+ All Categories
Home > Documents > INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER...

INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER...

Date post: 26-Jun-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
23
MARKS: 150 TIME: 3 hours This question paper consists of 12 pages including the cover page. INFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11
Transcript
Page 1: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

MARKS: 150 TIME: 3 hours

This question paper consists of 12 pages including the cover page.

GRADE 11

NOVEMBER EXAMINATION2018

INFORMATION TECHNOLOGY P2

PINETOWN DISTRICT

Page 2: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

INSTRUCTIONS AND INFORMATION

1. This question paper consists of SIX sections:

SECTION A: Multiple-choice questions (10)

SECTION B: System Technology (20)

SECTION C: Communications Technologies and Network

Technologies (30)

SECTION D: Data and Information Management (27)

SECTION E: Solution Development (23)

SECTION F: Integrated Scenario (40)

2. Read ALL the questions carefully. 3. Answer ALL the questions.

4. The mark allocation generally gives an indication of the number of facts/reasons required.

5. Number the answers correctly according to the numbering system used in this

question paper.

6. Write neatly and legibly.

Page 3: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

SECTION A – SHORT QUESTIONS QUESTION ONE

Write down the letter only of the option(A-D) that best matches the question above it for 1.1. to 1.10.

1.1.

1.2.

1.3.

1.4.

1.5.

1.6.

Convergence refers to…

A technology that is always on.B technology that does not need to be tethered to wired connections.C functionalities of many devices built in one D the ability of mobile devices to connect to one another.

The ... translates an entire program into machine language before execution.

A compiler B interpreter C translatorD operating system

This technology automates the configuration process of a device before it can be used.

A Caching B Hot SwappableC Daisy ChainingD Plug and Play

Which of the following refers to an encryption technology used to authenticate the identity of the sender of an e-mail message?

A Digital certificateB Digital divide C Digital signature D Digital handshake

Which of the following is NOT associated with green computing?

A Using Energy Star compliant hardwareB The ‘Paperless office’C Using refillable toner cartridgesD Replacing computer equipment on a four-yearly basis

Attempt from people using an e-mail to try to convince someone to provide security-related information is called …

A phishing. B pharming. C scamming. D snooping.

Page 4: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

1.7.

1.8.

1.9.

1.10.

A collection of programs that are designed to infiltrate a computer and gainthe highest level of privileges to take control of the infected computer.

A Rootkit B Trojan C Admin Bug D Malware

With what is this icon shown here associated?

A Tiger-eye B Retinal Scanning C Nvdia D RSS

An organisation’s private network environment consisting of documents and resources relating to the organisation’s business is known as their….

A ethernet B extranet C intranet D internet Which ONE of the following terms does NOT belong to the others?

A Android B iOS C Windows RT D Linux

TOTAL SECTION A = [10]

SCENARIO: SCENARIO:

The municipality has nominated your school as the centre to hold training classes to upgrade the skill levels of the community members in ICT. This initiative is aimed at helping individuals market themselves and promote employment. The initiative is aimed at school learners first and may later extend to the public at large.

The municipality has provided your school with some computers to assist.

The I.T. Educator and I.T. learners will assist in the learning programs.

Page 5: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

SECTION B : SYSTEM TECHNOLOGIESQUESTION TWO

2.1.

2.1.1.

2.1.2.

2.1.3.

2.2.

2.2.1.

2.2.2.

2.2.3.

2.2.4.

One of the computers was opened and examined by the IT class. The motherboard was found to have many different connectors found all over it.

One of these connectors on your motherboard is a SATA connector. What would be connected to it? SATA connectors are where you plug in the cables that connect your storage device(s) to the motherboard. (Hard drive OR CD/DVD drive OR SSD OR combination of these.)

The motherboard has many busses. What is a bus and why does the motherboard need buses? A bus is a set of wires (or paths) etched into the motherboard used to transfer data between the parts of a computer.

Where, on the motherboard, would one connect the CPU?

Zif socket

The CPU and RAM are two of the most important components in a computer.

What does it mean to say that these two devices have a point to point connection?

Point-to-point connection means that the wires or paths used to transfer data are not shared between multiple components.

These two components need each other to function effectively. Explain why this is so.

The CPU is responsible for all the processing taking place inside thecomputer.

