Answer IGCSE ICT Theory
Answer IGCSE ICT Theory
Workbook Answers
● ● 1 Types and components of a computer system
1 a hard disk drive/processor
b mouse
c monitor/screen
d keyboard
e solid state memory/SSD
f
printer
[6 marks]
2
Definition
Item from list
Software used to manipulate photographs stored on a computer
photo editing software
Software which obtains data from sensors allowing computers to monitor and
control external activities
control and measurement
software
Software used to manipulate and organise numerical data; data is put into a grid
of numbered rows and lettered columns
spreadsheet
operating system
compiler
Software running in the background of a computer which manages most of the
basic functions, such as user interface and memory management
Software that translates a program written in a high level language into machine
code so that it can be directly run on the computer
Software that takes one or more object files produced by a language translator
and combines them into a single program that can be run on a computer
linker
Software that enables one or more hardware devices to communicate with the
computer’s operating system
device driver
[7 marks]
3
Statement
True
False
Streaming videos to mobile phones using 4G networks has faster data transfer
rates than using WiFi
✔
Mainframe computers have smaller internal memories than desktop computers
✔
Spreadsheets and word processors are examples of applications software
✔
✔
Video cards and sound cards are typical examples of computer software
✔
Examples of utilities include anti-virus software, anti-spyware software and screen
savers
[5 marks]
1
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
4 a
Advantages
Disadvantages
• user is in direct communication with the
computer
• user needs to learn a number of
commands
• user not restricted to a number of pre-
determined options
• all commands need to be keyed in which
takes time and can be error-prone
CLI
• it is possible to alter computer
configuration settings directly
• user doesn’t need to learn any commands • uses up considerably more computer
memory than CLI interface
• more user-friendly; icons used to
represent applications
• user is limited to the icons provided on
screen
GUI
• pointing devices used to select icons and
launch applications – easier than typing
in commands
• need an OS (e.g. Windows) to operate
GUI which uses up much memory
[8 marks]
[2 marks]
[1 mark]
4 a quick response code
b no need for user to actually key in a website address – done automatically by scanning
QR code with a camera
codes can store website addresses that appear in magazines etc. providing an effective
means of advertising
can store more information that 2-D barcodes
[2 marks]
[3 marks]
Acoustic/sound
pH
• washing machines
• environmental monitoring
• burglar alarm systems
• liquid/powder f ow in pipes
• environmental monitoring
• maintain acidity of soil
• maintain pH of a chemical process
• pollution measurements in rivers/sea
• greenhouse moisture levels
• monitoring air quality
Humidity/moisture
• atmospheric monitoring in factories where humidity levels need to
be controlled (e.g. in the manufacture of microchips)
[5 marks]
11
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
11 a MICR
b barcode reader/scanner
c OMR
d magnetic stripe reader/chip and PIN reader
[4 marks]
12
Statement
True
False
Webcams record images before being transmitted
✔
Light pens only work with CRT monitors
✔
✔
Graphics tablets allow drawings to be modif ed prior to input
✔
Optical mice use light to transmit data directly to the computer
Ergonomic keyboards are much smaller than standard QWERTY keyboards
✔
Driving (steering) wheels use sensors to detect left/right movement to give
the sensation of steering
✔
[7 marks]
13 a RFID
i
Use
live-stock tracking (so that whereabouts of each animal on a farm is known; it also identif es
which farm owns the animal)
in retail (this is similar to barcodes but doesn’t require any scanning; the details such as price
can be stored on the tag and then automatically read at a check-out – a big advantage is that
several tags can be read at the same time thus speeding up the check-out process)
in passes (for example, in Theme Parks; RFID cards eliminate the need to scan or swipe people
before ‘rides’, reducing the waiting time; it also allows the tracking of people in the Theme
Park and certain information, such as height or age, can be stored to prevent entry to certain
rides on safety grounds)
in libraries (books can be tracked in and out automatically by readers at the library entrance; no
need to scan barcodes or magnetic stripe cards, making the process quicker and more accurate)
contactless credit/debit cards
ii Operation
radio frequency identif cation readers (RFID) use radio waves to read and capture information
stored on a tag
the tag can be read from several metres distance which is one of its advantages over the
barcode system
the RFID tag is made up of two components
• a microchip that stores and processes information
• an antenna which is used to receive and transmit data/information
the tags can be passive or battery-powered
passive tags use the reader’s radio wave energy to relay back the information; battery-
powered tags use a small embedded battery to power the RFID
12
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
b Contactless card reader
i
Use
contactless debit or credit cards allow customers to pay for items worth up to $25 without
entering their PIN.
