0% found this document useful (0 votes)
6 views475 pages

Computer p1

Uploaded by

Azmat Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views475 pages

Computer p1

Uploaded by

Azmat Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 475

Cambridge Assessment International Education

Cambridge International General Certificate of Secondary Education


* 8 2 2 6 4 6 8 0 1 1 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (LK) 172696/2
© UCLES 2019 [Turn over
2

1 Hexadecimal is used for MAC addresses.

Part of a MAC address is given:

97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.

(a) Show what the binary register stores for each pair of the given digits.

97

5C

E1
[6]

(b) Explain what is meant by a MAC address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Give two other examples where hexadecimal can be used.

Example 1 .................................................................................................................................

...................................................................................................................................................

Example 2 .................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 0478/11/M/J/19


3

2 Rajesh creates a logic circuit.

He uses three different logic gates in his circuit. Each logic gate has a maximum of two inputs.

He describes the logic of each gate.

(a) “The only time the output will be 1 is when both inputs are 1.”

State the single logic gate ...................................................

Draw the single logic gate:

[2]

(b) “The only time the output will be 1 is when both inputs are 0.”

State the single logic gate ...................................................

Draw the single logic gate:

[2]

(c) “The only time the output will be 0 is when both inputs are 1.”

State the single logic gate ...................................................

Draw the single logic gate:

[2]

© UCLES 2019 0478/11/M/J/19 [Turn over


4

3 Five descriptions of different input or output devices are given in the table.

Complete the table by stating the name of each input or output device.

Description Name of device

This is an input device that works by shining a light


onto the surface of a document. The light source is
automatically moved across the document and the ...................................................
reflected light is captured by mirrors and lenses.

This is an input device where a laser or a light source is


moved across an object. The width, height and depth of
...................................................
the object are measured to allow a model to be created.

This is a large input device that is usually fixed to a


wall. A user can calibrate the device to make sure the
sensors align with a projected image. The user can use ...................................................
either their finger or a special pen to make selections.

This is an output device that uses many small mirrors to


reflect light towards a lens. This will display an image. ...................................................

This is an output device that creates an object by


building layer upon layer of material. ...................................................

[5]

© UCLES 2019 0478/11/M/J/19


5

4 (a) Lola is concerned about the risks to her computer when using the Internet.

She wants to use some security methods to help protect her computer from the risks.

Identify a security method she could use for each of the following risks. Each security method
must be different.

Describe how each security method will help protect Lola’s computer.

(i) Computer virus

Security method ................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Hacking

Security method ................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(iii) Spyware

Security method ................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 0478/11/M/J/19 [Turn over


6

(b) Lola is also concerned that the data she stores could be subject to accidental damage or
accidental loss.

(i) State three ways that the data Lola stores could be accidentally damaged or accidentally
lost.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give two methods that Lola could use to help keep her data safe from accidental damage
or accidental loss.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 0478/11/M/J/19


7

5 The following text is stored as a text file:

She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.

Explain how lossless compression would compress this file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

© UCLES 2019 0478/11/M/J/19 [Turn over


8

6 A law company holds a lot of sensitive data about its clients.

(a) It currently requires employees to enter a username and a password to log-in to an account.
Each password must be 8 letters.

The company wants to increase the security of the log-in system.


Identify two improvements the company could use to make the log-in system more secure.

Explain how each improvement increases security.

Improvement 1 ..........................................................................................................................

...................................................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Improvement 2 ..........................................................................................................................

...................................................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The law company wants to purchase a new file server.

The company can purchase a server with either solid state storage or magnetic storage. After
discussion, it decides to purchase a file server with magnetic storage.

Explain why the company chose magnetic storage rather than solid state storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/11/M/J/19


9

(c) The law company also uses optical storage.

Give three different examples of optical storage.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

7 Annie writes a paragraph of text as an answer to an examination question about programming


languages.

Using the list given, complete Annie’s answer by inserting the correct six missing terms. Not all
terms will be used.

• Assembly
• Converter
• Denary
• Hexadecimal
• High-level language
• Low-level language
• Machine Code
• Source Code
• Syntax
• Translator

The structure of language statements in a computer program is called the

....................................................................... . A programming language that uses natural

language statements is called a ....................................................................... . When programs

are written in this type of language they need a ....................................................................... to

convert them into ....................................................................... .

A programming language that is written using mnemonic codes is called a

....................................................................... . An example of this type of language is

....................................................................... language.
[6]

© UCLES 2019 0478/11/M/J/19 [Turn over


10

8 An art gallery has a website that is used to display and sell art.

(a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art.

Describe the process of SSL and how it provides a secure connection.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The art gallery also uses a firewall.

Six statements are given about firewalls.

Tick (3) to show if the statement is True or False.

True False
Statement
(3) (3)

Firewalls are only available as hardware devices

Firewalls allow a user to set rules for network traffic

Firewalls will automatically stop all malicious traffic

Firewalls only examine traffic entering a network

Firewalls encrypt all data that is transmitted around a network

Firewalls can be used to block access to certain websites


[6]

© UCLES 2019 0478/11/M/J/19


11

(c) The art gallery is concerned about computer ethics relating to its website.

Explain what is meant by computer ethics and why the art gallery is concerned about
computer ethics.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/11/M/J/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/11/M/J/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/11


Paper 1 May/June 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages.

© UCLES 2019 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2019 Page 2 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2019 Page 3 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(a) 6
97
1 0 0 1 0 1 1 1

1 mark 1 mark

5C
0 1 0 1 1 1 0 0

1 mark 1 mark

E1
1 1 1 0 0 0 0 1

1 mark 1 mark

1(b) Four from: 4


• Media Access Control (address)
• Used to identify a device
• It is a unique (address)
• It is a static address // It does not change
• It is set by the manufacturer
• The first part is the manufacturer ID/number/identifies the manufacturer
• The second part is the serial number/ID

© UCLES 2019 Page 4 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(c) Two from e.g.: 2

• Colour codes // Colour in HTML / CSS


• Error messages
• Locations in memory
• Memory dump // debugging
• IP address
• ASCII // Unicode
• Assembly language
• URL

Question Answer Marks

2(a) 1 mark for correct name, 1 mark for correct gate symbol 2

− AND

2(b) 1 mark for correct name, 1 mark for correct gate symbol 2

− NOR

© UCLES 2019 Page 5 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

2(c) 1 mark for correct name, 1 mark for correct gate symbol 2

− NAND

Question Answer Marks

3 1 mark for each correct device 5

Description of input or output device Name of device

This is an input device that works by shining a light onto the surface of a document. The
light source is automatically moved across the document and the reflected light is captured 2D Scanner
by mirrors and lenses.