All the data and instructions have to be loaded into the RAM, before the CPU can work with them.

The CPU is responsible for carrying out the Machine Cycle. List the four steps of the Machine Cycle.

Fetching the instructions and data from the RAM (memory). Decoding the instructions. Executing the instructions. Transferring data back to the memory.

You were upgrading the RAM to 8 GB of RAM. The computer only recognises 4 GB of RAM. It is installed correctly and the RAM is not faulty. What could be theproblem?

Your operating system could be a 32 bit operating system that can only recognise 4 GB of memory.

(1)

(2)

(1)

(1)

(2)

(4)

(1

Page 6: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

2.3.

2.3.1.

2.3.2.

2.4.

2.4.1.

2.4.2.

2.4.3.

You decided to solve the memory problem you are having with RAM by using Virtual Memory.

What is virtual memory?

Virtual memory is an area of storage or disk space that the operatingsystem keeps for its own use to fool the computer into thinking that there is more RAM than there actually is.

Explain how the computer uses the virtual memory to solve the memory problem?

The operating system creates pages/swop files and swops part of the program/data presently being used between the RAM and the hard drive.

Study the screenshot below and answer the questions that based on it:

Define the term firmware.

Software stored on ROM chips.

State two reasons why it is necessary to update your firmware.It can make the device work faster/better. New features can be added to the device.

What does the term Partition refer to?

A partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk, or to create the appearance of having separate hard drives TOTAL SECTION B = [20]

)

(2)

(2)

(1)

(2)

(1)

SECTION C : COMMUNIATION AND NETWORK TECHNOLOGIESQUESITON THREE

The image below was given to the network team to assist in planning a network for the

Page 7: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

3.1.

3.2.

3.3.

3.3.1.

3.3.2.

training centre. Answer the questions based on networks and their significance to the training centre.

State three advantages of a network to the organization.

Fast efficient communication Centralisation of data Transfer of files (any 3) Leisure Flexible access Sharing of hardware resources.

ADSL is used as Internet connection. State TWO advantages using a fixed line connection such as ADSL over a mobile connection.

A star topology is used in this representation of a network.

Define the term topology. Topology refers to the physical layout and connection of devices in the network

Explain why the star topology is overall a popular choice. In a star topology, every device is connected via its own cable to a central device such as a switch. That device controls the traffic in the network. (any 2)If a single cable breaks, then only that one device will be enabled – the whole network is not affected.

What is the function of a NIC (Network Interface Controller)? Apart from communication. The NIC encodes and decodes the data so that it can be sent over a specific medium.

(3)

(2)

(1)

(2)

Page 8: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

3.4.

3.5.

3.6.

3.6.1.

3.6.2.

3.6.3.

3.7.

3.7.1.

3.7.2

What is the difference between a router and a switch?Router Makes communication between networks possible over the Internet by directing data to its correct destination. Switch Connect computers in a central location to a network so that

communication can occur. A switch directs traffic between devices connected to a network.

Cabling is part of a network. UTP and fibre optic cables are the two main types of cables.

Differentiate between these two cables by describing how data is transferred over the cables. UTP Transfer data as electrical pulses along copper cables. Fibre optic Transfer data as light pulses along fine glass tubes.

Briefly discuss the problem of attenuation, EMI and eavesdropping when using UTP cables. Attenuation – weakening of a signal when transmitted over a long distance EMI – Electromagnetic interference when signals from machinery and other sources can corrupt data travelling over copper cables. Eavesdropping – when signals travelling in copper cables can be intercepted by outsiders.

Which cable is mostly used in this type of network? UTP

Protocols are necessary to enable transmission across a network or the Internet.

What is a network protocol?

A protocol is a set of rules that govern how data is transmitted between devices and networks. Protocols determine compression types, error handling and how the sending and receiving devices indicate data is sent or received.

Differentiate between http and https.http – is the standard protocol for transferring web pages and their content across the internet.https – is a secure version http with secure sockets layer(SSL)

Name the communications protocol used to transfer large files between computers via networks such as the Internet.FTP

Explain what the following protocols are: VOIP, HTTP and SMTP.

(2)

(2)

(2)

(3)

(1)

(1)

Page 9: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

.

3.7.3

3.7.4.

