources


4.5 Mr Wu is concerned about computer virus infections in the cyber café.
4.5.1 Explain TWO ways in which customers can infect the cyber café's computers with viruses.

Answer

• Users may bring in storage devices (e.g. flash drives,
iPods, etc.) with viruses on them
• Viruses can enter the system via Internet activity
• Users may download and install software without
permission
• Users ignore warnings from anti-virus-program
• Viruses are attached to e-mails of the users, etc.


4.5.2 Name THREE possible ways in which Mr Wu would know if any of the computers have been infected with viruses.

Answer

• Anti-virus software reports virus/suspicious activity
• File(s) become corrupt
• Unknown program(s) or file(s) suddenly appears
• Settings of security software changed/switched off
• Additional programs start to run when the computer is
started
• Size of a file changes without explanation
• Strange/unexpected message/image/error messages
displayed on the computer screen
• Computer suddenly begins to start or run slowly
• Unauthorised changes made to the registry
• The available memory is less than it should be
• Program(s) or file(s) are suddenly missing
• Program/file changes without explanation/stop operating
properly
• System properties change
• Free hard drive space suddenly gets reduced
• Computer no longer boots


4.5.3 Mr Wu says that he will scan the computers for viruses once a month. Give TWO reasons why this will not be a good policy to follow.

Answer

• A lot of 'damage' could have been caused by the virus if
only detected a month after infection, etc.
• Anti-virus definitions and programs should be updated
frequently as new viruses are being developed every
day
• Multiple users can be affected


4.6 Name TWO computer housekeeping tasks or good maintenance habits, besides the regular updating of security software, that Mr Wu should carry out regularly.

Answer

• Regular virus/spyware/adware scans
• Operating system/software updates
• Disk defragmentation
• Backup on a weekly basis
• Empty the Recycle bin regularly
• Run Scandisk to check for file system errors/bad sectors
• Run disk cleanup/Delete unnecessary data files


4.7 Mr Wu has heard of a single-user license, multi-user license and a site license. He feels that single-user licenses would be too costly for his purposes. Briefly explain the difference between a multi-user license and a site license.

Answer

A site license allows software to be installed on all the computers in the company/organisation
A multi-user license allows software to be installed on a fixed number of computers (usually quite a small number)

Question 5

5.1 The CAT learners noticed that all the computers in Mr Wu's cyber café are linked to a network.
5.1.1 There are a number of benefits having a network.
What would the most important reason be for having a network, specifically in a cyber café? Briefly motivate your answer.

Answer

To share Internet connectivity (from all networked
computers)
To provide Internet connectivity to all networked computers
as the function of a cyber café is to provide Internet
access


5.1.2 Would the network in the cyber café be an example of a LAN or a WAN? Briefly motivate your answer.

Answer

LAN as the computers are all located within a relatively limited location / area.


5.1.3 Discuss TWO possible disadvantages of establishing and running a network in the cyber café.

Answer

• Costs of setting up
• Cost of maintaining network
• Need to backup data frequently
• Many people have access to data (security issues)
• Access to Internet increases risk of viruses
• If server is down, the whole network will be down.


5.2 The cyber café has a hotspot.
Explain what a hotspot is.

Answer

Provides Internet access via a wireless network connection


5.3 State TWO ways in which Mr Wu can, in terms of his business, help to bridge or reduce the digital divide.

Answer

• Offer lessons it on how to use the Internet/computer literacy to
people who need
• Make obsolete computers available to people who need it
• Make the computer facilities more accessible
• Provide Internet access free of charge.


5.4 Mr Wu would like to order supplies for his cyber café over the Internet and have them delivered to the shop. He would also like to do his banking over the Internet.
5.4.1 What is the general term used to describe doing business over the Internet?

Answer

e-commerce/e-business


5.4.2 Name ONE way in which he would know that he is using a secure connection to his Internet banking website.

Answer

Yellow padlock icon, somewhere on the screen (accept lock) OR https which appears in URL


5.4.3 State THREE advantages of Internet banking when compared with conventional banking.

Answer

• Do not have to stand in queues/saves time
• Do not have to carry large amounts of money around
• Have access whenever you are on-line/24/7
• Safer as you do not have to go to the bank
• Can keep track of your accounts
• Cuts down on travelling/transport costs
• Usually cheaper bank charges.


5.5 The cyber café is in Johannesburg. One of the customers urgently wants to send a document of 20 GB to somebody in Cape Town. He does not want to use or pay a courier service. Explain how this can be done over the Internet. The e-mail service cannot be used as it has a 5 MB limit for attachments.

