National Question Paper November 2011
Question 3 - Scenario
The scenario below sets the scene for the questions that follow.
A team of Computer Applications Technology (CAT) learners have decided to work at
a cyber café to raise funds for their school. They will be required to answer
computer-related questions for the owner, Mr Wu.
The first task is to replace the old administration computer. Mr Wu saw the following
advertisement for a laptop:
|ABC 21" LAPTOP
Processor: Intel Celeron 1.8 Hz
RAM: 4 GB
Hard drive: 150 GB
Dual-layer DVD writer
Windows 7 Professional
Multidata card reader
12 month on-site warranty
3.1 The reason why the old administration computer has to be replaced is that it
Give TWO reasons why a computer would crash.
• Some hardware components are damaged
• Operating system error (accept changes to CMOS/BIOS settings)
• Software faulty (do not accept if only the word 'software' is given -
reason must be included e.g. corruption or new installation)
• Power surge / fluctuation
• Problems caused by malware (e.g. viruses)
• Hard drive/CPU and RAM failure.
3.2 Name TWO hardware components from the advertisement above that will
play a significant role in determining the overall performance of this computer.
• Processor/CPU (accept processor names and/or specifications) such as Intel and AMD
• Hard drive
3.3 State TWO advantages of purchasing a laptop computer rather than a
• Allows owner to do some work at home/mobility/no cables
• Takes up less space/smaller – does not need a big office for
• Can use battery power for limited period of time, etc.
• Contributes to green computing/uses less electricity
• Mobile Internet connectivity
3.4 Mr Wu wants to experiment with video editing using the laptop.
Name TWO hardware components from the advertisement where the
specifications are not suitable for video editing. Briefly motivate the use of
each hardware component in the context of video editing.
Video editing requires lots of calculations and processing
Hard drive size
Video files are large, requiring lots of hard drive space
Video editing requires a lot of memory
3.5 Many of the devices that can be connected to the laptop connect via USB
ports and are therefore plug-and-play.
What do we mean when we say a device is plug-and-play?
The device can be plugged in and used automatically/immediately
without the user having to configure or install anything themselves
(such as the driver)
3.6 The DVD drive is listed as a 'dual-layer' drive.
How could Mr Wu benefit from a dual-layer drive?
A dual-layer DVD drive can store more data on DVD discs.
3.7 Explain the function of the card reader listed in the advertisement.
A card reader has various slots which allows for different types of
portable storage media/cards to be inserted
so that data can be read/transferred to the computer
3.8 The advertisement for the laptop lists an 'integrated webcam'.
3.8.1 Briefly explain what the term integrated means in this context.
Integrated in this case means that it is built into the
3.8.2 State ONE advantage of having an integrated webcam on a
• No need to buy another device
• Do not need an additional USB port
• Mobility – can be used wherever laptop is taken
• Facial recognition
• Would not be easily lost or stolen
3.8.3 Mr Wu used Skype to contact his cousin in Taiwan. Mr Wu
complained that his cap soon 'disappeared' when he used the
webcam during the Skype session.
Explain why this happened by referring to the concept of a cap in
3.8.4 Mr Wu thinks it would be a good idea to have webcams installed in
the cyber café for surveillance purposes.
Give ONE reason why some customers could consider this
Invasion of privacy
3.9 The advert refers to an 'on-site warranty'. Explain what an on-site warranty
The computer supplier will come to the business and repair the
machine on site.
It is not necessary to take the computer to the supplier to be repaired as
they will come to your office.
3.10 Mr Wu is considering purchasing an external hard drive to backup the data on
his new administration computer.
State TWO advantages of using an external hard drive for backup copies.
• Easy to use (usually plugs into USB port)
• Easy to transfer data/Mobility of data
• Storage of large amounts of data
• Enables you to move backups off-site/security
3.11 Mr Wu connected a printer to his laptop to print his accounts but then
experienced some problems with his printing.
The first problem was a message that appeared, that said that a printer driver
could not be found.
3.11.1 Briefly explain what a driver is by referring to its function.
Software that enables devices to work and communicate with
3.11.2 Suggest TWO places where Mr Wu can try and find this driver.
• On the disk that came with printer
• Supplied as part of driver database in the operating system
• Download driver from the Internet
3.11.3 The problem with the driver was successfully sorted out. However,
Mr Wu found that the printer did not print any hard copies and no
error message appeared when he tried to print.
Give TWO possible reasons for this.
• Wrong printer was selected/print to file/pdf selected
• Printer was switched off/ off-line
• Printer queue (spooling) paused
• No ink in printer
• Printer not connected to computer
• Faulty printer cable
• No paper in printer/paper jam
Software that enables devices to work and communicate with
3.12 A number of customers are visually impaired and struggle to use the
computers in the cyber café.