This is an input device where a laser or a light source is moved across an object. The
3D scanner
width, height and depth of the object are measured to allow a model to be created.

This is a large input device that is usually fixed to a wall. A user can calibrate the device to
Interactive
make sure the sensors align with a projected image. The user can use either their finger or
whiteboard
a special pen to make selections.

This is an output device that uses many small mirrors to reflect light towards a lens. This
Projector
will display an image.

This is an output device that creates an object by building layer upon layer of material. 3D printer

© UCLES 2019 Page 6 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a)(i) 1 mark for security method, 2 marks for description 3

Anti-virus (software) // Anti-malware (software)


• Scans the computer system (for viruses)
• Has a record of known viruses
• Removes/quarantines any viruses that are found
• Checks data before it is downloaded
• « and stops download if virus found/warns user may contain virus

Firewall // Proxy server


• Monitors traffic coming into and out of the computer system
• Checks that the traffic meets any criteria/rules set
• Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist

© UCLES 2019 Page 7 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a)(ii) 1 mark for security method, 2 marks for description 3

Firewall // proxy server


• Monitors traffic coming into and out of the computer system
• Check that the traffic meets any criteria/rules set
• Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist
NOTE: Cannot be awarded if already given in 4(a)(i)

Passwords
• Making a password stronger // by example
• Changing it regularly
• Lock out after set number of attempts // stops brute force attacks // makes it more difficult to guess

Biometrics
• Data needed to enter is unique to individual
• « therefore very difficult to replicate
• Lock out after set number of attempts

Two-step verification // Two-factor authentication


• Extra data is sent to device, pre-set by user
• « making it more difficult for hacker to obtain it
• Data has to be entered into the same system
• « so if attempted from a remote location, it will not be accepted

© UCLES 2019 Page 8 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a)(iii) 1 mark for security method, 2 marks for description 3

Anti-spyware software // Anti-malware (software)


• Scans the computer for spyware
• Removes/quarantines any spyware that is found
• Can prevent spyware being downloaded
NOTE: Anti-malware (software) cannot be awarded if already given in 4(a)(i)

Drop-down boxes // onscreen/virtual keyboard


• Means key logger cannot collect data // key presses cannot be recorded
• « and relay it to third party

Two-step verification // Two-factor authentication


• Extra data is sent to device, pre-set by user
• « making it more difficult for hacker to obtain it
• Data has to be entered into the same system
• « so if attempted from a remote location, it will not be accepted
NOTE: Cannot be awarded if already given in 4(a)(ii)

Firewall // proxy server


• Monitors traffic coming into and out of the computer system
• Check that the traffic meets any criteria/rules set
• Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist
NOTE: Cannot be awarded if already given in 4(a)(i) or 4(a)(ii)

4(b)(i) Three from: 3


• Human error e.g. accidentally deleting a file
• Hardware failure
• Physical damage e.g. fire/flood
• Power failure // power surge
• Misplacing a storage device

© UCLES 2019 Page 9 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(b)(ii) Two from: 2


• Back data up
• Use surge protection
• Keep data in a fireproof / waterproof / protective case
• Use verification methods (for deleting files)
• Following correct procedure e.g. ejecting offline devices / regularly saving

Question Answer Marks

5 Five from: 5
• A (compression) algorithm is used
• No data is removed in the process // original file can be restored
• Repeated words (are identified) // Patterns in the data (are identified)
• « and are indexed/put into a table // by example
• « and are replaced with their index // by example
• « and their positions are stored (in the table) // by example
• « and the number of times the word/pattern appears is stored (in the table) // by example

NOTE: Other valid methods of lossless compression can be awarded marks

© UCLES 2019 Page 10 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

6(a) Four from (max 2 marks per improvement): 4


• Make the password require more characters
• Makes the password harder to crack/guess
• More possible combinations for the password

• Make the password require different types of characters


• Makes the password harder to crack/guess
• More possible combinations for the password

• Use a biometric device


• Hard to fake a person’s biological data // data is unique

• Two-step verification // Two factor-authentication


• Adds an additional level to hack
• Have to have the set device for the code to receive it
• Drop-down boxes // onscreen keyboard
• To prevent passwords being obtained using keylogger

• Request random characters


• Won’t reveal entire password

• Set number of password attempts


• Will lock account if attempting to guess
• Will stop brute-force attacks

© UCLES 2019 Page 11 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

6(b) Four from (max 3 marks for benefits only, without an explanation): 4
• More read/write cycles (over its lifetime) // greater longevity «
• « likely to be a lot of read/write functions each day
• Read/write speed is sufficient «
• « even though it is slower than solid-state
• Cheaper per unit of data stored «
• « better value for the company to purchase
• « so the law company can afford to buy a server with greater storage capacity
• No requirement for portability «
• « as a server, it does not need to be moved
• Trusted technology «
• « it has been traditionally used for many years

6(c) • DVD 3
• CD
• Blu-ray

© UCLES 2019 Page 12 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

7 1 mark for each correct term, in the correct place: 6


• Syntax
• High-level language
• Translator
• Machine code
• Assembly
• Low-level language

Question Answer Marks

8(a) Six from: 6


• SSL is a (security) protocol
• It encrypts any data that is sent
• It uses/sends digital certificates «
• « which is sent to the (buyer’s/user’s) browser // requested by (buyer’s/user’s) browser
• « that contains the gallery’s public key
• « that can be used to authenticate the gallery
• Once the certificate is authenticated, the transaction will begin

© UCLES 2019 Page 13 of 14


0478/11 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

8(b) 1 mark for each correct tick. 6

Statement True False


(9) (9)

Firewalls are only available as hardware devices 9

Firewalls allow a user to set rules for network traffic 9

Firewalls will automatically stop all malicious traffic 9

Firewalls only examine traffic entering a network 9

Firewalls encrypt all data that is transmitted around a network 9

Firewalls can be used to block access to certain websites 9

8(c) Four from: 4


• A set of guidelines
• Rules/laws that govern the use of computers / by example
• Tell people how to behave when using computers // helps keep users safe when using computers // by example
• Art gallery could be subject to plagiarism / intellectual property theft
• Art gallery could copyright their work (to make it illegal to steal it)

© UCLES 2019 Page 14 of 14


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 5 1 3 5 6 8 3 2 6 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (KS/CB) 172695/2
© UCLES 2019 [Turn over
2

1 Input and output devices are often connected to a personal computer.

(a) Identify three input devices that can be connected to a personal computer.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Identify three output devices that can be connected to a personal computer.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

2 A finance company uses off-line storage to archive their accounts.

(a) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The computers in the finance company use both primary and secondary storage.

