Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
m
06_0417_12_2018_1.18
© UCLES 2018 [Turn over
x
.e
w
w
w
2
Write down the most appropriate item of internal hardware to match the descriptions.
........................................................................................................................................... [1]
(b) A printed circuit board that contains the main components of the computer.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(d) A type of memory where data is lost when the computer is switched off.
........................................................................................................................................... [1]
2 Tick whether the following statements are examples of a 3D printer, a dot matrix printer or a laser
printer.
3D dot matrix laser
(✓) (✓) (✓)
[4]
[4]
m
co
e.
at
-m
am
Complete the following sentences using the most appropriate word(s) from the list.
(a) An electronic device that plugs into a computer and contains the key for a piece of software
is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) A security process that uses photons to enable secure communication is called
........................................................................................................................................... [1]
(d) A numeric code that is entered to enable payment to be made for a meal in a restaurant with
a debit card is called
........................................................................................................................................... [1]
[2]
m
co
e.
at
-m
am
6 You are a student creating a website for your IGCSE ICT revision work. You have produced some
HTML, but have not yet added the logo or merged the cells. You are aiming to produce the following
page.
Fig. 1
...
<table>
<tr>
<td><h1>IGCSE ICT</h1></td>
</tr>
<tr>
<td><h3>Theory</h3></td>
<td><h3>Practical 1</h3></td>
<td><h3>Practical 2</h3></td>
</tr>
<tr>
</tr>
</table>
Fig. 2
m
co
e.
at
-m
am
(a) Write the HTML that would display the image called “Logo.jpg” as shown in Fig. 1. If the browser
cannot find the image, then the text “Tawara School Logo” will be displayed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(b) The third line of HTML currently shown in Fig. 2 does not produce the title as shown in Fig. 1.
Write the HTML that would produce the title as shown in Fig. 1.
...........................................................................................................................................
........................................................................................................................................... [2]
7 A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3] m
co
e.
at
-m
am
(b) The system recognises the goat and therefore gives the correct feed to the animal.
Describe how RFID technology will be used to give the correct feed to the animal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
m
co
e.
at
-m
am
m
co
e.
at
-m
am
8 An auction company sells toys. It uses a spreadsheet to show each person’s items and the amount
of money the buyer and seller owe to the company.
A B C D E F G H I J
=......................................................................................................................................... [2]
(b) The person selling the item pays a Seller’s commission on any item sold. This is calculated
using the Selling price and finding a match or the next value below in the table, in cells I6 to
J11.
Write a formula to display in cell F6, the Seller’s commission on the Double Decker bus toy.
This formula will be replicated down to cell F13.
=.........................................................................................................................................
........................................................................................................................................... [5]
m
co
e.
at
-m
am
(c) Describe how you could replicate the formula in cell F6 for each item.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Before the auction begins, a hard copy brochure is produced showing information about the
items, data from the spreadsheet and images of some of the items.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
m
co
e.
at
-m
am
9 Automatic car parking systems built into cars are becoming more common. They allow the car to
park safely in a parking bay unaided. The car uses proximity sensors fitted to the front and rear of
the car to help it park. There are many advantages to using these sensors.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Modern-day drivers rely less on paper maps and more on satellite navigation systems (satnav).
Describe the inputs, outputs and processing of a satnav when used by a driver to reach a
destination.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
m
co
e.
at
-m
am
10 The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.
(a) Discuss the advantages and disadvantages of using computer controlled robots rather than
humans to build the lens.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) A new computer system will operate the space telescope; the new computer system is made
up of a number of modules.
Describe how the new computer system is to be tested before it is fully operational.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
m
co
........................................................................................................................................... [4]
e.
at
-m
am
(c) When the new system has been developed, both user and technical documentation have to
be written.
Name three components that are found in both technical and user documentation.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
11 When people use the internet they run the risk of their computers being infected by viruses.
(a) Describe the effects the virus could have on their computer’s hard disk.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Explain another way the computer could have become infected with a virus.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
m
co
e.
at
-m
am
(c) An antivirus program is set to fully scan a computer for viruses once a day.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
12 A company used to have video-conferences with its suppliers, but due to technical problems they
are considering running an audio-conference.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
m
co
e.
at
-m
am
13 Tick four health issues associated with the continual use of computers.
Tick
(✓)
Virus
Backache
Electrocution
Fire
RSI
Tripping
Eye strain
Overheating
Headache
Heart attack
[4]
14 Some smartphones connected to the internet can allow the user to point their phone’s camera at
an object or image to display information about it on the phone’s screen. The object acts like an
item in a search engine. This is called augmented reality.
One example of its use is in mobile games, where the user tries to catch characters from the game
as the characters appear to walk in the streets.
Explain, using examples, other ways in which augmented reality could be used in everyday life.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
m
co
e.
at
-m
am
15 As banks reduce the number of branches due to the increased use of online banking system,
improved security of customer data is needed. Many banks are introducing biometric systems to
secure customer data.
(a) Explain, using examples, why biometric systems are more effective than other methods of
security.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT) using contactless
cards.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
m
co
e.
at
-m
am
16 The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.
Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
m
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
co
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
-m