Cambridge IGCSE: 0417/11 Information and Communication Technology
Cambridge IGCSE: 0417/11 Information and Communication Technology
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2
.....................................................................................................................................
..................................................................................................................................... [2]
Application software
1...................................................................................................................................
.....................................................................................................................................
System software
2...................................................................................................................................
.....................................................................................................................................
[2]
2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).
CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer
[2]
3 Every computer contains input and output devices and a central processing unit (CPU).
.....................................................................................................................................
A cpu is a computer processing unit which is a piece of hardware in a
.....................................................................................................................................
computer which processes all the commands inputed into a computer
which allows it to do basic arithmetic calculations and other input and
.....................................................................................................................................
output operations
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
Name the most appropriate device used to read the following data.
RFID
.....................................................
MICR
.....................................................
0 26815 38221 6
[4]
4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.
(a) When a new blood donor wishes to give blood they need to fill in a form.
Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.
Blood donor
Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Integer
Question 1...................................................................................................................
Date
Question 2...................................................................................................................
Boolean
Question 3...................................................................................................................
Text
Question 4...................................................................................................................
[4]
(b) In the Blood_group field the only data that can be entered is A, B, AB or O.
Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.
abnormal normal
Blood group
(✓) (✓)
AB
AO
[2]
(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.
To find the blood donor with the health number 9434765919 he will need to type in the
following query.
Health_number = 9434765919
Write a query to find all the female blood group donors with the blood group A as well as
those with AB.
(d) When the details of a new donor are added to the database the person’s date of birth is
entered.
Explain why the administrator would prefer their date of birth to be stored rather than their
age.
To not have to update every patients age every year and so that way
.....................................................................................................................................
age can just be calculated from that point without having to waste
time updating age each year and its also more accurate for the
.....................................................................................................................................
patient
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(e) Name the most appropriate validation check for the Health_number.
Type check
.....................................................................................................................................
..................................................................................................................................... [1]
Similarities
.....................................................................................................................................
Both collect sensitive data from users
.....................................................................................................................................
Both need an internet connection
.....................................................................................................................................
Both lead to fake websites
.....................................................................................................................................
.....................................................................................................................................
Differences
.....................................................................................................................................
Phishing is through emails, pharming is more through malicious code
.....................................................................................................................................
Pharming can acknowledge your key typing patterns
.....................................................................................................................................
Email contains the link for phishing, pharming is the code that redirects.
.....................................................................................................................................
Pharming’s fake website looks more genuine
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.
[4]
7 The headteacher of a school has decided to replace desktop computers with laptop computers.
Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [4]
8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.
(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.
Buzzer
Receipt printer
Electronic scales
[6]
(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.
Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
3...................................................................................................................................
.....................................................................................................................................
[3]
11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.
1..........................................................................................................................................
............................................................................................................................................
2..........................................................................................................................................
............................................................................................................................................
3..........................................................................................................................................
............................................................................................................................................
4..........................................................................................................................................
............................................................................................................................................
[4]
12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.
Discuss the effectiveness of using these different methods to improve security when paying
for goods.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.