Name TWO utilities or features of the operating system that can be used to try
and help these customers to use the computers more easily.
• Magnifier/magnifier utility/large font/zoom
• Text-to-speech (narrator output)/audio prompts
• Contrast (colour scheme choices)
• Cursor options
• On screen keyboard
• Voice recognition
4.1 Mr Wu cannot understand why a computer needs an operating system and
4.1.1 Name THREE functions of an operating system.
• Provides a user interface
• Controls/allocates hardware resources
• Provides basic security
• Coordinates activities in the computer
• Access and communication with input and output
4.1.2 State TWO advantages of using an office suite rather than the
individual programs available.
• Interface is the same for all the packages/same look
• User can easily move from one application program to
• Data can be transferred between applications/
• Widely used/promoted
4.2 Give ONE reason why many people still use proprietary software such as
Microsoft Office instead of an open-source software package, such as
OpenOffice, which is free.
• Open-source software is not supported in all geographical areas
• Some people may not understand the technical help offered on
• No one to hold responsible
• Various versions of the same software
• Resistance to change/comfortable with what they know
• Not as widely used.
4.3 Mr Wu says that there are too many programs on his computer and decides
to remove some.
Give TWO reasons why a program should be uninstalled rather than just
• Hidden files which form part of the program may remain on the
hard disk and take up space
• May delete files which are used by other programs
• Entries may not be removed from registry.
4.4 Mr Wu finds that his computer has suddenly become slower.
Name TWO instances where, or reasons why, software might cause a
computer to become slower.
• Not using updated drivers
• Too many programs running at the same time (including updates
and virus scanning)
• Utilising software that requires higher hardware
specifications/Using software that requires extensive resources
4.5 Mr Wu is concerned about computer virus infections in the cyber café.
4.5.1 Explain TWO ways in which customers can infect the cyber café's
computers with viruses.
• Users may bring in storage devices (e.g. flash drives,
iPods, etc.) with viruses on them
• Viruses can enter the system via Internet activity
• Users may download and install software without
• Users ignore warnings from anti-virus-program
• Viruses are attached to e-mails of the users, etc.
4.5.2 Name THREE possible ways in which Mr Wu would know if any of
the computers have been infected with viruses.
• Anti-virus software reports virus/suspicious activity
• File(s) become corrupt
• Unknown program(s) or file(s) suddenly appears
• Settings of security software changed/switched off
• Additional programs start to run when the computer is
• Size of a file changes without explanation
• Strange/unexpected message/image/error messages
displayed on the computer screen
• Computer suddenly begins to start or run slowly
• Unauthorised changes made to the registry
• The available memory is less than it should be
• Program(s) or file(s) are suddenly missing
• Program/file changes without explanation/stop operating
• System properties change
• Free hard drive space suddenly gets reduced
• Computer no longer boots
4.5.3 Mr Wu says that he will scan the computers for viruses once a
Give TWO reasons why this will not be a good policy to follow.
• A lot of 'damage' could have been caused by the virus if
only detected a month after infection, etc.
• Anti-virus definitions and programs should be updated
frequently as new viruses are being developed every
• Multiple users can be affected
4.6 Name TWO computer housekeeping tasks or good maintenance habits,
besides the regular updating of security software, that Mr Wu should carry out
• Regular virus/spyware/adware scans
• Operating system/software updates
• Disk defragmentation
• Backup on a weekly basis
• Empty the Recycle bin regularly
• Run Scandisk to check for file system errors/bad sectors
• Run disk cleanup/Delete unnecessary data files
4.7 Mr Wu has heard of a single-user license, multi-user license and a site
He feels that single-user licenses would be too costly for his purposes. Briefly
explain the difference between a multi-user license and a site license.
A site license allows software to be installed on all the computers in
A multi-user license allows software to be installed on a fixed number
of computers (usually quite a small number)
5.1 The CAT learners noticed that all the computers in Mr Wu's cyber café are
linked to a network.
5.1.1 There are a number of benefits having a network.
What would the most important reason be for having a network,
specifically in a cyber café? Briefly motivate your answer.
To share Internet connectivity (from all networked
To provide Internet connectivity to all networked computers
as the function of a cyber café is to provide Internet
5.1.2 Would the network in the cyber café be an example of a LAN or a
WAN? Briefly motivate your answer.
LAN as the computers are all located within a relatively
limited location / area.
5.1.3 Discuss TWO possible disadvantages of establishing and running
a network in the cyber café.
• Costs of setting up
• Cost of maintaining network
• Need to backup data frequently
• Many people have access to data (security issues)
• Access to Internet increases risk of viruses
• If server is down, the whole network will be down.
5.2 The cyber café has a hotspot.
Explain what a hotspot is.
Provides Internet access via a wireless network connection
5.3 State TWO ways in which Mr Wu can, in terms of his business, help to bridge
or reduce the digital divide.