all contactless cards have a small chip embedded in them;
this chip emits radio waves (RFID).
to pay for an item the card is held within a few centimetres of the payment terminal
the terminal picks up the signal from the chip and allows the transaction to be processed
ii Operation
customers look out for the
symbol on the payment terminal
the shop assistant enters the amount for payment
the card reader informs the customer to present their contactless card
the customer holds their card in front of the card reader
the terminal display will indicate that the card has been read
[6 marks]
14
Description of stage
Order of stage
3-D printer is now set up to allow the solid object to be ‘printed’
3
Finalised drawing is imported into 3-D printing software that prepares data in a format
understood by the printer
2
4
Object removed from the 3-D printer and any unwanted material is cut or washed away to
produce a f nal solid object
Design is made using CAD software or blueprint downloaded from the internet
Solid object is now built up layer by layer; each layer is 0.1mm thick and printing can take
several hours
[5 marks]
15
Description of use
Name of device
inkjet printer
Produce high quality ‘one-off’ printing, such as a photograph
Produces continuous stationery and multi-part printouts
(graph) plotter
[4 marks]
13
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
16 1 = temperature/pH sensor
2 = pH/temperature sensor
3 = ADC
4 = microprocessor/computer
5 = DAC
6 = valve
[6 marks]
[7 marks]
17 Banded response question
Level 3 (6–7 marks)
Candidate will discuss at least one advantage and one disadvantage of each item. Information will
be relevant, clear, organised and well presented in a structured and coherent format. Some form of
conclusion/reasoned argument for choosing one of the printers for maximum marks.
Level 2 (4–6 marks)
Candidate will mention disadvantages and advantages of all three devices but some evidence of
repeated information (e.g. dot matrix printers have lower quality output than inkjet printers; inkjet
printers produce better quality output than dot matrix printers). Most of the information will be
relevant and presented in a reasonably structured and coherent format. No evidence of any reasoned
conclusions.
Level 1 (0–3 marks)
No real comparison made with some general features of each type of printer only. Descriptions are not
very coherent or even conf icting.
Marking points:
Benefts oflaser printers
• printing is fast (unless only a few pages are to be printed in which case they are little faster than
inkjet printers)
• they can handle very large print jobs
• the quality is consistently high
• toner cartridges last for a long time (and the printers can sometimes be a cost-effective option
particularly if colour outputs are not required)
Drawbacks oflaser printers
• only really fast if several copies are being made
• colour laser printers tend to be expensive to run (4 colour/black cartridges are needed plus diffuser
kits etc. which are expensive to purchase)
• they produce ozone and volatile organic compounds because of their method of printing and type of
toner/ink used (these have been linked to health hazards in the off ce)
Benefts ofinkjet printers
• high quality output
• cheaper to buy than laser printers
• very lightweight and have a small footprint
• don’t produce ozone and volatile organic compounds unlike laser printers
14
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
Drawbacks of inkjet printers
• slow output if several copies needed (little buffer capacity to store the pages)
• can’t do large print jobs (ink cartridges run out too quickly)
• printing can ‘smudge’ if user is not careful
• can be expensive if used a lot (original ink cartridges are expensive to buy)
Benef ts of dot matrix printers
• they can be used in environments which would be a problem to laser or inkjet printers (e.g. dusty/
dirty or moist atmospheres)
• carbon copies or multi-part outputs can be produced
• very cheap to run and maintain
• easy to use if continuous stationery is required (e.g. long print jobs such as wages slips)
Drawbacks of dot matrix printers
• very noisy – not good in an off ce environment
• actually cost more than an inkjet printer to buy initially
• very slow poor quality printing
6
7
9
10
11
12
M
13
14
TF or MF?