3.7.5.

3.8.

SMPT: Protocol used for sending mailHTTP: defines how web pages are transferred across the internetVOIP: allows telephone calls over LANS, WANS and internet.

SSL is a protocol used to ensure the security of communication and transactions on the Internet. Briefly describe how SSL works.

SSL (Secure Sockets Layer) relies on a trusted third party selling a digital certificate that is used to confirm the website is what it claims to be. The owner of the website has to register for the certificate which usually is only valid for a year and needs to be renewed. An SSL transaction can only take place if the URL and IP address of the site you are communicating with matches the ones registered in the certificate – and if the certificate has not expired.

State TWO differences between a normal workstation and a server.

The aim of a server is to provide resources. A server is usually NOT used as a normal workstation. A server has better specifications than a workstation.

(Any 2 suitable answers.)

TOTAL SECTION C = [30]

(2)

(1)

(3)

(3)

(2)

SECTION D : DATA AND INFORMATION MANAGEMENTQUESTION FOUR

4.1.

4.1.1.

4.1.2.

A database can be described as a collection of data or facts regarding a specifictopic. It is seen as a collection of related files(Tables) that contain data or related fields called records.

List THREE advantages of using database software. Stores data electronically in a structured and organised way Manipulates and changes data. Process the data within seconds.

Tabulate TWO of the main differences between the functioning of a desktop database

(3)

(4)

Page 10: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

4.1.3.

4.2.

4.3.

4.3.1.

4.3.2.

4.3.3.

compared to a server DBMS.

A distributed database is much more complex to manage than a database stored on a single computer. List TWO issues that arise from a distributed database. More complex security needed. Data synchronisation is important.

Explain the difference between data and information. Use an example to illustrate each.Data - Raw, unprocessed facts and numbers. Information - Results of the processing of data and should be useful and meaningful. Any suitable example underlining the differences.

The database tables created below are used to capture the details of learners who registered for the training courses offered at your school.

Identify the primary keys in each of the tables above.

cID(Course ID) sID(Student ID)

Why is it necessary for every table to have a primary key? To uniquely identify a record in the table

Explain what a foreign key is with respect to relational databases. A foreign key is a field in one table that is linked to the primary key in another table.

Identify the foreign key in the above diagram. State the table that contains the foreign key. sCourseID found in tblStudent

(2)

(3)

(2)

(1)

(2)

Desktop database DBMS The tools that you need to work with the data are all included in a single application.

Never directly accessed by the user.

Usually for single user applications. Runs on many computers in different locations but connected to the database over the network.

Installed on personal computers Installed on a server.

Page 11: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

4.3.4.

4.3.5.

4.4.

4.5.

With the aid of a diagram(as shown above), illustrate the relationship that can be created. Indicate on the diagram the kind of relationship that is established.- for showing link

Explain the difference between data warehousing and data mining.Data warehousing – how to securely store, manage and retrieve large amounts of data. Data mining – how to process and analyse this data, looking for valuable information that you did not even know was there.

Give an example each of data verification and data validation.

Verification refers to checking that data entered is correct or accurate -by checkingAgainst another source. Data validation is to check that the data entered makes sense –for grade, cannot enter anumber over 12 .

TOTAL SECTION D = [25]

(2)

(2)

(2)

(2)

SECTION E : SOLUTION DEVELOPMENTQUESTION FIVE

5.1. Study the algorithm below written in pseudocode and answer the questions based on it.

Line

Page 12: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

5.1.1.

5.1.2.

5.1.3.

1. S 0 2. Loop_Count 1 to 10 3. If loop_Count MOD 2 = 1 Then 4. S S + Loop_Count -15. End loop 6. Display S

Provide the declaration of all variables used if the code above was to be written in Delphi. Var Loop_Count , S : Integer;

Which loop in Delphi will suit the code above. Explain why you chose this loop according to the code supplied. The for loop loop counter is not initialised or incremented. It is done automatically.

Copy the trace table below in your answer books and complete the trace table for the algorithm above.

