Information Technology P2 2023
Information Technology P2 2023
MARKS
EXAMINATION NUMBER
1. This question paper consists of 32 pages. Please check that your question paper is
complete.
2. Read the questions carefully and make sure that you answer all parts of all the
questions.
3. Answer ALL the questions on the question paper and hand this in at the end
of the examination. Remember to write your examination number in the space
provided.
6. It is in your own interest to write legibly and to present your work neatly.
7. One blank page (page 32) is included at the end of the paper. If you run out of space
for a question, use this page. Clearly indicate the number of your answer should you
use this extra space.
Question 1 2 3 4 5 6 7 8 Total
Marks 10 10 25 10 30 15 20 30 150
Marked
Moderated
Re-Mark
QUESTION 1 DEFINITIONS
Give the most appropriate term for each of the following expressions:
1.1 A program which converts source code into machine code, line by line.
interprter
(1)
1.2 The part of the machine cycle which translates the instruction into CPU commands.
decode
(1)
1.3 A form of network transmission where packets are transmitted to all nodes on the
network rather than a specific device.
Broadcast
(1)
Virtual memory
(1)
(1)
1.6 The portion of a packet which contains the data being transmitted.
Payload
(1)
1.7 An older communications technology which simultaneously transmits voice and data
over public telephone networks using copper cable.
ADSL
(1)
1.9 A secure data transmission protocol for viewing Internet pages with a web browser.
HTTPS
(1)
1.10 Software which redirects traffic through a network of servers to avoid being traced
and which uses layered encryption for protection.
VPN
(1)
10 marks
QUESTION 2 THEORY
For each of the terms in Column A below, you should select the most correct definition in
Column C, matching the letter to the question number. You should merely write down the
appropriate letter in Column B. An example is shown as Question 2.0, using 'W' as the
correct answer.
SCENARIO
Consider the following scenario when answering the rest of the examination paper unless
otherwise stated or the questions are of a general nature.
Fairly Fit is a fitness centre being established in a local shopping mall. They offer customers gym
facilities such as a weights room, swimming pool and sauna, and a health food café.
QUESTION 3 APPLICATION
The business owners will need various computer hardware items for the fitness centre. To
reduce start-up costs, they have purchased a second-hand server with the following
specifications:
3.1 Give an example of ONE device which will connect to a server via USB.
Mouse
(1)
3.2 The specification doesn't state how much RAM there is on the motherboard.
2 GB 8*2 = 16gb
32 GB 8*32 = 256
(2)
3.3.1 What are the THREE basic functions of any operating system?
Function 1:
Provide a user interface.
Function 2:
Load and execute applications.
Function 3:
Manage computer's resources.
(3)
3.3.2 The server does not include an operating system. Complete the following table
to suggest an operating system suitable for the server in this scenario. You
need to:
Name of operating
Justification for choice License model used
system
Windows
Open source
Widly used
(3)
3.4.1 The specifications state two CPU slots, although only one is currently used. If
a second processor is added, would this be considered a co-processor?
Justify your answer with ONE reason
YES yes NO
Justification:
A co-processor is defined as being any additional processor added in
order to assist a CPU. This can be a second CPU, a GPU, a math co-
processor.
(2)
Multitasking
(2)
Multithreading
executed independently.
Definition: Ability to break a single process into multiple threads
of execution and run them simultaneously.
A single set of code being able to be broken into
separate threads and run by multiple processors at the
same time.
(2)
(1)
(b) Will it be possible to increase the size of the L3 cache to improve the
performance of the CPU further? Justify your answer with ONE reason.
no
YES NO
Justification:
L3 Cache RAM is part of the motherboard construction, not
modular, so cannot be swapped out/changed/increased/
improved.
(2)
(c) Caches can either be 'shared' or 'unshared'. Shared means that each
core of the processor makes use of the same cache memory. Explain
why Level 1 cache is more likely to be unshared compared to Level 3,
which is often shared.