(i) Give one example of primary storage.

..................................................................................................................................... [1]

(ii) Give two examples of secondary storage.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 0478/12/M/J/19


3

3 Vanessa writes a paragraph as an answer to an examination question about the central processing
unit (CPU).

Use the list given to complete Vanessa’s answer by inserting the correct six missing terms.
Not all terms will be used.

• Components
• Data
• Decoded
• Executed
• Fetched
• Instructions
• RAM
• ROM
• Secondary storage

The CPU processes ........................................................ and ........................................................ .

An instruction is ........................................................ from ........................................................

into the CPU where it is then ........................................................ . Once this has taken place the

instruction is then ........................................................ .


[6]

© UCLES 2019 0478/12/M/J/19 [Turn over


4

4 (a) Marley wants to store a video he has created for his school project.

He considers using a DVD or a Blu-ray to store the video.

Explain two differences between a DVD and a Blu-ray.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.

Each image is 500 pixels wide and 300 pixels high.

Calculate the total file size in megabytes (MB) for all Marley’s images.

Show all your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size ....................................................... MB


[3]

© UCLES 2019 0478/12/M/J/19


5

(ii) Marley prints the images for his project using an inkjet printer.

Describe how the inkjet printer prints an image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

5 A music company wants to send a new music file to many radio stations. It will send the music file
the day before the release date so that the radio stations can store the file ready for release.

The music company does not want the radio stations to be able to open the music file until 09:00
on the release date.

Identify two security measures and describe how each measure can be used to make sure the
music file cannot be opened until the release date.

Security measure 1 ..........................................................................................................................

Description .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security measure 2 ..........................................................................................................................

Description .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2019 0478/12/M/J/19 [Turn over


6

6 Priya creates a website to sell her old comic books and superhero figures.

(a) She uses HTML to create her website. The HTML she produces has both structure and
presentation.

Explain what is meant by HTML structure and presentation. Include an example of each.

Structure ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Priya uses cookies in her website.

Five statements are given about cookies.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)

Cookies can be used to store a customer’s credit card details

Cookies can be used to track the items a customer has viewed on a website

Cookies will corrupt the data on a customer’s computer

Cookies are downloaded onto a customer’s computer

Cookies can be deleted from a customer’s computer

[5]

© UCLES 2019 0478/12/M/J/19


7

(c) Priya stores her website on a webserver.

To transmit the website data to the webserver she uses parallel duplex data transmission.

Describe how data is transmitted using parallel duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Priya has a URL for her website.

State what is meant by a URL.

...................................................................................................................................................

............................................................................................................................................. [1]

(e) Priya is concerned about a denial of service attack (DoS) occurring on her webserver.

(i) Explain what is meant by a denial of service attack.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give one security device that can be used to help prevent a denial of service attack.

..................................................................................................................................... [1]

© UCLES 2019 0478/12/M/J/19 [Turn over


8

7 (a) An office has an automated lighting system. When movement is detected in the office the
lights are switched on. If movement is not detected for a period of 2 minutes the lights are
switched off. The system uses a sensor and a microprocessor.

Describe how the automated lighting system uses a sensor and a microprocessor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) A microprocessor uses ROM.

Explain what is meant by ROM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0478/12/M/J/19


9

8 Consider the logic statement:

X = 1 if ((A is 1 NOR C is 1) AND (B is NOT 1 NOR C is 1)) OR (A is 1 AND B is 1)

(a) Draw a logic circuit to match the given logic statement. Each logic gate used must have a
maximum of two inputs. Do not attempt to simplify the logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 0478/12/M/J/19 [Turn over


10

9 The contents of three binary registers have been transmitted from one computer to another. Even
parity has been used as an error detection method.

The outcome after transmission is:

Register A and Register C have been transmitted correctly.

Register B has been transmitted incorrectly.

Complete the Parity bit for each register to show the given outcome.

Parity bit

Register A 0 1 0 0 1 0 1

Register B 1 0 0 0 0 0 1

Register C 1 0 0 0 0 1 1

[3]

© UCLES 2019 0478/12/M/J/19


11

10 Remy has a mobile device that has a capacitive touch screen.

Describe how the capacitive touch screen registers Remy’s touch.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 0478/12/M/J/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/12/M/J/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/12


Paper 1 May/June 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2019 Page 2 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2019 Page 3 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(a) Three from e.g.: 3


− Keyboard
− Mouse
− Microphone
− 2D scanner
− 3D scanner
− Touchscreen
− Webcam // digital camera
− Joystick
− Trackpad
− Sensor
− Interactive whiteboard

1(b) Three from e.g.: 3


− Monitor // touchscreen
− Inkjet printer
− Laser printer
− 3D printer
− Speaker
− Headphones
− LED Projector
− DLP
− 2D cutter
− 3D cutter
− Actuator

© UCLES 2019 Page 4 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

2(a) Two from: 2


− It is non-volatile
− Can be easily disconnected from the computer
− It is not directly accessed by the CPU
− Suitable example e.g. CD, DVD, USB flash memory

2(b)(i) One from: 1


− ROM
− RAM

2(b)(ii) Two from: 2


− HDD
− SSD
− Flash memory

Question Answer Marks

3 1 mark for each correct term, in the correct place: 6


− Data/instructions
− Instructions/data (must be the alternative to MP1)
− Fetched
− RAM
− Decoded
− Executed

© UCLES 2019 Page 5 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a) Two from e.g.: 2