Answer

• Upload to a website that the person (in Cape Town) will have access
to
• Accept: web-based file-hosting service using cloud computing/
online facility to share and synchronise files
• Accept 'DropBox/Skydrive/in the cloud' type answers
• Accept: Make use of a file transfer service (ftp) which allows sharing
of files.


5.6 Mr Wu has read about RSS feeds offered by websites. Describe clearly how RSS feeds can make a user's life that much easier.

Answer

Automatically 'downloads' latest/updated information from websites


5.7 A lot of young people use the Internet facilities at Mr Wu's cyber café. They often use Facebook and Twitter. 5.7.1 What is a tweet?

Answer

(Short) message post using Twitter


5.7.2 Give TWO reasons why many schools and companies block sites such as Facebook.

Answer

• Open to predators/paedophiles/cyberstalkers
• Places strain on network resources e.g. 'cap'/Uses up
bandwidth/Use up school's 'cap'
• Get addicted to these websites/spend lots of time on
these websites/Learners spend too much time on Internet
• Workers waste company time/unproductive
• Replaces social contact
• Employees may bring the company into disrepute by
writing insulting comments on the Facebook wall/Lack of
privacy as information is made public.


Question 6

6.1 Mr Wu would like to be able to assist people when they send e-mails from his cyber café. Name THREE netiquette rules to keep in mind when adding and sending e-mail attachments.

Answer

• Zip large files/do not send large files
• Keep the number of attachments to an e-mail to a minimum
• Make sure attachments are virus free
• Do not send .exe attachments
• Do not send spam.


6.2 Consider the following e-mail address:
abcgenius@bluecross.org.za
6.2.1 Identify the user name in the e-mail address above.

Answer

Abcgenius


6.2.2 What does the .org.za part of the e-mail address indicate?

Answer

(Non-profit) organisation
Website located in South Africa /Geographical location


6.3 Discuss the differences between a web browser and a search engine.
(Do not give the names of web browsers or search engines in your answer).

Answer

Web browser – application software that allows you to
access/view web pages
Search engine – program/website that matches user queries to find
websites/web pages/images/videos/news information


6.4 Consider the following e-mail:
To … PWu2@webmail.co.za
Cc...  
Bcc  
Subject: Savings Bank of BB
Attach:  
Good day Sir
Your bank account has had multiple access attempts. Please click on the
address below to reset your password and gain access to your account.
http://savingsbankofBB@savingsbank.co.za/details
Yours faithfully
B Jonass
Bank Manager – City Branch
074 000 1111

6.4.1 Explain what the difference is between the Cc field and Bcc field in an e-mail.

Answer

Cc – Copies the e-mail to others and address is visible
Bcc – Copies the e-mail to other users but the addresses are not visible to these users.


6.4.2 Name TWO ways in which the amount of spam received at the cyber café can be reduced.

Answer

• Use the spam filter from ISP
• Use security software e.g. anti-spam/anti-virus software
• Use multiple e-mail addresses i.e. a public address and an
e-mail address for specific purposes
• Be careful where you give out your e-mail address/do not
confirm your e-mail address.


6.5 RFID tags are becoming commonplace. 6.5.1 Briefly explain what an RFID tag is.
Do not simply write down what the abbreviation stands for.

Answer

Tag that contains identification data which can be read/identified wirelessly


6.5.2 State ONE application of RFID tags in the cyber café environment.

Answer

• Stock-taking
• Security/Keeping track of equipment/limits the amount of theft.
• Access control to the premises/computers


6.6 Mr Wu is concerned about paying high electricity accounts for the cyber café.
Describe TWO ways, related to the use of the computers in the cyber café, in which electricity can be saved.

Answer

• Buy energy saving hardware such as LCD screens
• Switch off when not in use
• Use power saving/hibernation
• Use equipment with energy star specification.


6.7 Mr Wu needs to replace broken computer equipment.
6.7.1 Explain why the broken computers should not be thrown away on rubbish dumps.

Answer

Computer parts contain poisonous substances which are harmful to the environment


6.7.2 Write down the collective name used for broken, discarded or unwanted electronic hardware.

Answer

e-Waste/e-scrap


6.8 The Internet provides a host of communication modes and methods.
6.8.1 What is the main benefit of using VoIP technology like Skype?

Answer

• Cost savings
• Face-to-face communication


6.8.2 State TWO disadvantages when using a chatroom or instant messaging technologies to stay in contact with friends.

Answer

• Both parties have to be online at same time/Cannot leave a
message if person is not online
• Security risk such as identity theft and transferring viruses
• Cannot send attachments
• Lower productivity due to disruption.


6.9 Mr Wu says that when he searched for information on the Internet about other types of coffee, a very large number of results were displayed.
Name TWO ways in which he could reduce unnecessary results and obtain a shorter list of more relevant information.