T
T
M
M
M
b
1GB
1KB
1TB
1MB
✔
[1 mark
]
c 1000
[2 marks]
2
Storage device
Magnetic
Optical
Solid state
Hard disk
✔
Flash memory card
✔
Blu-ray disk
CD-ROM
✔
✔
Memory stick
DVD-RAM
✔
✔
[6 marks]
15
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
3 Blu-ray disks use blue laser light
DVDs use red laser light
Blu-ray uses a single 1.1mm thick polycarbonate disk
DVDs use a sandwich of two 0.6mm disks
DVDs suffer from birefringence/light refraction due to dual layer format
Blu-ray disks have built-in encryption systems
DVD track pitch is 2.5 times that of Blu-ray
[4 marks]
4 a more reliable/no moving parts
considerably lighter
don’t have to ‘get up to speed’
have low power consumption
run much cooler than HDD
very thin because no moving parts
much faster data access than HDD
b tablet – very thin/light/less battery drain/run cooler
smartphones – very light/don’t use much power/run cooler
[4 marks]
[4 marks]
5
Primary
Secondary
Off-line
RAM
HDD
Blu-ray
ROM
SSD
DVD-RAM
Removable HDD
f ash memory
[6 marks]
6
Media
Serial
Direct
Magnetic tape
Magnetic disk
CD-RW
✔
✔
✔
[3 marks]
[6 marks]
7 Banded response question
[3 marks]
Password
Pas5word
Ken123
Weak (✔)
Strong (✔)
✔
✔
Ab!*56@@
15April2000
TXwm50.
✔
✔
✔
[5 marks]
2 a i
LAN
local area network
close geographically e.g. in one building
uses hubs and switches
ii WAN
wide area network
covers large geographical area e.g. continents
examples include the internet
iii WLAN
wireless local area network
provides wireless network communications
uses access points (APs) or hot spots which are connected to the network
[6 marks]
b 1 = hub/switch
2 = server
3 = bridge
4 = router
5 = internet
[5 marks]
18
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
c Advantages
no cabling therefore increased f exibility
easier to add new devices
reduced costs since less cabling
Disadvantages
less secure than wired networks since signal can be ‘piggy-backed’
possible objects blocking signal
possible interference from other radio sources
slower data transfer rates
[2 marks]
3 a
Item of information
Present
Size of the packet (in MB)
Header to identify data packet
Sender’s IP address
✔
✔
Identity of each node covering whole route
[2 marks]
b packets reassembled in the correct order
according to identity number on packet
4 a Advantages
very portable; can be used almost anywhere provided a mobile phone network signal can be
accessed
a person is more likely to have a mobile phone with them at all times
it is easier to use a mobile phone while on the move than the other devices
Disadvantages
expensive to use if WiFi ‘hot spot’ not available
the displays on mobile phones are smaller than the other devices – this makes it more diff cult to
read web pages
keyboards are very small – it is therefore more diff cult to type messages or navigate web pages
not all websites are mobile-friendly; therefore not all websites may be accessible
signal less likely to be stable or reliable as a wired system (used by PCs and laptops)
b Advantages
laptops are more mobile than desktops but heavier and less portable than tablets or mobile phones
touch pads on laptops are not as easy to use as a mouse when navigating web pages; but much
easier than mobile phones
the keyboards on laptops are not as easy to use as a desktop but are much better than those on a
mobile phone
19
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
Disadvantages
although the screen size is usually bigger than a mobile (and some tablets) they are not usually as
large as those on desktops
to allow laptops to use phone networks requires expensive ‘dongles’
processors used in laptops are not usually as powerful as those used in desktops – so access speed
is not as quick
c
Advantages
tend to have more powerful/faster processors than other devices
usually have more stable and more reliable internet connection since they are use a wired system
rather than WiFi
all web pages are accessible due to larger screen size than other devices
use of full-sized keyboard and pointing devices, such as a mouse, make web page navigation
much easier
Disadvantages
to allow a desktop to access the phone network requires an expensive ‘dongle’
because the parts are all separate and because of the large size, desktop computers
are not very portable
[9 marks]
5
Traditional faxes
Emails
• more likely to be intercepted or read by ‘the • more secure system since documents are
wrong people’
password-protected
• signatures on received documents can be
accepted as legal documents
• documents are usually of a higher quality
• received documents can be more easily
modif ed or used in other documents
• can be a delay in sending documents if
telephone line is busy
• easier and quicker to send to multiple
recipients
[7 marks]
6 information on the internet more likely to be up to date
easier to f nd information using a search engine
vast amounts of information which is easier to locate than using several textbooks
however, information can be inaccurate or biased
risk of information overload when using search engines
security issues (viruses etc.)