− DVD uses red laser/light whereas blu-ray uses blue/violet laser/light
− DVD has a smaller (storage) capacity // Blu-ray has a larger (storage) capacity
− DVD has two layers (of polycarbonate) whereas Blu-ray disks have a single layer (of polycarbonate)
− DVD has a slower transfer rate (of approximately 10 mbps) // Blu-ray has a faster transfer rate
(of approximately 36 mbps)

4(b)(i) 2 marks for any two correct stages of working, 1 mark for correct answer. 3
− 500 * 300 * 10 // 150 000 *10
− * 8 then ÷ 8 (anywhere in the process)
− 1 500 000 ÷ 1024 ÷ 1024 // 1 500 000 ÷ 1 048 576

− = 1.43 MB

4(b)(ii) Four from: 4


− Rollers are used to move the paper through the printer
− Nozzles spray/drop/jet ink onto the paper
− Ink jets/print head/nozzles are moved across the paper (to distribute the ink)
− Different colour inks are mixed to create required colours
− Technology could be piezoelectric
− Technology could be thermal bubble

− Ink is heated
− and expands/evaporates into a bubble
− Bubble is pushed through the nozzle on to the paper
− then the bubble collapses

− Electrical current is applied to a crystal


− which makes it vibrate
− which forces a droplet of ink through the nozzle

© UCLES 2019 Page 6 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

5 − Password protection 4
− Password is released on the release date

− Encryption
− Encryption key is released on the release date

Question Answer Marks

6(a) Structure 4
− This is the layout of the web page
− e.g. placing an image alongside some text // example of tag, such as <div>

Presentation
− This is the formatting/style of the web page
− e.g. the colour that is applied to some text // example of tag, such as <font-color>

6(b) 1 mark per each correct row. 5

True False
Statement
(9) (9)
Cookies can be used to store a customer’s credit card details 9

Cookies can be used to track the items a customer has viewed


9
on a website

Cookies will corrupt the data on a customer’s computer 9

Cookies are downloaded onto a customer’s computer 9

Cookies can be deleted from a customer’s computer 9

© UCLES 2019 Page 7 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

6(c) − Several/multiple bits are transmitted at a time/simultaneously 4


− Several/multiple wires are used
− Data is transmitted in both directions
− at the same time/simultaneously

6(d) One from: 1


− Uniform resource locator
− The website’s address
− User friendly version of the IP address

6(e)(i) Four from: 4


− Designed to deny people access to a website
− A large number/numerous requests are sent (to a server)
− all at the same time
− The server is unable to respond/struggles to respond to all the requests
− The server fails/times out as a result

6(e)(ii) One from: 1


− Proxy server
− Firewall

© UCLES 2019 Page 8 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

7(a) Six from: 6


− Motion sensor is used
− Sensor sends data/signal to microprocessor
− Data/Signal is converted from analogue data to digital data (using ADC)
− Value to compared to stored value(s) //
− If value is outside range/matches
− microprocessor sends signal to switch lights on
− actuator used to switch light on/off
− timer is set for 2 minutes
− Every time movement is detected the timer is reset
− When timer reaches 0/120/times out microprocessor sends signal to switch lights off
− Process is continuous

7(b) Three from: 3


− Read only memory
− Non-volatile memory // Contents of memory are retained when power is turned off//permanent storage
− Primary storage // directly accessed by the CPU
− Holds firmware/boot-up instructions/start-up instructions/BIOS
− Cannot be written to

© UCLES 2019 Page 9 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

8(a) 1 mark per each correct logic gate, with correct input(s) 6

© UCLES 2019 Page 10 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

8(b) 4 marks for 8 correct outputs 4


3 marks for 6/7 correct outputs
2 marks for 4/5 correct outputs
1 mark for 2/3 correct outputs

A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 1

© UCLES 2019 Page 11 of 12


0478/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

9 1 mark per each correct parity bit: 3

Parity bit
Register A 1 0 1 0 0 1 0 1

Register B 1 1 0 0 0 0 0 1

Register C 1 1 0 0 0 0 1 1

Question Answer Marks

10 Four from: 4
− Electrical field/charge is spread across the screen
− Sensors are located around the screen // sensors are used to read the electric field
− When finger touches screen, the charge/ is transferred to the user
− as it is affected by the conductivity of another object
− Coordinates of touch determined/calculated/measured

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 0 8 5 8 6 2 0 4 7 3 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (RW/CB) 172694/3
© UCLES 2019 [Turn over
2

1 Victoria is building a website for her cake design business.

(a) She uses the hexadecimal colour code #D2E3F5 as the background colour for her website.

The colour code is stored in two 12‑bit binary registers.

Show how the code would be stored in the registers.

D2E

3F5

[6]

(b) Victoria uses HTML to create her website.

State what is meant by HTML.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The HTML Victoria writes has both structure and presentation.

Five examples are given of structure and presentation.

Tick (✓) to show which example is Structure and which is Presentation.

Structure Presentation
Example
(✓) (✓)
The colour applied to a text heading on a web page
The font style applied to a paragraph of text on a web page
The placement of a paragraph of text on a web page
The size that an image is set to be displayed at on a web page
The placement of an image next to a paragraph of text on a web page
[5]

© UCLES 2019 0478/13/M/J/19


3

(d) Customers will use a web browser to access Victoria’s website.

Victoria writes a paragraph of text to explain how the website will be displayed on a customer’s
computer.

Use the list given to complete Victoria’s paragraph by inserting the correct six missing terms.
Not all terms will be used.

• browser
• domain name
• firewall
• hexadecimal
• HTML
• https
• MAC address
• search engine
• Uniform Resource Locator (URL)
• web server

The user enters the website .................................................................. into the address bar.

The protocol that is used is .................................................................. . The URL contains

the .................................................................. for the website. This is used to look up the

IP address of the company. A DNS server stores an index of IP addresses.

The browser sends a request to the .................................................................. as this is

where the files for the website are stored. The files are sent back to the

.................................................................. as .................................................................. files.

This is interpreted by the browser and the web page is displayed.


[6]

© UCLES 2019 0478/13/M/J/19 [Turn over


4

(e) When customers access Victoria’s website they will be given the message:

This website uses cookies. An explanation of their purpose can be found in our cookies policy.

(i) Explain what is meant by cookies.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain why Victoria would use cookies as part of her website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

2 (a) A computer can have both a MAC address and an IP address.

Four statements are given about MAC addresses and IP addresses.

Tick (✓) to show whether each statement is True or False.