What is the purpose of the algorithm above?It determines the sum of all the even numbers between 1 and 10 Or It determines the sum first four even natural numbers or sum of even numbers form 1 to 8/9

(2)

(3)

(6)

Line

S Loop_Count Loop_Count MOD 2 = 1 Loop_Count =10? Display

12342323423 2342323423234 26

0

0

2

6

12

20

1

2

3

4

5

6

7

8

9

10

T

F

T

F

T

F

T

F

T

F

F

F

F

F

F

F

F

F

T

20

Page 13: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

5.1.4.

5.2.

Below is a sample of a text file used to store the students who registered for the courses. The text file contains both learners and adults that have registered. Each line of text contains the name of the student, the age of the student, the average of tests written for a particular course and the course ID. The format of the line of text is as follows:

(Name of student,age#average of tests@course ID)

Kerry,15#73@CN03 Ravi,17#93@CN02Rody,15#98@CN05 Nicky,16#99@CN01Rene,17#82@CN02 Kerissa,16#53@CN04Kevin,14#58@CN04 Lungi,16#33@CN03Sandra,20#63@CN02 Kershan,23#73@CN02Brian,16#54@CN05 Eugene,19#73@CN05Pat,18#73@CN03 Keegan,15#81@CN01Linda,22#56@CN02 Kyle,27#67@CN02Ashen,19#42@CN01Devan,14#62@CN05Denver,15#90@CN02Vandre,16#81@CN01Casey,17#45@CN04Vinesh,17#39@CN04Neville,16#72@CN05 Continued…

Study the portion of the algorithm that accesses the text file shown above and answer the question based on it. The algorithm is supposed to determine the average age of students.

Line 5. i0;Line 6. Open the text file Line 7. While not (end of the file) do the following Line 8. Read line of text from text file (Line)Line 9. Retrieve the age of the student out of the line (Age) Line 10. Convert text to numerical value and store in array arrAge Line 11. Tot Tot + arrAge[i] Line 12. Avg Tot / iLine 13. i i+1 Line 14. Go back to while Line 7Line 15. Display( ‘The average age of students is ‘,Avg)

Write the correct algorithmic statements for Line 9. Read line of text file Find the position of the comma Delete from 1 to the position of the comma

Write the correct Delphi code that will work for Line 10. arrAge[i] := StrToInt(Age);

Declare the array mentioned in the algorithm.arrAge : Array[1..50] of Integer; (Accept any max >=20)

When coding this algorithm, a runtime error will occur. Explain why this error will

(2)

Page 14: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

5.2.1.

5.2.2.

5.2.3.

5.2.4.

5.2.5.

occur and also give a possible solution for the problem. Division by zero will occur when the average is determined. Swop the statement i i+1 around with Avg Tot/i or Line 12 and Line 13.

A logical error will also occur upon running this algorithm. Explain why this error will occur and also give a possible solution for the problem.

The value of the Tot is not initiated before the loop. Add Tot 0 before the loop.

TOTAL SECTION E = [25](3)

(3)

(2)

(2)

(2)

SECTION F : INTEGRATED SCENARIOQUESTION 6

6.1.

6.1.1.

6.1.2.

In order to get your message out there, you realised you need a website. Soon you face the challenge of choosing between Web 1.0, Web 2.0 and Web3.0 etc…

What is a Website?A website is a collection of web pages supporting files such as formatting information, images, movies, sounds and JavaScript programming.

State TWO characteristic each that clearly defines both Web 2.0 and Web3.0.Web 2.0

- Dynamic web pages - Users are content creators, and not just content consumers- Social networking sites such as Facebook allow people to link up and keep in

touch with friends and family worldwide.Web 3.0

(2)

(4)

Now that your school has been given the go ahead by the Municipality to advertise and reach out to all members of the community, the Internet and social media may be used appropriately to achieve optimal support and participation from the community.

Page 15: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

6.1.3.

6.2.

6.3.

6.3.1.

6.3.2.

6.4.

6.4.1.

- Provide users with a more personalised internet experience.- Each user will have a unique internet profile based on the user’s browsing history.- The internet will give responses to the user based on preferences and their

profiles.- Two people making the exact same search but obtaining results that are different.

The best website for your situation will be a business or marketing website. List THREE other types of websites.