(1)
TRUE X FALSE
(2)
(b) Regarding the current scenario, would you recommend that the owners
use an additional graphics card in the server? Justify your answer with
ONE reason.
YES NO
no
Justification:
For a server, the onboard graphics card will be sufficient; there
will not be graphics-demanding applications run on a server; a
server should have sufficient RAM installed, won't notice the
difference in performance.
(2)
Component 1:
GPU
Component 2: VRAM
(2)
[25]
35 marks
QUESTION 4 THEORY
For questions 4.1 to 4.5, you need to select the most correct answer from the options
A–D. An answer grid is at the bottom of this page for your answers. You merely need to
write down the appropriate letter for your answer.
4.1 DHCP …
4.4 Ethernet …
Answer
4.6 Two techniques to compress data are lossy and lossless compression.
4.6.1 For each of the characteristics listed below, you must indicate whether each
applies to lossy or lossless compression. You need to tick the appropriate box.
4.6.2 For TWO of the three characteristics above, explain why you chose lossy or
lossless compression. Name the characteristic and then write your
explanation.
Characteristic 1 Explanation
Circle the Lossy – The reason behind compressing
characteristic letter files is to make them smaller; lossy
A/B/C removes as much as possible to make the
file as small as possible.
Characteristic 2 Explanation
Circle the
characteristic letter Lossy – In order to reduce the size of the
A/B/C file, data is removed and therefore the
quality of the image will be reduced as
some parts of the image are no longer
there.
(2)
[10]
QUESTION 5 APPLICATION
Fairly Fit need some advice regarding the network which they are installing. The network will
need to connect laptops and mobile devices used by the gym, the café, and customers. The
business will also have a website allowing customers to purchase gym contracts, gym clothing
and order food from the café.
5.1 Fairly Fit have been given the following network design:
The only cabled connections will be to the server and the wireless access points. All
other devices will connect via a wireless connection. In the diagram, two wireless
access points are shown – there will be significantly more than this in the installation.
IEB Copyright © 2023
NATIONAL SENIOR CERTIFICATE: INFORMATION TECHNOLOGY: PAPER II Page 13 of 32
(2)
5.1.2 State ONE advantage and ONE disadvantage for laptops and mobile devices
using only wireless connections. Your answers may not be the opposite of
each other.
(2)
5.1.3 Which topology does the network design use? Justify your answer with ONE
reason that highlights this network topology's characteristic.
Topology name:
Reason:
(3)
5.2.1 What is meant by the term 'encrypted' when referring to network traffic?
(2)
5.2.2 The wireless access points used by Fairly Fit offer 256-bit encryption. 256 bit
refers to the length of the key used to encrypt the data stream.
(a) How many different combinations would a potential hacker need to try
to break an encrypted message? Write your answer as a power/
exponent.
2^256
(1)
Name:
Symmetric encryption uses the same key to encrypt and decrypt
data packets. Therefore, if the key which was used to encrypt the
Describe: packets is known by a third party, they will be able to decrypt the
data. This poses a security threat. Uses one private key.
(2)
(2)
(d) List ONE disadvantage of the technique you explained in (c) above.
(2)
5.3.2 The owners of Fairly Fit have asked why it is necessary to have a firewall on
their network. State and explain TWO reasons why their network should have
a firewall, given that the network will be used by employees, gym users and
café customers.
(4)
5.4 Customers have requested more interaction opportunities with the website, allowing
food to be ordered from the café.
5.4.1 Explain why the website will make use of Web 2.0 principles.
(1)
5.4.2 List TWO types of information which customers could post to the website after
ordering food from the café.
(2)
5.4.3 Customers could also use social media to communicate their experiences with
Fairly Fit. Name TWO social media platforms which Fairly Fit could use for
this purpose.