True False
Statement
(✓) (✓)

A MAC address is unique to a computer on a network

Once an IP address has been set it cannot be changed

A MAC address is made up of the computer’s serial number and


the IP address
If a computer does not have an IP address it cannot communicate
with another device using the Internet
[4]
© UCLES 2019 0478/13/M/J/19
5

(b) A computer uses the Von Neumann model and the stored program concept.

(i) Explain what is meant by the stored program concept.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The Von Neumann model has several components that are used in the fetch‑execute
cycle.

One component is the Arithmetic Logic Unit (ALU).

Describe the role of the ALU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(c) The computer has an operating system.

(i) A signal causes the operating system to stop and assess what to do next.

Identify the name of this signal.

..................................................................................................................................... [1]

(ii) State two functions of an operating system.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 0478/13/M/J/19 [Turn over


6

3 A finance company is concerned that its employees are being distracted by using gaming websites
at work.

(a) Explain how a firewall could help prevent this distraction.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The finance company is also worried about the security of the data stored on its servers.

The company has decided to encrypt the data to improve the security.

Describe how the data are encrypted.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/13/M/J/19


7

(c) The finance company realises that its computer systems have been hacked.

The company thinks that spyware was used to obtain a user’s password.

Explain how spyware could have been used to obtain the user’s password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0478/13/M/J/19 [Turn over


8

4 Consider the given logic circuit:

B X

(a) Redraw the logic circuit using only 4 logic gates. Each logic gate used must have a maximum
of two inputs.

B X

[4]

© UCLES 2019 0478/13/M/J/19


9

(b) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) Describe the purpose of a logic gate in a logic circuit.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0478/13/M/J/19 [Turn over


10

5 The three binary numbers in the registers given have been transmitted from one computer to
another.

One binary number has been transmitted incorrectly. This can be identified by the use of a Parity
bit.

Identify the binary number that has been transmitted incorrectly. Explain how you identified the
incorrect binary number.

Parity bit

Register A 1 0 1 1 1 0 0 1

Register B 1 1 1 0 0 1 1 1

Register C 1 0 0 1 1 0 1 1

The binary number that has been transmitted incorrectly is in Register ............................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 0478/13/M/J/19


11

6 A museum has an information point.

Visitors to the museum can use the information point to plan their visit to the museum.

The information point allows visitors to access the information using a resistive touch screen.

Visitors can either listen to the information or read it on the screen. They can also select to output
a paper copy of the information they require.

(a) Describe how the resistive touch screen registers the visitor’s touch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The information point has a screen to allow visitors to read information.

Identify two other output devices that are present in the information point.

Output device 1 ........................................................................................................................

Output device 2 ........................................................................................................................


[2]

(c) The information point uses both primary and secondary storage.

Explain what is meant by primary and secondary storage.

Primary .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Secondary ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2019 0478/13/M/J/19
12

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/13/M/J/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2019 Page 2 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2019 Page 3 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(a) 6
1 1 0 1 0 0 1 0 1 1 1 0

1 mark 1 mark 1 mark

0 0 1 1 1 1 1 1 0 1 0 1

1 mark 1 mark 1 mark

1(b) One from: 1

− Hypertext Mark-up Language


− A mark-up language used to create webpages

1(c) 1 mark for each correct row: 5

Structure Presentation
Example
(9) (9)

The colour applied to a text heading on a web page 9

The font style applied to a paragraph of text on a web page 9

The placement of a paragraph of text on a web page 9

The size that an image is set to be displayed at on a web page 9

The placement of an image next to a paragraph of text of a web page 9

© UCLES 2019 Page 4 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(d) 1 mark for each correct term, in the correct place: 6

− URL
− https
− Domain name
− Web server
− Browser
− HTML

1(e)(i) − Small packets of data 2


− « that are stored by the web browser

1(e)(ii) Four from: 4

− To store a customer’s password «


− To store a customer’s credit card details «
− « so they do not need to be re-entered in future
− To track what the customer has viewed on the website «
− « so she can send them adverts that match their preferences

© UCLES 2019 Page 5 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

2(a) 1 mark for each correct row: 4

True False
Statement
(9) (9)

A MAC address is unique to a computer on a network 9

Once an IP address has been set it cannot be changed 9

A MAC address is made up of the computer’s serial number and the IP


9
address

If a computer does not have an IP address it cannot communicate with


9
another device using the Internet

2(b)(i) Two from: 2

− Programs / instructions are stored in memory


− Data is stored in memory
− Instructions are fetched and executed one after another

2(b)(ii) − Carries out calculations 4


− Carries out logical operations
− Holds temporary / interim values during calculations
− « in a register called the accumulator (ACC)

© UCLES 2019 Page 6 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

2(c)(i) − Interrupt 1

2(c)(ii) Two from: 2

− Provides an interface
− Loads / opens / installs / closes software
− Manages the hardware // manages peripherals // spooling
− Manages the transfer of programs into and out of memory
− Divides processing time // processor management
− Manages file handling
− Manages error handling // interrupt handling
− Manages security software
− Manages utility software
− Manages user accounts
− Multitasking
− Multiprogramming // time slicing
− Batch processing

© UCLES 2019 Page 7 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

3(a) Four from: 4

− The company could use the firewall to set criteria


− Gaming websites can be listed as blocked websites // ports can be blocked
− The firewall would examine any traffic leaving the network
− If it detected traffic requesting a listed website, it will block access to it
− Keeps a log of all attempts to access blocked websites

3(b) Four from: 4

− An encryption algorithm is used


− « to scramble data
− The original data is called the plain text
− A key is used to encrypt the data
− The key is applied to the plain text
− Plain text is encrypted into cypher text

3(c) Six from: 6

− The user could have been sent an email with an attachment / link containing the spyware
− The user could have clicked a link on an untrusted website
− When the attachment / link was clicked the spyware was downloaded onto the user’s computer
− The spyware recorded all the key logs from the user’s keyboard
− The recorded key logs were sent back to the creator of the spyware
− The key logs were analysed
− A common pattern / word in the key logs could have allowed a password to be identified

© UCLES 2019 Page 8 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct logic gate, with correct inputs: 4

© UCLES 2019 Page 9 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(b) 4 marks for 8 correct outputs 4


3 marks for 6/7 correct outputs
2 marks for 4/5 correct outputs
1 mark for 2/3 correct outputs

