Cambridge IGCSE: Computer Science 0478/12
Cambridge IGCSE: Computer Science 0478/12
Cambridge IGCSE: Computer Science 0478/12
* 6 1 0 4 1 1 8 3 2 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (MB) 303733/3
© UCLES 2022 [Turn over
2
A customer can use the ticket machine to select and pay for their ticket.
One input device built into the ticket machine is a touch screen.
(a) Identify two other input devices that could be built into the ticket machine.
(b) The ticket machine has a help icon that a user can touch to contact customer support.
The ticket machine has an output device that allows the user to hear the customer support
person.
............................................................................................................................................. [1]
(c) The touch screen for the ticket machine uses resistive technology.
(i) Describe how resistive touch screen technology operates to recognise a user’s touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give two benefits of using resistive touch screen technology for the ticket machine.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
(iv) Identify one other touch screen technology that could have been used.
..................................................................................................................................... [1]
(d) The computer in the ticket machine uses the stored program concept.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
One function of the operating system is to provide an interface for the user.
Function 1 .................................................................................................................................
Function 2 .................................................................................................................................
Function 3 .................................................................................................................................
[3]
(f) The computer uses 12-bit binary registers to store data whilst it is being processed.
(i) Give the 12-bit binary value that is stored in the register for each denary ticket number.
100 ....................................................................................................................................
235 ....................................................................................................................................
301 ....................................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Show the denary ticket number that would be given to the customer for each 12-bit binary
value.
000000010110 ...................................................................................................................
000001110111 ...................................................................................................................
001101011001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Show the hexadecimal value that represents each of the two 12-bit binary values.
000010010101 ..................................................................................................................
101011010001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.
(a) Explain how the water tap system uses a sensor and a microprocessor to operate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Identify the most suitable sensor that could be used in each system.
it checks the air is dry enough in a garage that spray paints cars
it checks that the soil in a greenhouse has the correct level of acidity
[3]
3 Five statements are shown about Random Access Memory (RAM), an internal
Solid State Drive (SSD) and a USB flash memory drive.
Tick (✓) to show which statements apply to each component. Some statements may apply to
more than one component.
Component
Internal USB flash
RAM
Statement SSD memory drive
(✓)
(✓) (✓)
it is volatile
State two methods she could use to help prevent accidental loss of data in this way.
Describe how each method would help prevent accidental loss of the data.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
5 8 bytes of data are transmitted from one computer to another. Each byte of data has a parity bit.
The data is also sent with a parity byte. Each bit in the parity byte allows a check to be performed
on each column of bits.
A parity check is performed on the data and an error is found in one bit. The table shows the data
that was received.
Parity
Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
bit
Byte 1 0 1 0 1 0 0 1 1
Byte 2 1 0 0 1 1 1 1 1
Byte 3 1 1 1 1 1 1 0 0
Byte 4 1 1 0 1 0 1 0 1
Byte 5 1 0 0 0 1 1 1 0
Byte 6 1 1 1 0 1 0 1 1
Byte 7 1 1 0 0 1 1 0 0
Byte 8 1 1 1 1 0 0 1 1
Parity
1 0 1 1 0 1 1 1
byte
Identify which bit has an error by giving the Byte number and Bit number.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
6 Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is
kept secure during transmission.
(a) Give two ways that a user could check that a website uses the SSL protocol.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) State the name of the updated version of the SSL protocol.
............................................................................................................................................. [1]
Explain why Jian uses a proxy server as part of the system for his website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Jian sells products using his website. He wants to create a secure login system for user
accounts.
He is worried that a user’s login details may be gathered by malware when they are logging
into their account.
(i) State the type of malware that could be used to gather a user’s login details.
..................................................................................................................................... [1]
(ii) Give three methods that could be used to help prevent a user’s login details being
gathered by malware, when they are logging into their account.
Method 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(e) The paragraph describes how the web pages are obtained and displayed for the user.
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• browser
• Hypertext Markup Language (HTML)
• Internet Protocol (IP) address
• Internet Service Provider (ISP)
• Media Access Control (MAC) address
• presentation
• protocols
• structure
• Uniform Resource Locator (URL)
• web pages
• web server
.......................................................................................... .
[6]
Tick (✓) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.
NAND OR XOR
Statement
(✓) (✓) (✓)
if both inputs are the same as each other, the output is always 0
[4]
(b) NAND, OR, XOR, NOR and NOT are all examples of logic gates.
State the name of one other logic gate and complete its truth table.
A B Output
0 0
0 1
1 0
1 1
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.