• Offer lessons it on how to use the Internet/computer literacy to
people who need
• Make obsolete computers available to people who need it
• Make the computer facilities more accessible
• Provide Internet access free of charge.
5.4 Mr Wu would like to order supplies for his cyber café over the Internet and
have them delivered to the shop. He would also like to do his banking over
5.4.1 What is the general term used to describe doing business over the
5.4.2 Name ONE way in which he would know that he is using a secure
connection to his Internet banking website.
Yellow padlock icon, somewhere on the screen (accept lock)
OR https which appears in URL
5.4.3 State THREE advantages of Internet banking when compared with
• Do not have to stand in queues/saves time
• Do not have to carry large amounts of money around
• Have access whenever you are on-line/24/7
• Safer as you do not have to go to the bank
• Can keep track of your accounts
• Cuts down on travelling/transport costs
• Usually cheaper bank charges.
5.5 The cyber café is in Johannesburg. One of the customers urgently wants to
send a document of 20 GB to somebody in Cape Town. He does not want to
use or pay a courier service.
Explain how this can be done over the Internet. The e-mail service cannot be
used as it has a 5 MB limit for attachments.
• Upload to a website that the person (in Cape Town) will have access
• Accept: web-based file-hosting service using cloud computing/
online facility to share and synchronise files
• Accept 'DropBox/Skydrive/in the cloud' type answers
• Accept: Make use of a file transfer service (ftp) which allows sharing
5.6 Mr Wu has read about RSS feeds offered by websites.
Describe clearly how RSS feeds can make a user's life that much easier.
Automatically 'downloads' latest/updated information from
5.7 A lot of young people use the Internet facilities at Mr Wu's cyber café. They
often use Facebook and Twitter.
5.7.1 What is a tweet?
(Short) message post using Twitter
5.7.2 Give TWO reasons why many schools and companies block sites
such as Facebook.
• Open to predators/paedophiles/cyberstalkers
• Places strain on network resources e.g. 'cap'/Uses up
bandwidth/Use up school's 'cap'
• Get addicted to these websites/spend lots of time on
these websites/Learners spend too much time on Internet
• Workers waste company time/unproductive
• Replaces social contact
• Employees may bring the company into disrepute by
writing insulting comments on the Facebook wall/Lack of
privacy as information is made public.
6.1 Mr Wu would like to be able to assist people when they send e-mails from his
Name THREE netiquette rules to keep in mind when adding and sending
• Zip large files/do not send large files
• Keep the number of attachments to an e-mail to a minimum
• Make sure attachments are virus free
• Do not send .exe attachments
• Do not send spam.
6.2 Consider the following e-mail address:
6.2.1 Identify the user name in the e-mail address above.
6.2.2 What does the .org.za part of the e-mail address indicate?
Website located in South Africa /Geographical location
6.3 Discuss the differences between a web browser and a search engine.
(Do not give the names of web browsers or search engines in your answer).
Web browser – application software that allows you to
access/view web pages
Search engine – program/website that matches user queries to find
websites/web pages/images/videos/news information
6.4 Consider the following e-mail:
||Savings Bank of BB
|Good day Sir
Your bank account has had multiple access attempts. Please click on the
address below to reset your password and gain access to your account.
Bank Manager – City Branch
074 000 1111
6.4.1 Explain what the difference is between the Cc field and Bcc field in
Cc – Copies the e-mail to others and address is visible
Bcc – Copies the e-mail to other users but the addresses are
not visible to these users.
6.4.2 Name TWO ways in which the amount of spam received at the cyber café can be reduced.
• Use the spam filter from ISP
• Use security software e.g. anti-spam/anti-virus software
• Use multiple e-mail addresses i.e. a public address and an
e-mail address for specific purposes
• Be careful where you give out your e-mail address/do not
confirm your e-mail address.
6.5 RFID tags are becoming commonplace.
6.5.1 Briefly explain what an RFID tag is.
Do not simply write down what the abbreviation stands for.
Tag that contains identification data which can
be read/identified wirelessly
6.5.2 State ONE application of RFID tags in the cyber café environment.
• Security/Keeping track of equipment/limits the amount of
• Access control to the premises/computers
6.6 Mr Wu is concerned about paying high electricity accounts for the cyber café.
Describe TWO ways, related to the use of the computers in the cyber café, in
which electricity can be saved.
• Buy energy saving hardware such as LCD screens
• Switch off when not in use
• Use power saving/hibernation
• Use equipment with energy star specification.
6.7 Mr Wu needs to replace broken computer equipment.
6.7.1 Explain why the broken computers should not be thrown away on
Computer parts contain poisonous substances which are
harmful to the environment
6.7.2 Write down the collective name used for broken, discarded or
unwanted electronic hardware.