risk of plagiarism
risk of undesirable websites
[5 marks]
20
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
7 a Webcams
very large monitors/TVs
microphones
speakers
CODEC software
echo cancellation software
hardware drivers
[3 marks]
b Potential issues
lag in responses
expensive to set up/buy equipment
time zones can give problems when setting up meetings
need to train users, which is both costly and time consuming
relies on good internet connections
Advantages
easier to access key documents or ‘bring in’ experts as required at each video conference venue
can hold a meeting at short notice
reduced travelling costs and accommodation costs
doesn’t take people away from their work for several days (due to travelling) which can be
expensive in terms of salary
reduced risk – f ying, terrorist attacks and so on
[4 marks]
8 a Webinars
web conferencing (often referred to as a webinar) uses the internet to permit conferencing to
take place
with webinars multiple computers are used all connected over the internet
as with video conferencing, it is carried out in real time, and allows the following to take place:
• business meetings to discuss new ideas
• making presentations
• carrying out online education or training
the only requirement is a computer and a high speed, stable internet connection
to carry out web conferencing, each user either downloads an application or logs on to a website
from a link supplied in an email from the conference organiser
delegates can leave or join the conference as they wish
the organiser can decide who can speak at any time using the control panel on their computer
if a delegate wishes to speak, they raise a f ag next to their name
at any time, a delegate can post a comment using instant messaging for all delegates to see
21
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
some of the main features include:
• slide presentations using presentation software which can be posted on the conference
website in advance of the meeting
• it is possible for any delegate to draw or write on a ‘whiteboard’ using the keyboard or
mouse on their own computer
• it is possible to transmit images or videos using the webcam throughout the conference
• documents can be shared by f rst uploading them onto the website before the conference
begins
b Phone conferencing
audio conferencing refers to meetings held between two people using audio (sound) equipment
the equipment used can be the telephone, a computer (with built-in microphones and speakers)
or an internet phone.
audio conferencing can be done over the telephone network (often referred to as a phone
conference).
the following procedure needs to be carried out when doing a phone conference:
• the organiser of the phone conference is given two PINs by the phone company. One PIN is
the personal PIN given to the organiser and the second PIN is the participant’s PIN
• the organiser contacts all of the participants and informs them of their PIN and the data and
time of the phone conference
• when the phone conference is about to start, the organiser dials the conference phone
number and once they are connected, they key in their personal PIN
the participants then call the same conference number to join in – once they get through they
each input the PIN given to them by the organiser; without this PIN, it will be impossible to join
the phone conference
it is possible to hold an audio conference using a computer provided a microphone and speakers
are connected
this makes use of Voice over internet Protocol (VoIP)
it is also possible to hook up an internet telephone which usually plugs into the router or other
internet device
using VoIP allows an organiser to create a group of people to take part in the conference call
the group is created by dragging and dropping user names and telephone numbers into the group
when the conference is to take place, the organiser clicks on the required group and the
conference is initiated
using VoIP allows communication using voice, instant messaging and video (by using an attached
webcam)
if some of the users don’t have an internet connection or don’t have access to a computer,
it is possible to add actual telephone numbers (landline or mobile) to the created
group
[8 marks]
9 a Data Protection Act
b anti-virus software
c holographic image (hologram)
22
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
d authentication
e Bluetooth
f
WAP or hot spot
g spread-spectrum frequency hopping
[7 marks]
[7 marks]
10 Banded response question
Robots are unable to think for themselves and can repeat errors
✔
Robots don’t make any errors
Remaining workers will need to be paid higher wages
[3 marks]
b creation of network manager/technician jobs
creation of website designer jobs
creation of systems analysis/programmer jobs
leads to a better environment/safer workplace
need for engineers to build and maintain robots
training jobs in use of the new system
removal of physical, hard work
[3 marks]
3 a A = part time
B = f exi-time
C and D = job sharing
E = compressed hours
[4 marks]
24
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
b contented work force more likely to stay in job
reduced recruitment and training costs since reduced staff turnover
company can stay open longer if they adopt f exi-time
job sharing allows more than one person to have required skills set
compressed hours allow staff to be more focused on their work
varied work patterns give more f exibility during busy times and during staff sickness
[3 marks]
4 a microwave ovens
ovens
smart fridges/freezers
automatic washing machines
automatic dishwashers
robotic vacuum cleaners
bread-making machines
[3 marks]
b Advantages
no longer a need to stay home whilst cooking food/washing clothes
more time for leisure activities, shopping and socialising
can control ovens (etc.) using an App on mobile phones away from home
smart fridges and freezers can lead to healthier life styles (can automatically order fresh food)
and also prevent food wastage
Disadvantages
can lead to an unhealthy life style (e.g. reliance on ready-made meals)
tend to make people lazy as they rely on labour-saving devices
people can become less f t as they lie around the house letting devices do all the work
loss of certain skills as devices do the tasks
[3 marks]
5 a alarm clocks
televisions
air con/central heating
games consoles/toys
b Advantages
[3 marks]
save energy since devices are more eff cient and can even switch themselves off when inactive for
a while
easy to program devices to do tasks (e.g. QR codes to automatically set correct cooking times etc.)