Instagram
Platform 1:
Youtube
Platform 2:
(2)
5.4.4 Add-on features on a website are often made possible by using scripting.
Client-side:
(2)
(b) List TWO website features which make use of client-side scripting that
will be useful to users when ordering food from the café
(2)
[30]
40 marks
QUESTION 6
Read the following text about security concerns over the app 'TikTok'. This text has been
paraphrased from the cited sources. You should then answer the questions that follow.
Universities in at least 10 US states have taken steps to ban the use of the popular app TikTok on
campus Wi-Fi networks. The ban affects both staff and students.
Several US states and the federal government have also banned TikTok from government-owned
devices due to concerns about the app's data collection and the Chinese company that owns it.
Similar bans have been put in place in India and at the European Commission due to security
concerns.
The app collects a large amount of user data, which could potentially offer sensitive information
to the Chinese government. The head of the FBI has also expressed concerns about the app's
data collection and its potential to spread Chinese state influence operations.
ByteDance, the company that owns TikTok, has not been transparent about how data flows
between its US and China operations, raising concerns about its practices. Last month, a major
US magazine reported that TikTok's parent company tracked journalists' IP addresses to identify
which employees were sharing unauthorised information.
However, TikTok remains popular globally, with over 1 billion users, and the bans in the US at
university level are unlikely to impact the app's popularity significantly. However, a greater ban
(for example, country-wide) would substantially impact US users.
[Sources: <https://techcrunch.com/2023/02/23/european-commission-orders-staff-to-remove-tiktok-from-
work-devices/>
<https://techcrunch.com/2023/01/19/tiktok-college-bans-texas-bytedance/>]
The contents of this text was simplified using ChatGPT.
Glossary
TikTok : TikTok is a popular social media app that allows users to create, watch, and share videos created on
mobile devices or using webcams.
6.1 Cyber security is the term used to describe all methods individuals and companies
use to reduce the risk of an attack that will result in data loss.
Name ONE hardware device or software application that reduces the risk of a cyber
attack.
(1)
6.2 Give TWO reasons why you believe TikTok has become such a successful and
popular social media platform.
Reason 1:
Reason 2:
(2)
6.3 List THREE types of information which TikTok might collect and possibly be made
available to the Chinese government. You should briefly explain how each of these
might be useful.
(6)
IEB Copyright © 2023 PLEASE TURN OVER
NATIONAL SENIOR CERTIFICATE: INFORMATION TECHNOLOGY: PAPER II Page 20 of 32
6.4 The article states that bans on campus networks are unlikely to make the app less
popular. Give TWO ways a university student might still be able to use the app while
on campus when TikTok is banned.
1:
2:
(2)
6.5 A student, who uses TikTok, has stated that they don't believe that their personal
information is at risk as they merely use the app as a non-registered user (without
creating an account). Do you believe this to be true? Justify your answer with ONE
reason.
YES NO
(2)
6.6 Fairly Fit is considering creating its own app for gym and café customers. Suggest
to the owners TWO methods to ensure that their customer's data used by the app is
secure.
Tip 1:
Tip 2:
(2)
15 marks
QUESTION 7
To manage their day-to-day business operations, Fairly Fit have many different IT solutions
using both databases and OOP-designed applications.
7.1 Data stored or transmitted across a network can often be subject to threats. Consider
a database which Fairly Fit use to store details of their gym and café customers.
7.1.1 Explain what each of the following threats to quality data means and give a
possible example of how customer data could be affected in the Fairly Fit
database.
Outdated data
Definition
Example
Invalidated data
Definition
Example
(4)
7.1.2 Customers using the Fairly Fit website need first to log in. A hacker is
attempting to log into the website and steal customer information. All
information about every customer is stored in a table called tblCustomers.
The hacker has made up a CustomerID (harry0209) and typed in the
following line into the CustomerID field on the webpage:
SELECT *
FROM tblCustomers
WHERE CustomerID = 'harry0209' OR 1=1;
(a) Entering a SQL statement into a web page field is a malicious SQL
technique. What name is given to this technique?
