0% found this document useful (0 votes)
371 views16 pages

Cambridge IGCSE: 0417/11 Information and Communication Technology

Uploaded by

kartikk4000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
371 views16 pages

Cambridge IGCSE: 0417/11 Information and Communication Technology

Uploaded by

kartikk4000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*7638064276*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term software.

Software is a programmed set of instructions that is meant to carry out


.....................................................................................................................................
various tasks/ operations on a comuter
.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(b) There are two types of software.

Identify the types.

Application software
1...................................................................................................................................

.....................................................................................................................................
System software
2...................................................................................................................................

.....................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).

CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer

[2]

© UCLES 2020 06_0417_11_2020_1.13


3

3 Every computer contains input and output devices and a central processing unit (CPU).

(a) Describe the CPU including its role.

.....................................................................................................................................
A cpu is a computer processing unit which is a piece of hardware in a
.....................................................................................................................................
computer which processes all the commands inputed into a computer
which allows it to do basic arithmetic calculations and other input and
.....................................................................................................................................
output operations
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(b) Data can be read directly by using a number of different devices.

Name the most appropriate device used to read the following data.

Cheque No. Branch Code Account No. Transaction Code

RFID
.....................................................
MICR
.....................................................

0 26815 38221 6

Barcode reader Chip reader


..................................................... .....................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


4

4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.

(a) When a new blood donor wishes to give blood they need to fill in a form.

Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.

Blood group can be A, B, AB or O.

Part of the form is shown below.

Blood donor

1. What is your health number?

2. What is your date of birth? / /

3. What is your gender? M/F

4. What is your blood group?

Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Integer
Question 1...................................................................................................................
Date
Question 2...................................................................................................................
Boolean
Question 3...................................................................................................................
Text
Question 4...................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


5

(b) In the Blood_group field the only data that can be entered is A, B, AB or O.

Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.

abnormal normal
Blood group
(✓) (✓)

AB

AO

[2]

(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.

To find the blood donor with the health number 9434765919 he will need to type in the
following query.

Health_number = 9434765919

Write a query to find all the female blood group donors with the blood group A as well as
those with AB.

Gender = F AND Blood_group = A*


.....................................................................................................................................
Gender = F AND ( Blood_group = A OR Blood_group = AB
..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


6

(d) When the details of a new donor are added to the database the person’s date of birth is
entered.

Explain why the administrator would prefer their date of birth to be stored rather than their
age.

To not have to update every patients age every year and so that way
.....................................................................................................................................
age can just be calculated from that point without having to waste
time updating age each year and its also more accurate for the
.....................................................................................................................................
patient
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(e) Name the most appropriate validation check for the Health_number.

Type check
.....................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 06_0417_11_2020_1.13


7

5 Phishing and pharming can affect the security of a user’s data.

(a) Compare and contrast phishing and pharming.

Similarities
.....................................................................................................................................
Both collect sensitive data from users
.....................................................................................................................................
Both need an internet connection
.....................................................................................................................................
Both lead to fake websites
.....................................................................................................................................

.....................................................................................................................................
Differences
.....................................................................................................................................
Phishing is through emails, pharming is more through malicious code
.....................................................................................................................................
Pharming can acknowledge your key typing patterns
.....................................................................................................................................

Email contains the link for phishing, pharming is the code that redirects.
.....................................................................................................................................
Pharming’s fake website looks more genuine
.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


8

(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.

LAN WAN WLAN


(✓) (✓) (✓)

The internet is an example of this type of network

This type of network is found in a building but is


connected without cables
This type of network is used to transmit data
between Europe and North America
This type of network is found in a building but is
connected with cables

[4]

© UCLES 2020 06_0417_11_2020_1.13


9

7 The headteacher of a school has decided to replace desktop computers with laptop computers.

Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [4]

8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.

(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


10

(b) The sharing of email addresses can lead to spam.

Explain what is meant by the term spam email.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(c) Explain why spam email should be prevented.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13


11

9 Point of sale (POS) terminals are used in supermarkets.

(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.

Input Output Both


Device
(✓) (✓) (✓)

Bar code reader

Buzzer

Touch screen on till

Receipt printer

Light sensor on the conveyor belt

Electronic scales

[6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


12

(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13


13

10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.

(a) Describe the steps required in the analysis of such a system.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.

Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


14

(c) Fingerprints are one example of biometrics.

Identify three other examples of biometrics.

1...................................................................................................................................

.....................................................................................................................................

2...................................................................................................................................

.....................................................................................................................................

3...................................................................................................................................

.....................................................................................................................................

[3]

11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.

List four other principles of a typical data protection act.

1..........................................................................................................................................

............................................................................................................................................

2..........................................................................................................................................

............................................................................................................................................

3..........................................................................................................................................

............................................................................................................................................

4..........................................................................................................................................

............................................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


15

12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.

Discuss the effectiveness of using these different methods to improve security when paying
for goods.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [8]

© UCLES 2020 06_0417_11_2020_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_11_2020_1.13

You might also like