Disadvantages
more wasteful society – no longer cost effective to repair goods and easier to just throw them away
many people are not comfortable with such devices and f nd them complex to operate
leaving devices on stand-by is wasteful of energy
[4 marks]
25
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
● ● 6 ICT applications
1 a paper-based advertising
easy to print out and distribute using their own computers and printers
easier to target required group of people
recipient can read f yer/brochure wherever they want
hard copies are permanent copies
no need to rely on computer skills
computer-based advertising
can add multimedia to advertising
can use hotspots/hyperlinks
easier to use ‘hit counters’ to see how many people visited website
audience can be global
not possible to deface adverts
much easier/quicker to amend or update adverts
multi-media advertising in local shopping mall
use of sound, animation, video and music
can be interactive
use of transition effects in presentations
more f exible – links to websites, cloud storage, etc. can be used
b
[9 marks]
Term
(✔)
✔
Tweening
Morphing
✔
Tags
Rendering
Vector graphics
✔
Formatting
[3 marks]
c i Voice over Internet Protocol
allows people to talk to each other using the internet
uses discrete digital packages sent to the destination address over the internet
ii microphone
speakers
headset/headphones
iii Advantages
usually free/low cost
can allow a webcam to be used so visual as well as sound
no need for special equipment (can use built-in microphone and speakers)
26
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
Disadvantages
poor quality of sound/drop-out
needs good internet connection
poor video quality from most webcams used
[6 marks]
2 a
Application
Measurement
Control
Monitoring the pollution levels in a river
✔
Burglar alarm system (detection of intruders)
✔
Maintaining the correct temperature and light conditions
in a greenhouse
Automatic oven cooking food at correct temperature
✔
✔
Monitoring patient’s vital signs in a hospital
✔
[5 marks]
b rainfall
temperature
wind speed
wind direction
air pressure
humidity
[3 marks]
[2 marks]
c i ADC (analogue to digital converter)
ii DAC (digital to analogue converter)
d
Sensor
Application
Oxygen/carbon dioxide
• environmental monitoring/pollution
• safety applications e.g. in a spacecraft
• greenhouse/glasshouse environment
Light
• automatic doors
• control switch on/off of street lighting
• burglar/intruder alarm system
Infra-red
• counting people entering/leaving a building
• traff c control systems
Pressure
• burglar/intruder alarm system
• detection of objects in a production line
• burglar/intruder alarm system
Acoustic/sound
• detecting liquids leaking from pipes
• any application where sound can be used (e.g. monitoring sound
levels at airport perimeter)
pH
• pollution monitoring (rivers, air, etc.)
• acid levels in soil in a greenhouse/glasshouse
• chemical reaction monitoring/control
[6 marks]
27
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
3 a infra-red sensor
temperature sensor
[2 marks]
b infrared sensor sends data to computer
when Al panel detected, computer compares sensor data with pre-stored data
if panel detected, signal sent to robot …
… to begin assembly/gluing process
temperature sensor sends data to computer
computer compares readings from sensor with pre-stored data
if sensor reading < pre-stored value, signal sent to heater ….