(1)
(2)
(c) Why will this achieve what you have explained in (b) above?
(2)
(d) What can be done to ensure that a SQL statement such as that shown
in part (b) above is not executed?
(1)
7.2 IP addresses are stored in a fixed number of bits. An IPv6 IP address consists of
eight 16-bit fields, each separated by a colon (:). Each 16-bit field has four
hexadecimal characters, each using 4 bits.
2001:0db8:0000:0000:0000:ff00:0042:8329
7.2.1 How many bits will be required to store one IPv6 address?
(1)
7.2.2 IPv6 addresses are long and difficult to work with, so several techniques can
be used to shorten an IPv6 address without losing its uniqueness. One way
of achieving this is by removing leading zeros, ensuring at least one character
remains in each of the 16-bit fields.
Applying this technique to the IP address shown above, we would end up with
the following address:
2001:db8:0:0:0:ff00:42:8329
2001:0db8:3c4d:0015:0000:0000:002f:000b
Once again, the alternating 16-bit fields have been shown in different colours
for clarity.
(a) Write out this IPv6 address in shortened format using the technique
described above. The first two fields are shown for you.
2001 : db8 :
(2)
(b) Assume that because we have a shorter IPv6 address, we can use
fewer bits to store the address. Use the table/grid below to work out
how many bits will be needed to store the shortened IPv6 address from
(a) above. The first two blocks have been filled in for you.
2001 16
db8 12
(c) The shortening technique used above suppressed leading zeros. Why
is it not possible to remove trailing zeros as well? Use the field ff00 to
assist in answering this question if necessary.
(3)
[20]
QUESTION 8
8.1 One of the programs used by Fairly Fit is used to store and work with details of
various food items which are sold in the café. The program makes use of objects to
hold relevant information and is made up of many different classes.
This class will be used to instantiate Stock objects, one object for each stock item
bought for sale in the café. Each Stock object will have the following fields:
description : string
stockQuantity : integer
costPrice : real
sellingPrice : real
healthyFood : boolean
Additionally, the class will need to have the following class fields:
Except for the markup field, these fields should only be accessible from the Stock
class.
Complete the following class diagram for the Stock class. Show the declaration of
additional fields as well as the following methods:
Stock Class
Stock
Fields:
- description : string
- stockQuantity : integer
- costPrice : real
- sellingPrice : real
- healthyFood : boolean
Methods:
(8)
8.2 An array of Stock objects called sArr exists which shows the stock of all food items
at any one time. An example of data that is stored in the array is shown below:
description Lentil Salad
stockQuantity 8
sArr[0] costPrice 5.50
sellingPrice 8.80
healthyFood Yes
Fairly Fit has a policy that at all times, their stock of healthy food items must be
greater than or equal to 80% of their total stock of food items. For example, if they
have 50 items in stock, then at least 40 of these must be healthy food items.
Consider the following algorithm which has been designed to alert the café manager
if the stock of healthy food items drops below 80% of all items in stock. This algorithm
will be tested against the sample data in sArr.
8.2.1 (a) What method will be called to access the value of the variable
totalStock?
(1)
(b) You must complete the following trace table to show the algorithm's
actions. You MUST include the line numbers as a reference to the line
of code in the algorithm. There are more lines on the grid than are
necessary for a correct answer.
sArr[k].getHealthyFood() alertLevel
Line totalStock size count alert alertLevel k Return
= 'true' ? < 0.80
(11)
(2)
(b) Correct the line of code so that the correct result will be achieved.
(2)
8.3 Fairly Fit would like to incentivise customers who use the gym and eat healthy meals
in the café to lose weight. They wish to apply the following conditions:
Fairly Fit will reward any customer who has eaten 10 healthy meals and used the
gym 5 times, OR any customer who has not eaten 10 healthy meals but has used
the gym 5 times and is within 5 kg of their target weight. This condition can be written
as the following Boolean expression:
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
(6)
[30]
50 marks