COMPUTER APPLICATIONS TECHNOLOGY
GRADE 12
Paper 2
June Exam
2025
Previous exam papers have been used to
compile these notes, SC/NSC_ June DBE/2021. SC/NSC_ June DBE/2022, SC/NSC_ June
DBE/2022, SC/NSC_ June DBE/2023, @IMPAQ JUN 2021 & @IMPAQ JUN 2022.
DBE/May/June 2024
These are only suggested answers from the memorandum. Some information is repeated, I
want to show you the different ways the same information is asked.
NOTE: You have to study Term 1 and 2’s notes for the June Exam. If you haven’t
purchased Term 1’s notes contact .
Good luck. Juffrou Ansie
Topics:
1. Network technologies: Networks
2. Social implications
3. Solution development: HTML/web design
4. Solution development: Spreadsheets
5. Solution development: Word processing
6. Solution development: Database
@Juffrou_Ansie
, 2
MULTIPLE-CHOICE QUESTIONS
Line chart Type of chart is recommended to illustrate a trend over a period
Processing This step of the information cycle can only take place after the
data and instructions are in the RAM of the device
NFC NFC cannot be used for connecting to a hotspot
Click-jacking The process of tricking users into following a hidden link on a
web page is known as click-jacking
IoT A trend whereby objects and devices are connected to each
other via the internet
Shaping When an internet service is given a higher priority than other
services, it is called shaping
One-time pin (OTP) Normally the last step in a two-factor (two-step) authentication
Format Painter This word processing feature cannot be used to make multiple
changes at the same time, when formatting a document
Information Data organised in a meaningful way
Firewall A device on a network that allows or prevents access to certain
ports or communication channels
CAPTCHA Distinguishes humans from bots on a website
Vibrating panel Device used by hearing-impaired people
<ul>…</ul> HTML code to create a bulleted list
@Juffrou_Ansie
, 3
Required A field property setting in Access that will ensure that a field
cannot be left blank
Section break A feature to ensure that a watermark only displays on the first
two pages of a document
Text form field A control on the Developer Tab best suited for use with open-
ended questions
Adware Adware is a banner or pop-up window that appears while you
are browsing the internet.
Legend Visual indicator on a graph of related sets of values in a
worksheet.
Bug An error in the program code is known as a bug.
802.11 802.11 refers to a set of specific standards and protocols for a
wireless network.
Check - box A check-box group allows a user to select multiple options in a
form.
Resolution Resolution refers to image quality: The number of pixels an
image is made of
File management The process of creating folders and organising files to work
more efficiently on a computer.
Purpose of drivers Drivers allow communication between hardware/device and the
operating system
A blog • Websites that are updated often with the most recent
entries at the top
• A website that posts short informal/formal stories about
any topic that is updated regularly
• A website that contains information like diary or journal
entries
Information sifting • The finding of relevant information
• To sort out what is useful or valuable information to solve
a certain problem
@Juffrou_Ansie
, 4
Identity theft • Illegally obtaining personal information. Impersonating a
person
• Ways to prevent identity theft
• Don’t give out your personal information
• Protect personal documents like e-mail
• Use good security like firewalls/usernames/passwords
• Antivirus/Antispyware
• Secure browser/Select secure websites
Interactive whiteboard Combination of input and output technologies
Disadvantages of an interactive whiteboard
• Specialised software/equipment is required
• Needs additional training
• Susceptible to outside input (cloths/dust, etc.)
• Expensive to maintain
• Technical glitches: Needs to be
calibrated/connectivity issues/software malfunctions
• Health issues (e.g. Eye strain)
Network technologies: Networks
Ways to prevent computer hardware theft SC/NSC_ June
DBE/2022 & SC/NSC_ June DBE/2023
• Install security gates and burglar bars
• Limit access/employ security
companies/guards
• Install security cameras
• Install alarm systems
• Biometric security for entry into the computer
lab
• Place devices in a strong room/safe
• Secure computers to the desk or floor, e.g. Kensington lock
• Attach a security device to computers e.g. RFID tags
Software technology used with cameras to identify criminals SC/NSC_ June DBE/2021
• Artificial Intelligence (AI) to enhance quality of images
• Push technology to alert user when movement is sensed by the camera/to
identify the size of moving object or suspicious movement
• Facial recognition/thermal imaging
@Juffrou_Ansie