A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 1

1 1 1 0

4(c) Two from: 2

− To carry out a logical operation


− To control the flow of electricity through a logic circuit
− An input is given and the logic of the gate is applied to give an output // to alter the output from given inputs

© UCLES 2019 Page 10 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

5 − B 4

Three from:

− Added up the number of 1’s / 0’s in each register


− With the parity bit, two registers have an odd number of 1’s / 0’s
− One register has an even number of 1’s / 0’s
− Odd parity must be the parity used

Question Answer Marks

6(a) Four from: 4

− Screen has two / multiple layers


− Visitor presses on top layer
− Top layer connects to bottom layer
− « creating a circuit
− Calculation is carried out on where layers are connected

6(b) Two from: 2

− Speaker
− Headphones
− Printer

© UCLES 2019 Page 11 of 12


0478/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

6(c) Four from (max. 2 marks per type): 4

Primary
− Memory that is directly accessed by the CPU
− An example is RAM / ROM
− RAM stores programs and data that are currently in use and ROM stores boot-up instructions
− RAM is volatile and ROM is non volatile

Secondary
− Storage that is not directly accessed by the CPU
− An example is HDD / SSD
− Stores data / files that can be accessed at a later stage
− Non volatile

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 3 4 3 6 7 5 4 5 7 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

DC (SC/SG) 163095/2
© UCLES 2019 [Turn over
2

1 Andrew wants to produce advertising material for his company.

(a) Andrew can use an Inkjet printer or a Laser printer.

Draw lines to connect each printer to a correct statement. More than one line may be used to
connect to each printer or statement.

Printer Statement

Can print in colour

Inkjet printer

Uses a charged drum to


create the printed item

Uses powdered toner

Laser printer

Creates output line by line


using a print head

[2]

(b) Andrew wants to print a single page A4 leaflet. He wants to print 10 000 copies.

State whether he should use an inkjet or a laser printer.

............................................................................................................................................. [1]

(c) Andrew wants to produce small 3D models of the company logo.

Explain how a 3D cutter could be used to produce the models.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0478/11/O/N/19


3

2 An electronic guessing game compares denary integer values input by a user with pre-stored
values. The pre-stored values are held in 10-bit binary format.

(a) Convert the binary values in the table to denary.

Binary Denary

0001001110

0110110111

1000000001
[3]

(b) When planning the game, the designer decided to use hexadecimal notation to represent the
binary values.

Explain why the designer used hexadecimal notation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) State the hexadecimal equivalent of the binary value 1010110101

............................................................................................................................................. [3]

3 A company has several offices. It uses the Internet to transfer data between offices. The company
also makes payments to staff and suppliers using online banking.

The company are concerned about spyware and other security aspects of using the Internet.

(a) Explain what is meant by spyware and how it is used to obtain data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]
© UCLES 2019 0478/11/O/N/19 [Turn over
4

(b) The company uses a web page to log on to the online bank.

Identify one method that could be used by the online bank to reduce the impact of spyware
when logging on.

State how the method prevents the use of spyware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The company has installed a firewall as part of its data security.

Describe how a firewall can help protect against unauthorised access to data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) State two other methods the company could use to help prevent unauthorised access to
data.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................
[2]

© UCLES 2019 0478/11/O/N/19


5

4 A zoo has an information point.

• Visitors use a menu to select information about animals.


• The menu includes 500 different animals.
• The information is provided only using high definition video with an audio track.

(a) State one input device that could be used for the information point.

............................................................................................................................................. [1]

(b) The output is shown on a monitor.

State one other output device that could be used for the information point.

............................................................................................................................................. [1]

(c) The video files are stored at the information point.

State one secondary storage device that could be used.

............................................................................................................................................. [1]

(d) The zoo decides to introduce Quick Response codes in different places in the zoo. These
provide further information about the animals.

Describe how customers obtain the information from the Quick Response codes.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/11/O/N/19 [Turn over


6

5 Sonia shares files with her friends. The method of data transmission she uses is half-duplex serial
transmission.

(a) Describe how data is transmitted using half-duplex serial data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The system uses parity bits to check for errors during data transmission.

The outcome of four bytes after transmission is:

Byte 1 Byte 2 Byte 3 Byte 4

00110011 01010100 10110100 01110111

One of the bytes has been transmitted incorrectly.

Identify the byte that was transmitted incorrectly.

Byte ...........................................................

Explain how you identified the byte that was transmitted incorrectly.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 0478/11/O/N/19


7

6 Ishan is a member of a software community that develops computer games. He has programmed
a new feature for one of the community’s existing games.

(a) Ishan compiles the program before he issues it to the community.

(i) Explain one benefit of Ishan compiling the program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain one drawback of Ishan compiling the program.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Ishan shares the program with community members over the Internet, using Secure Socket
Layer (SSL).

(i) Explain how Ishan will know he is on a secure website.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how an SSL connection is established.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 0478/11/O/N/19 [Turn over


8

(c) The community publishes completed games on the Internet as freeware.

Describe what is meant by freeware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) The program files for the games are compressed before they are published on the Internet.

(i) Describe one benefit of compressing the program files.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) State whether lossy or lossless compression should be used.

..................................................................................................................................... [1]

© UCLES 2019 0478/11/O/N/19


9

7 A factory manufactures plastic pipes. It uses logic circuits to control the manufacturing process.

(a) Consider the logic gate:

Input A
Output
Input B

Complete the truth table for this logic gate.

Input A Input B Output

0 0

0 1

1 0

1 1
[1]

(b) Consider the truth table:

Input A Input B Output

0 0 0

0 1 1

1 0 1

1 1 0

State the single logic gate that produces the given output.

............................................................................................................................................. [1]

© UCLES 2019 0478/11/O/N/19 [Turn over


10

(c) Plastic pipes of various sizes are manufactured by heating the plastic and using pressure.

The manufacturing system uses sensors to measure the pressure (P), temperature (T) and
speed (S) of production.

The inputs to the manufacturing system are:

Input Binary value Condition


1 pressure is > 5 bar
P
0 pressure is <= 5 bar
1 temperature is > 200 degrees Celsius
T
0 temperature is <= 200 degrees Celsius
1 speed is > 1 metre per second
S
0 speed is <= 1 metre per second

The system will sound an alarm (X) when certain conditions are detected.