…. to switch on heater
if sensor reading > pre-set value, signal sent to switch off heater
if sensor reading = pre-set value, no action is taken
process continues until system re-set
[6 marks]
4 PENDOWN
FORWARD 10
LEFT 90
LEFT 90
REPEAT 3
FORWARD 40
RIGHT 90
REPEAT 3
FORWARD 30
RIGHT 90
ENDREPEAT
FORWARD 30
LEFT 90
ENDREPEAT
FORWARD 10
LEFT 90
FORWARD 30
PENUP
PENUP
FORWARD 10
PENDOWN
[6 marks]
5 a count number of vehicles passing junction in all directions
need to collect data at different times of the day
also need to collect on different days of the week
consider effects on timing of slow/er vehicles
consider if any pedestrian crossings near by
other factors such as f ltering, left turns and so on
[3 marks]
28
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
b less expensive than having to build the real thing
often safer to run a computer model
much easier to try out various scenarios
often impossible to try out some tasks in real life (e.g. outer space, under the sea, nuclear
reactors, crash testing cars, etc.)
time scales are reduced (actual application could take years such as climate changes,
population growth, ozone layer depletion, etc.)
[3 marks]
c
Cost of building the real thing is too
expensive
Car driving simulation
Some real situations are too
dangerous to humans
Climate change simulation
Model the loading on a new
bridge
It takes too long to get results back
from the real thin
Chemical reaction involving toxic
chemicals
Almost impossible to do the tasks
for real
Easier and safer to make changes to
a model rather than the real thing
Under-sea exploration
[5 marks]
6
Reasons
Disadvantage?
Robots have difficulty in doing ‘one off’ tasks
8 a account number
[3 marks]
[3 marks]
[8 marks]
15 Banded response question
Level 3 (6–8 marks)
Candidate will discuss at least six or seven points regarding the booking system. The discussion will
include both positive and negative sides of the online method. Some form of conclusion/reasoned
argument, based on the given facts, regarding the suitability of the online booking system will be given.
Level 2 (3–5 marks)
Candidate will discuss only three or four points regarding the booking system. The discussion will
include some positive and some negative aspects of the online method. Some form of conclusion/
reasoned argument regarding the suitability of the online booking system will likely be present but the
discussion leading up to the conclusion will probably not support it.
32
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
Level 1 (0–2 marks)
Very few aspects of the online system are likely to be made. Many of the points given will conf ict. No
attempt at making a conclusion.
Marking points:
• customer clicks on the f lm they wish to see
• required date and time typed in
• required number of seats chosen
• seating display of cinema is shown on screen
• user selects 4 seats he wants by highlighting them on the seating plan and conf rms his choice
• database is searched to check availability of the seats or selected seats shown in red/green on the
plan
• once seats chosen, total cost is given OR all seats not available message
• customer conf rms his choice
• customer enters personal details
• payment method selected and payment made
• database updated to show seats no longer available on that date/time
• f nal details on screen and customer conf rms all details correct
• email sent to customer as proof of purchase (e tickets) or sent to mobile phone App
Hardware requirements
Software requirements
Validation routines
Systems f owcharts
✔
✔
✔
✔
✔
✔
How to add/delete/amend
f les
Meaning of possible error
messages
✔
✔
✔
Troubleshooting guide
[6 marks]
6
Data item
Normal
Abnormal
Extreme
41
✔
–1
✔
✔
50
✔
✔
thirty
1
[5 marks]
7 a
Field name
Validation check
Data type
(cd_title)
none
(alphanumeric)
bar_code
check digit/length check
range check
integer
reorder_level
(integer)
(last_ordered_date)
ordered
range check/format check
character check
alphanumeric/integer
Boolean/logic
[6 marks]
[4 marks]
colour
look-up check
red
orange
character check
red
S
green
XM
size
look-up check
format check
character check
XL
M
LX
SX
[8 marks]
[8 marks]
9 Banded response question
✔
Firewalls can help to prevent viruses or hackers entering the user’s
computer or computer network
Firewalls can be used to log all incoming and outgoing traff c to allow
later interrogation by a network manager
Firewalls can prevent individuals on internal networks from using their
own modems to by-pass the f rewall
Firewalls warn the user if software on their computer is trying to access
an external data source (e.g. automatic software update)
✔
[4 marks]
41
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
6 a i SSL
secure sockets layer
protocol that allows data to be sent and received securely over the internet
SSL encrypts data
use of https or padlock
ii TLS
transport layer security
form of protocol that ensures security and privacy of data between devices communicating
over the internet
has two layers:
• record protocol (contains data being transferred over the internet with or without encryption)
• handshake protocol (permits website and user to authenticate each other and make
use of encryption algorithms)
[5 marks]
b it is possible to extend TLS by adding new authentication methods
TLS makes use of session caching thus improving overall performance compared to SSL
TLS separates handshaking process from the record protocol
[2 marks]
[5 marks]
c
order: C, E, B, A, D
7 a makes data meaningless unless the recipient has a decryption key
uses both encryption and decryption keys
doesn’t prevent hacking, but makes hacked data almost unreadable
b A = encryption key
[2 marks]
[2 marks]
[4 marks]
B = cypher text
c
i COMPUTER SCIENCE IS FUN
ii 3MU4IN1G34M G2X5M4O4TB J52HG34M
8 a pair of f les stored on a user’s computer
includes a public key and a private key
it is essentially an electronic ‘passport’ that enables exchange of information securely
over the internet
[1 mark]
b sender’s email address
name of digital certif cate owner
public key (to encrypt message)
serial number
expiry date
digital signature of certif cate authority (CA) e.g. VeriSign
[3 marks]
42
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
9
Biometric
technique
Comparative accuracy
Input devices required
What can interfere with
biometric technique?
