__________________________________________________________________________________________ GRADE: 8 DATE: 3 February 2023 TIME ALLOCATION: 55 minutes TOTAL MARKS: 40 marks EXAMINER: MODERATOR(S): A. de Lange S. Motjuwadi ___________________________________________________________________________________ Instruc ons: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Check that your ques on paper is complete. You may detach the insert from the ques on paper. Number your answers the same as the numbering of the ques ons. Make sure your ques on numbers are centred. Make sure that you have ruled double margins and do NOT write in these margins. Use both sides of the folio to write your answers. It is in your own interest to write legibly and to present your work neatly. Set out your work correctly. Skip two lines a er each ques on. START EACH SECTION ON A NEW FOLIO and label the sec on clearly in the middle of the page on the rst line. Spelling and grammar always count! Write in full sentences, unless s pulated otherwise. Look at your mark alloca on! Write your name on your QUESTION paper as well and place it BEHIND your answer paper. This paper consists of 5 pages (including this one) ti ti ti ti ti ft ti ti ti 1 ti fi English Home Language Comprehension and Language Cycle Test QUESTION 1: COMPREHENSION Read the passage below and answer the questions that follow: Text A CYBERCRIME - A DISEASE OF THE INTERNET AGE. 1 A cybercrime is any crime that is committed using a computer, network or hardware device. The computer and the internet can be used to target victims as a tool to commit a variety of self-serving crimes. Many people think cybercrime only affects major companies with millions worth of online assets, but this is not true. Cybercrime constitutes a lot of other misdeeds such as 5 fraud, unauthorised access, and forgery. The major cybercrimes that governments, industries, and people around the world are most concerned about are cracking, piracy, phreaking, cyberstalking, cyber pornography, and cyber-terrorism. 2 Cybercriminals/hackers can operate either in organised groups or as individuals. Individual hackers normally engage in cybercrime to prove that they are good at computer programming and navigating breaching software whereas organised cyber gangs always engage cybercrime for monetary purposes like hacking into big companies, business organisations or even banks. Most of the time, organised hackers are employed by the very institutions they steal from. However, there are many ways to protect yourself from becoming a victim of cybercrime, such as: installing licensed antivirus software, creating complicated electronic passwords, using spam blockers and updating firewall settings. Embracing these prudent preventative measures could stop the unthinkable from happening to you and your loved ones. 10 15 20 3 Fraud is one of the many ways cybercrime takes form. It is when someone extorts money from other individuals by way of tricking them. Cyber fraudsters normally do this by impersonating big companies and sending victims emails requesting their financial and bank details. Criminals then use these details to 25 hack the completely unassuming victim’s account. Cybercriminals also rely on identity theft to commit their despicable crimes. Identity theft is the use of someone else's personal data without their knowledge or consent. This can be very injurious because criminals can use a victim's name, ID number, birthday or even their international passport to create new credit cards or 30 collect loans which will affect the owners’ record for years to come. 4 Cybercrime is a new and grossly underreported area of investigation for both police and civilians. Every precaution should, therefore, be taken so that the public doesn't continue silently falling prey to this incurable disease of the internet age. 35 Adapted from https://www.unodc.org/e4j/en/cybercrime/module-5/key-issues/ obstacles-to-cybercrime-investigations.html, 26 January 2023. 2 Text B - Image 1 Source: https://www.cartoonstock.com/cartoon?searchID=CG106957, 26 January 2023 Text C - Image 2 Source: https://www.slanecartoon.com/media/af0b58d7-714b-444d-9b48-5005638089a7-authenticatebefore-you-communicate, 26 January 2023 3 1.1 Refer to paragraph 1. In your own words, explain what a cybercrime is. (2) 1.2 Give two reasons why individuals get involved in cybercrimes. (2) 1.3 What does the phrase “self-serving” (line 3) tell us about the personalities of cyber criminals? (2) 1.4 Explain why people might think that “cybercrime only affects major companies” (lines 3 - 4). (2) 1.5 Provide a synonym for “embracing” in the context of line 19. (1) 1.6 Refer to paragraph 2. State one surprising fact about organised cyber criminals and elaborate on why you think it is surprising. (2) 1.7 With reference to the text, as well as Image 1, give reasons as to why people might believe that piracy is not all that bad. (3) 1.8 Identify the pronoun in the phrase, “Hey- your boss here.” (Image 2). What is the function of this part of speech? (2) 1.9 Identify the interjection in the phrase, “Hmmm… Doesn’t sound like my boss.” (Image 2). What is the function of this part of speech? (2) 1.10 Discuss the function of the bolded text in frame four of Image 1. (1) 1.11 What is the writer’s feelings toward targets of fraud? Quote words from the text to substantiate your answer. (3) Look at the sentence, “Criminals then use these details to hack the completely unassuming victim’s accounts” (line 25 - 26). Identify the adjective and its function in this sentence. (2) 1.12 1.13a Evaluate how Image 1 supports and relates to what is spoken about in Text (2) A. 1.13b Evaluate how Image 2 further supports what is spoken about in Text A. (1) 1.14 Discuss whether or not people should be taking more precautions against cybercrimes and why? (3) TOTAL: 30 MARKS 4 QUESTION 2: LANGUAGE Read the text and answer the questions that follow. Text D 1 Hacking is the practice of accessing data stored privately by experts. When programmers make mistakes, those mistakes make the system vulnerable and these vulnerabilities are being picked by hackers to hack the system. The hackers who don’t work on principles of ethical hacking are known as unethical hackers. Hackers are well aware that their activities are illegal and thus criminal 5 activity which is why they are trying to cover their tracks. In other words, we can say that any effort to attack a computer system or a private network inside a computer is known as hacking. 2 Ethical hacking are “legal” access to information that is unauthorised for the rest of the world. This type of hacking is done to protect the system or websites 10 from malicious hackers and viruses. The hackers who work on principles of ethical hacking are known as ethical hackers. While hackers may be highly skilled at breaking system programs, professional ethical hackers can restore the security of a compromised system and catch the criminal with their skills and abilities. 15 3 Ethical hacking has it’s disadvantages- namely that it is illegal, the techniques used can harm a person’s privacy. Hacking could at times corrupt the files and data of the organisation and any information gained may be used for malicious reasons. 4 Even so, ethical hacking may help fight against cyber terrorism, and national security breaches. It also helps to build a system that prevents any kind of penetration by hackers and offers security to banking establishments. Lastly, ethical hacking may help identify and close the open holes in computer systems and networks. 20 Adapted from: https://www.geeksforgeeks.org/introduction-to-ethical-hacking/, 26 January 2023 2.1 Provide the parts of speech for the underlined words. (4) 2.2 Identify the conjunction in the sentence, “Hackers are well aware that their activities are illegal and thus criminal…” (Line 5) (1) 2.3 Correct the verb tense error in line 9. (1) 2.4 Explain the function of an adjective and provide an example of a demonstrative adjective from the first paragraph. (2) 2.5 Quote the sentence from paragraph 3 that uses an adverb of time and explain the use of the adverb in that sentence. (2) TOTAL: 10 MARKS GRAND TOTAL: 40 MARKS 5