The alarm will sound when:

Temperature is > 200 degrees Celsius and the pressure is <= 5 bar
or
Speed is > 1 metre per second and Temperature is <= 200 degrees Celsius

Draw a logic circuit to represent the above alarm system.

Logic gates used must have a maximum of two inputs.

T X

[5]
© UCLES 2019 0478/11/O/N/19
11

(d) Give two benefits of using sensors to monitor the manufacture of plastic pipes.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

8 Explain how an instruction is fetched in a Von Neumann model computer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

9 HTML can be used to create the structure and the presentation of web pages.

(a) Describe what is meant by HTML structure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0478/11/O/N/19 [Turn over


12

(b) Gloria writes a paragraph as an answer to an examination question about accessing a


website.

Use the list given to complete Gloria’s answer by inserting the correct four missing terms. Not
all terms will be used.

• browser
• cookies
• Hypertext Markup Language (HTML)
• hypertext transfer protocol (http)
• hypertext transfer protocol secure (https)
• Internet Protocol address (IP address)
• Media Access Control address (MAC address)
• web server

The user enters the URL of the website. The ............................................................... uses

the DNS server to look up the ............................................................... of the website.

The browser sends a request to the ............................................................... to obtain the

website files. The website files are sent as ............................................................... that is

interpreted by the browser.


[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/11/O/N/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/11


Paper 1 October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2019 Page 2 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range
may be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2019 Page 3 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

1(a) 2
Printer Statement

Can print in colour

Inkjet printer

Uses a charged drum to


create the printed item

Laser printer Uses powdered toner

Creates output line by line


using a print head
One mark for correct lines from inkjet
One mark for correct lines from laser

1(b) • Laser 1

1(c) Two from: 2


• Design is created on the computer / software / CAD
• Material is loaded to cutter
• Different types of material can be used
• Uses lasers to cut material «
• « that use infra-red
• « that produces extreme heat
• « that is focussed using a special lens
• Can work on both the x,y and z axis

© UCLES 2019 Page 4 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

2(a) One mark for each correct denary value 3

Binary Denary

0001001110 78

0110110111 439

1000000001 513

2(b) Two from: 2


• Uses fewer characters // shorter
• Easier to read / write / understand
• Less likely to make mistakes // less error prone
• Easier to debug

2(c) One mark for each correct hexadecimal value in correct order 3
2 B 5

© UCLES 2019 Page 5 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

3(a) Three from: 3


• Malicious software // type of malware
• Tracks / records keypresses // keylogger
• Sends data to third party
• Collected data is analysed to obtain data

3(b) One mark for identified method, one mark for how it prevents spyware: 2

Drop-down boxes // onscreen / virtual keyboard


• Means key logger cannot collect data

Only requires part of the password


• Hacker doesn’t get the full password

Two-step verification // Two-factor authentication


• Extra data is sent to device making it more difficult for hacker to obtain it
• Data has to be entered into the same system // if attempted from a remote location, it will not be accepted

Use a biometric device


• The person's biological data (e.g. their fingerprint) is also required

3(c) Four from: 4


• Monitors traffic coming into and out of the computer system
• Checks that the traffic meets any criteria / rules set
• Blocks any traffic that does not meet the criteria / rules set
• Allows a set blacklist / whitelist // can block certain IP addresses
• Can close certain ports

3(d) Two from: 2


• Passwords // biometrics
• Levels of access
• Proxy servers
• Physical security methods – e.g. PC’s in locked rooms, etc.

© UCLES 2019 Page 6 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

4(a) One from: 1


• Touch screen
• Keyboard
• Microphone
• Mouse

4(b) One from: 1


• Headphones
• Speakers
• Printer
• Light / LED

4(c) One from: 1


• HDD
• SSD
• USB drive

4(d) Four from: 4


• QR code is scanned using a camera on a mobile device «
• « and read / decoded using an application / software
• Illuminator shone on code
• Squares reflect light differently
• Corners of code are used for orientation
• Opens document with information // Directs to website with information
• QR code can be saved for future reference

© UCLES 2019 Page 7 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

5(a) • Data is sent down a single wire « 4


• « one bit at a time
• Data is sent in both directions «
• « but only one direction at a time

5(b) One mark for correct byte 4


(Byte) 2 // 01010100

Three from:
• Added up / counted the 1s / 0s
• Even parity used // 3 bytes are even
• Byte 2 uses odd parity // 1 byte is odd

© UCLES 2019 Page 8 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

6(a)(i) One from: 1


• Code will run without the need of an interpreter
• (Object) Code is platform independent
• Source code not available / cannot be modified

6(a)(ii) One from: 1


• Source code not available / cannot be modified
• Comments, etc. not visible
• Future changes will require code to be recompiled

6(b)(i) One from: 1


• Protocol is HTTPS
• Padlock icon is locked
• Can view website certificate

6(b)(ii) Five from: 5


• Browser / client sends request to webserver to request identification
• Web server sends its digital / security certificate
• Browser authenticates certificate «
• « if authentic connection, is established
• Any data sent is encrypted «
• « using public and private keys

6(c) Four from: 4


• A type of software licence
• Free of charge
• Normally distributed without the source code
• Can legally share / copy
• Cannot legally modify code
• Cannot resell

© UCLES 2019 Page 9 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

6(d)(i) Two from: 2


• File size is reduced «
• « so it uses less storage space
• « so faster transmission
• « so quicker to download

6(d)(ii) • Lossless 1

© UCLES 2019 Page 10 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

7(a) 1
Input A Input B Output

0 0 0

0 1 1

1 0 1

1 1 1

7(b) • Exclusive OR / XOR / EOR 1

7(c) One mark for each correct logic gate with correct inputs 5

7(d) Two from: 2


• Can work continuously
• Avoids human error
• It could be a dangerous environment and will avoid human risk
• Detect errors instantly
• Maintain consistent and correct conditions

© UCLES 2019 Page 11 of 12


0478/11 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED
Question Answer Marks

8 Six from: 6
• PC holds address of the instruction
• The address held in PC is sent to MAR «
• « using address bus
• MAR goes to location in memory where instruction is stored
• Instruction sent to MDR «
• « using data bus
• Instruction sent to CIR
• Control unit sends signals to manage the process «
• « using the control bus

9(a) Two from: 2


• Layout of the webpage
• e.g. where a paragraph is placed
• Defined using tags

9(b) One mark for each correct term in the correct order: 4
• browser
• IP address
• web server
• HTML

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 4 9 1 6 5 4 1 7 1 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages and 2 blank pages.