High (✔)
Medium (✔)
Fingerprinting
✔
fngerprint scanner
damaged fngers (e.g. cuts)
Retina scans
✔
digital camera
microphone
eye irritation/infection
Voice recognition
✔
✔
background noise or
something which affects the
user’s voice
facial hair or wearing of
glasses
Face recognition
digital camera
[6 marks]
[6 marks]
10 Banded response question
● ● 9 Audiences
1 a age of the target group
experience of the audience
audience expectation
knowledge of the audience
[3 marks]
b interview cross-section of the target group to f nd out how to engage the audience
give out questionnaires to people in the target group to f nd out their background,
interests, etc.
carry out market research which involves in-depth analysis of the data received
[3 marks]
[1 mark]
2 a illegal copying of software
b use of product key which is supplied with original copy of the software which indicates its
authenticity and can be checked online
user is asked to click ‘OK? I agree’ or put an ‘X’ in a box to agree to a licence agreement before
software continues to install
original software package comes with a sticker informing the purchaser it is illegal to make
copies; often a hologram label is used to indicate a genuine copy
some software needs a dongle (which includes important f les) before it will work, stops illegal
copies from working
[3 marks]
44
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
3 a no vulgarity or use of inappropriate language which would offend
only use technical terms with experienced/technical audiences
b use of sound/animation to keep audience attention
complicated items better explained using graphics etc.
c
young audience quickly bored!
long presentations require engagement of the audience to maintain interest
d asking questions or getting audience to try out things (audience participation)
always be aware that not everyone likes audience participation
e remember audience when giving examples (e.g. alcohol is illegal in some countries,
vegetarians don’t like reference to meat products, etc.)
[5 marks]
4
This refers to attitudes, values and practices shared by a society or
group of people
Legal
Morality
Ethics
This covers the law, whether a person’s action is punishable by law
This governs professional interactions, codes of behaviour practised
by a society or group of people
This governs the private and personal interactions between people
and is usually determined by the person concerned
Culture
[4 marks]
5
Statement
Unethical
Immoral
Illegal
Sergey uses some of the software routines from ✔
✔
his day job when writing his games software
Sergey claims that all the software routines he
uses from his day job were written by himself
✔
✔
✔
Sergey has some of his software written
overseas, but only pays the writers a very low
wage
Sergey writes some of his computer games
using the powerful computer systems available
to him during his day job
✔
To help advertise his games, Sergey hires a
‘hacker’ who breaks into websites so that
popups appear which advertise his games free
of charge
✔
Some of the games software written by
Sergey make fun of people who have certain
disabilities
Some of the games Sergey writes collect
information from the user’s computer, where it
is installed. This data is sent back to Sergey for
various uses
✔
✔
✔
[7 marks]
45
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
● ● 10 Communication
1 a senders of emails are required to obtain ‘opt in’ permissions before the emails are sent out
emails must not be sent out with false or misleading subject lines
valid postal address must accompany emails from companies/ organisations
most countries don’t allow companies/organisations to harvest email addresses
companies must provide subscribers with a very clear way to unsubscribe or opt out
from their listings
[3 marks]
b Passive
involves release of email material to other users without their consent
Active
involves modif cation of user’s messages or even denial of service (i.e. overloading of
the system); can include viruses or phishing attacks
[3 marks]
c
easier to send out multiple emails if the addresses are all grouped together under a single name;
this group name can then be pasted into the ‘TO’ box
companies/organisations can group people together for marketing purposes e.g. according to
age, ethnicity, hobbies, etc.