- Portal website - News website - Informational website - Personal website - Webblog (blog) - Social networking site - Wiki (any 3)- Educational website - Entertainment website - Advocacy website - Web application website - Content aggregator

Sending large files to your students can be a problem. You sometimes need tocompress the files. Your options are between a lossy compression and a lossless compression. In which situation will it be best to use each of the two compression methods? Lossy compression compress data by losing some of the data – most commonly used

in applications such as streaming media to compress audio, video and still images such as jpegs.

Lossless compression compresses data without losing any data – for digital data like documents, spreadsheets, databases, etc. Where accuracy is important.

Many students including you and other IT classmates at your school use both the desktops as well as your own tablets. A tablet and the computers donated are using two different kinds of operating systems.

List THREE functions of an operating system. Any THREE

Provides an interface. Manages processes and tasks. Manages memory. Manages input and output. Manages the disk/s.

What technology can you make use of to install two different operating systems and software onto one computer? Virtualization

You find yourself using your tablet often because you are always on the move.

A tablet uses a SSD for storage. Tabulate THREE comparable differences between a

(3)

(2)

(3)

(1)

(3)

Page 16: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

6.4.2.

6.4.3.

6.5.

6.5.1.

6.5.2.

6.6.

6.6.1.

6.6.2.

6.7.

SSD and a HDD.

The battery life of your tablet seems to be very short. List THREE things you can do to lengthen the battery life. Any THREE

Display – set the device to automatically switch the display off after a time when you are not using it. Or change the setting to a lower brightness level.

Applications – Close apps when you are not using them. GPS – Ensure your GPS is switched off. Bluetooth and Wi-Fi – turn them off. Media – playing videos drain the battery.

You connect your tablet, phone and computer to a network. What do we call this type of network? PAN (Personal Area Network). (Also accept HAN – Home Area Network)

When dealing with data on a large scale, backup and archiving is extremely important.

Explain the difference between backups and archives by using suitable examples in each case.Backups are made so that you have a copy or duplicate of files in case something goes wrong. Archiving refers to storing files that are static (not going to be changed) for example the report cards of the school at the end of the year. You need it, but will never change it.

Explain the difference between a full backup and an incremental backup.A full backup is a copy of all your data or files. Incremental –the backup software only copies over new files and files that have been changed since the last backup.

Your computer has a single core CPU. State if the following processing techniques will be able to take place. Motivate your answers.

Multi-tasking Yes. Multi-tasking can be used to allocate CPU time to each of the active programs,so that it appears that the computer is performing more than one task at the same time

Multi-processing No. Multiprocessing only takes place when the operating system divides the programs or threads or processes between more than one physical CPU.

(3)

(1)

(2)

(2)

(2)

(2)

SSD HDD Faster data transfer Slower data transfer Use flash drive technology Use magnetism Smaller capacity Larger capacity

Page 17: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

6.8.

6.9.

6.9.1.

6.9.2.

6.9.3.

Any electronic system of data storage that is involved in communication over a network may be exposed to threats. Explain how a worm may pose a threat to your data.

A computer worm uses a weakness in an application or operating system to spread and can ‘reproduce’ itself within the network. Worms pose a threat to data in that they share your confidential files with others.

Explain what will be the implications if your computer is infected by spyware.Spyware such as keyloggers monitor your activities and collect personal information including passwords and account numbers and report them to other parties to either use this information directly or in order to gain access to your data.

To prepare for lessons, you find yourself downloading and streaming videos and other forms of media from various servers in order to make lessons more fun and interesting. One important feature to consider is bandwidth.

Define the term bandwidth.

It is the total data handling capacity of a transmission medium over a given time.

Why is it usually quicker to use BitTorrent protocol to download a file rather than downloading the file directly from a server?

With BitTorrent parts of the file are downloaded from multiple clients.

Someone mentioned that BitTorrent protocol should be avoided as it is illegal to use. Is this statement true? Motivate your answer.

No, BitTorrent itself is merely a file sharing protocol and is not illegal to use however the user must guard against downloading illegal software.

TOTAL SECTION F = [40]

FINAL TOTAL = [150]

(2)

(2)

(2)

(2)

(2)

Page 18: INFORMATION TECHNOLOGY P2€¦ · Web viewINFORMATION TECHNOLOGY P2 PINETOWN DISTRICT NOVEMBER EXAMINATION 2018 GRADE 11 MARKS: 150TIME: 3 hours This question paper consists of 12

Recommended