6.8 The Internet provides a host of communication modes and methods.
6.8.1 What is the main benefit of using VoIP technology like Skype?
• Cost savings
• Face-to-face communication
6.8.2 State TWO disadvantages when using a chatroom or instant
messaging technologies to stay in contact with friends.
• Both parties have to be online at same time/Cannot leave a
message if person is not online
• Security risk such as identity theft and transferring viruses
• Cannot send attachments
• Lower productivity due to disruption.
6.9 Mr Wu says that when he searched for information on the Internet about other
types of coffee, a very large number of results were displayed.
Name TWO ways in which he could reduce unnecessary results and obtain a
shorter list of more relevant information.
• Add more words
• Use synonyms
• Use Boolean operators (AND/OR/NOT + - )
• Use correct spelling
• Use quotation marks
• Use options under Advanced Search
7.1 Mr Wu wants to help some people to improve their word processing skills.
Help him to answer their questions.
7.1.1 One person says that a word processing document that he has
sent to a friend, cannot be opened by the friend as they do not
have the same program.
What is the best file format to save the document in so that it can
be opened and edited using most word processors?
Save the file in RTF or TXT format or .doc format.
7.1.2 Give TWO reasons why one would make use of footnotes or
• Comments giving more detail/explanation
• Give reference to a source from which facts are obtained
• Gives the name of the person who quoted the statement,
7.1.3 What word processing feature should be used to allow both
portrait- and landscape-orientated pages in the same document?
7.1.4 Give Mr Wu TWO reasons why some documents are distributed in
• Do not have to have access to the program the document
was created in to read it
• Read-only document
• So that the PDF document cannot be easily changed or
edited (need special software to make the changes)
• Security reasons, e.g. legal implications
• The documents can be read on a PC with any operating
system e.g. Apple or Linux-based
7.2 One of the learners was trying to help Mr Wu with a spreadsheet.
Study the screenshot of the spreadsheet below.
7.2.1 Name TWO ways in which to change the appearance of the
spreadsheet above so that it is easier to read and more meaningful
to Mr Wu.
• Emphasise headings by using bold or shading
• Use currency formatting if you are working with money
• Format column C to remove decimal places
• Format alternate rows in different colours, etc.
• Add cell borders
• Correct errors in the formulas/relevant cells.
7.2.2 How can Mr Wu prevent column E from showing in his spreadsheet
(without deleting the data)?
Hide the column
7.2.3 State TWO possible causes for the error message that displays in
cell G10 as #NAME, as shown in the screenshot.
• Using text (e.g. a function name) that does not exist
• Misspelling a function name
• Entering text in a formula without using quotation marks
• Omitting a ':' (colon) in a range reference, etc.
• Have not used absolute addressing when needed
7.2.4 State ONE possible cause for the error message that displays in
cell G14 as #DIV/0!, as shown in the screenshot.
• Dividing by zero
• Dividing by an empty/blank cell
7.2.5 Name the function that could be used to find the number appearing
most often in a column.
7.2.6 The value in cell F8 is calculated by using the formula =E8*F6.
When this formula is copied down to the rest of the column, error
messages and incorrect values appear in column F.
Suggest ONE way of solving this problem.
Use absolute cell referencing/use function key F4 on cell F6
7.2.7 Which function could be used to work out how many numbers in
column C are greater than 15?
7.3 A database table with ID, Term and Explanation columns appears as follows:
||Windows Server 2003
||An operating system for servers
||An operating system for mobile devices
||An operating system for mobile devices
||Windows NT server
||An operating system for servers
||Windows NT workstation
||An operating system for workstation
||modern operating system
7.3.1 The field Explanation is presently defined as a text field.
Suggest a new data type for the field that would enable the field to
accommodate much longer explanations.
7.2.3 What is the most appropriate data type for a field that will contain
OLE or ATTACH
7.3.3 The following query was created on the given data table:
Name the field that will NOT appear in the query results.
7.3.4 Briefly describe the difference in the results produced by each of
the following queries:
A – The explanation must start with Internet and then
anything else can follow
B – Internet must appear somewhere in the explanation
7.4 Use the database table below to answer the questions that follow.
7.4.1 Only the A and B classes in the grade work at the cyber café.
Suggest a validation rule that would prevent Mr Wu from entering
any other letter in the Grade_Graad field.
'A' or 'B'
correct options used
OR operator used
7.4.2 A report is created and grouped first by Grade_Graad and then by
Which surname will appear last in the report?
7.5 The following formula was inserted in a query to calculate how long the
person has been logged onto the Internet:
Hours:([Log off] – [Log on]) * 24
7.5.1 Name the calculated field created in the query.
7.5.2 What is the purpose of the square brackets, [ ], and the round
brackets, ( ), in the formula above?
Square brackets are used around a field name
Round brackets are used for mathematical calculations/Force
correct order of evaluation
Advertise with us