Answer

• Add more words
• Use synonyms
• Use Boolean operators (AND/OR/NOT + - )
• Use correct spelling
• Use quotation marks
• Use options under Advanced Search


Question 7

7.1 Mr Wu wants to help some people to improve their word processing skills. Help him to answer their questions.
7.1.1 One person says that a word processing document that he has sent to a friend, cannot be opened by the friend as they do not have the same program.
What is the best file format to save the document in so that it can be opened and edited using most word processors?

Answer

Save the file in RTF or TXT format or .doc format.


7.1.2 Give TWO reasons why one would make use of footnotes or endnotes.

Answer

• Comments giving more detail/explanation
• Give reference to a source from which facts are obtained
• Gives the name of the person who quoted the statement, etc.


7.1.3 What word processing feature should be used to allow both portrait- and landscape-orientated pages in the same document?

Answer

Section breaks


7.1.4 Give Mr Wu TWO reasons why some documents are distributed in PDF format.

Answer

• Do not have to have access to the program the document
was created in to read it
• Read-only document
• So that the PDF document cannot be easily changed or
edited (need special software to make the changes)
• Security reasons, e.g. legal implications
• The documents can be read on a PC with any operating
system e.g. Apple or Linux-based


7.2 One of the learners was trying to help Mr Wu with a spreadsheet.
Study the screenshot of the spreadsheet below.

7.2.1 Name TWO ways in which to change the appearance of the spreadsheet above so that it is easier to read and more meaningful to Mr Wu.

Answer

• Emphasise headings by using bold or shading
• Use currency formatting if you are working with money
• Format column C to remove decimal places
• Format alternate rows in different colours, etc.
• Add cell borders
• Correct errors in the formulas/relevant cells.


7.2.2 How can Mr Wu prevent column E from showing in his spreadsheet (without deleting the data)?

Answer

Hide the column


7.2.3 State TWO possible causes for the error message that displays in cell G10 as #NAME, as shown in the screenshot.

Answer

• Using text (e.g. a function name) that does not exist
• Misspelling a function name
• Entering text in a formula without using quotation marks
• Omitting a ':' (colon) in a range reference, etc.
• Have not used absolute addressing when needed


7.2.4 State ONE possible cause for the error message that displays in cell G14 as #DIV/0!, as shown in the screenshot.

Answer

• Dividing by zero
• Dividing by an empty/blank cell


7.2.5 Name the function that could be used to find the number appearing most often in a column.

Answer

Mode


7.2.6 The value in cell F8 is calculated by using the formula =E8*F6.
When this formula is copied down to the rest of the column, error messages and incorrect values appear in column F.
Suggest ONE way of solving this problem.

Answer

Use absolute cell referencing/use function key F4 on cell F6
7.2.7 Which function could be used to work out how many numbers in column C are greater than 15?

Answer

COUNTIF


7.3 A database table with ID, Term and Explanation columns appears as follows:
ID TERM EXPLANATION
W1 Windows Server 2003 An operating system for servers
W2 Symbian An operating system for mobile devices
W3 Android An operating system for mobile devices
W4 Windows NT server An operating system for servers
W5 Windows NT workstation An operating system for workstation
W6 Windows 7 modern operating system

7.3.1 The field Explanation is presently defined as a text field. Suggest a new data type for the field that would enable the field to accommodate much longer explanations.

Answer

Memo


7.2.3 What is the most appropriate data type for a field that will contain pictures?

Answer

OLE or ATTACH


7.3.3 The following query was created on the given data table:
Name the field that will NOT appear in the query results.

Answer

ID


7.3.4 Briefly describe the difference in the results produced by each of the following queries:

Answer

A – The explanation must start with Internet and then anything else can follow
B – Internet must appear somewhere in the explanation


7.4 Use the database table below to answer the questions that follow.

7.4.1 Only the A and B classes in the grade work at the cyber café. Suggest a validation rule that would prevent Mr Wu from entering any other letter in the Grade_Graad field.

Answer

'A' or 'B' correct options used
OR operator used


7.4.2 A report is created and grouped first by Grade_Graad and then by Log off. Which surname will appear last in the report?

Answer

Basset


7.5 The following formula was inserted in a query to calculate how long the person has been logged onto the Internet:
Hours:([Log off] – [Log on]) * 24
7.5.1 Name the calculated field created in the query.

Answer

Hours


7.5.2 What is the purpose of the square brackets, [ ], and the round brackets, ( ), in the formula above?

Answer

Square brackets are used around a field name
Round brackets are used for mathematical calculations/Force correct order of evaluation


Advertise with us