‘spammers’ create email groups by buying addresses of users from certain organisations or from
software ‘raids’ on address books; this allows several thousand people to be targeted by a single step
companies use email groups to set up meetings (e.g. for video conferencing) to ensure all the
right people are invited to attend; with individual emails it would be easy to miss somebody out
[3 marks]
2 a
Feature
Internet
Intranets
Information available to users is specif c to a
particular company or organisation only
✔
Requires passwords and user ids to be entered to
gain access to the network
✔
[4 marks]
b i
Meaning
(✔)
hypertext transfer program
hypertext transfer protocol
✔
hybrid text transaction protocol
handshaking text transfer protocol
ii
Meaning
(✔)
f xed type protocol
format testing prof le
faster transfer protocol
f le transfer protocol
✔
iii
Meaning
(✔)
protected document format
portable document format
principal document format
portable document f le
✔
iv
Meaning
(✔)
uploading remote language
[3 marks]
d http:// protocol
www.hoddereducation.co.uk/ website address
ICT_books/2017 path/f le name
5 ftp means f le transfer protocol
http means hypertext transfer protocol
http is used to access websites
http transfers contents of a web page to browser for viewing by user
http uploading is used for smaller f les
ftp is used to download f les from f le servers whereas http downloads data from web servers
ftp is used when f les are very large [4 marks]
6 a
Feature
Blogs
Wikis
Updated on a regular basis by the author only
✔
Anyone can edit, delete or modify the content
Organised in reverse chronological order
Can only be updated and edited by the author
Can be easily edited using a web browser
✔
✔
✔
✔
[5 marks]
b each member has free web space
each member can build their own private and public prof les
possible to write on ‘each other’s walls’
can upload text, images, photos, video to their own area
free instant messaging and video chatting
can email each other within the community
can invite other members to become friends
members have control over who can access their private or personal data
[4 marks]
c i
ISP
an internet service provider (ISP) is a company that provides users with access to the internet
it is normal to pay a monthly fee for this service
when a user registers with an ISP, an account is set up and they are given login details which
includes a user id and password
an ISP has the equipment and telecommunications line access required to have internet access
- usually broadband connections which use copper cables or, more recently, f bre optic cables
48
Cambridge IGCSE ICT Theory Workbook
Photocopying prohibited
Answers
ii netiquette
netiquette is a shortened form of the phrase interNET etIQUETTE
this refers to the need to respect other user’s views and displaying common courtesy when
posting views in online discussion groups or when sending out emails
it is always very important to consider what you write since the reader can’t see your facial
expressions or body language
what may have been intended to be humour, may offend somebody since they misunderstood
your message and drew the wrong conclusions
iii VPN
VPN is a network that is constructed by using public wires - usually the internet - to connect to
a private network, such as a company’s internal network/extranet
there are a number of systems that allow the creation of networks using the internet as the
medium for the transportation of data
iv microblog
microblogs are similar to blogs but are most often used on social networking sites to make
short, frequent posts
the posts can be done using instant messaging, emails or use other social networking vehicles
(e.g. Twitter)
social networking sites use microblogs to allow members to update, for example, their
personal prof les
[6 marks]
7 Advantages
tends to be more up to date since it is easier to amend than books
internet has vast, almost limitless, amounts of information
research using search engines is quicker and easier
no need to travel to a library to do research
information is usually free of charge
pages on the internet often have multi-media elements making learning more interesting
Disadvantages
the internet is not regulated; anything can be posted on a website and information may be biased
or inaccurate
there is always a risk of accessing inappropriate websites when using search engines
it is too easy to be distracted e.g. by computer games and social networking sites
there is a risk of information overload when using search engines
huge risk of plagiarism; since it is easier to cut and paste than copy information from books
some research skills are lost since search engines do all of the work for you
usual risk of viruses etc.
[6 marks]
49
Photocopying prohibited
Cambridge IGCSE ICT Theory Workbook
Answers
8 Banded response question