DC (SC/TP) 201739/3
© UCLES 2019 [Turn over
2

1 Computer memory size is measured in multiples of bytes.

Four statements about computer memory sizes are given in the table.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]

2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).

Identify four other components that are used in the Von Neumann model for a computer system.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................

4 .......................................................................................................................................................
[4]

3 The data from a sensor must be converted from analogue to digital to be processed by a computer.

(a) State what is meant by analogue data.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) State what is meant by digital data.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 0478/12/O/N/19


3

4 An 8-bit binary register contains the value:

0 0 1 1 0 1 0 0

(a) Convert the binary value to denary.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The contents of the register shifted one place to the right would give the result:

0 0 0 1 1 0 1 0

The contents of the register shown at the start of question 4 are shifted two places to the left.

Show the contents of the register after this shift has taken place.

[1]

(c) State the effect this shift has on the denary value in part (a).

...................................................................................................................................................

............................................................................................................................................. [1]

5 Audrey wants to send a sound file to Nico using email.

The file is too large to attach to an email so Audrey decides to compress the file.

She uses lossy compression to reduce the size of the sound file.

(a) Describe how lossy compression reduces the size of the sound file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/12/O/N/19 [Turn over


4

(b) Nico asks Audrey why she used lossy compression rather than lossless.

(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Audrey sometimes records MIDI files.

(i) Explain what is meant by a MIDI file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) MIDI uses serial data transmission.

Explain two advantages of using serial transmission rather than parallel transmission.

Advantage 1 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 2 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 0478/12/O/N/19
5

6 Touch screen technologies can be described as resistive or capacitive.

Six statements are given about resistive and capacitive technology.

Tick (✓) to show if the statement applies to Resistive or Capacitive technology.

Resistive Capacitive
Statement
(✓) (✓)
This touch screen has multi-touch capabilities
This touch screen cannot be used whilst wearing gloves
This touch screen is made up of two layers with a small
space in between
This touch screen uses the electrical properties of the
human body
This touch screen is normally cheaper to manufacture
This touch screen has a quicker response time
[6]

7 Gerald uses a keyboard to enter a website address into the address bar of his browser.

(a) Describe how Gerald’s key presses on his keyboard are processed by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/12/O/N/19 [Turn over


6

(b) State three functions of a browser.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(c) The website Gerald visits uses https.

Explain what is meant by https.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0478/12/O/N/19


7

8 Consider the logic circuit:

X
B

(a) Write a logic statement to match the given logic circuit.

............................................................................................................................................. [3]

(b) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 0478/12/O/N/19 [Turn over


8

9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.

(a) Five statements are given about duplex data transmission.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmission automatically detects any
errors in data
[5]

(b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends multiple
bits at the same time.

State whether the IC uses serial or parallel data transmission.

............................................................................................................................................. [1]

(c) Maisey purchases a new printer and connects it to her computer using the USB port.

Explain two benefits of using a USB connection.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 0478/12/O/N/19


9

10 Data is valuable to a company.

(a) Companies use error detection methods to make sure that data is accurate.

One error detection method is the use of a check digit.

Explain what is meant by a check digit and how it is used to detect errors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Companies can use a range of security methods to keep their data secure.

Identify two security methods that a company can use to keep their data secure and explain
how each method can keep the data secure.

Security method 1 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 2 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 0478/12/O/N/19 [Turn over


10

11 Robert has a mobile device that uses RAM, ROM and an SSD.

(a) State what the RAM, ROM and SSD are used for.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................

SSD ..........................................................................................................................................

...................................................................................................................................................
[3]

(b) Give two reasons why an SSD, rather than a HDD, is used in the mobile device.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 0478/12/O/N/19


11

BLANK PAGE

© UCLES 2019 0478/12/O/N/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/12/O/N/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/12


Paper 1 October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages.

© UCLES 2019 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific
content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking
principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope
of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question
as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors.

© UCLES 2019 Page 2 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be
limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade
descriptors in mind.

© UCLES 2019 Page 3 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1 One mark for each correct tick 4

Statement True False


(9) (9)

25 kB is larger than 100 MB 9

999 MB is larger than 50 GB 9

3500 kB is smaller than 2 GB 9

2350 bytes is smaller than 2 kB 9

© UCLES 2019 Page 4 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

2 Four from: 4
• Arithmetic and logic unit (ALU)
• Memory address register (MAR)
• Memory data register (MDR) // Memory buffer register (MBR)
• Accumulator (ACC)
• Immediate Access Store (IAS)
• Main memory // RAM
• Program counter (PC)
• Current instruction register (CIR)
• Address bus
• Data bus
• Control bus
• Input device
• Output device
• Secondary storage device

Question Answer Marks

3(a) One from: 1


• Continuous data // by description
• Non-discrete data // by description
• By example, e.g. data such as a sound wave

3(b) One from: 1


• Discrete data that has only two values
• By example, e.g. binary data / 1’s and 0’s

© UCLES 2019 Page 5 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

4(a) • 52 1

4(b) 1
1 1 0 1 0 0 0 0

4(c) • It is multiplied by 4 1

Question Answer Marks

5(a) Four from: 4


• A compression algorithm is used
• Discards any unnecessary sounds «
• « using perceptual musical shaping
• « such as removing background noise / sounds humans can’t hear // or other suitable example
• Reduces sample size / resolution // by example
• Reduces sample rate // by example
• Sound is clipped
• The data is permanently removed

5(b)(i) One from: 1


• The file size will be smaller than lossless
• Requires less storage space
• Requires less time to transmit

5(b)(ii) One from: 1


• The quality of the sound will be reduced
• The original file cannot be restored

© UCLES 2019 Page 6 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

5(c)(i) Four from: 4


• Musical Instrument Digital Interface file
• Stores a set of commands / instructions for how the sound should be played
• Does not store the actual sounds
• Data in the file has been recorded using digital instruments
• Specifies pitch of the note // specifies the note to be played
• Specifies when each note plays and stops playing // Specifies key on/off
• Specifies duration of the note
• Specifies volume of the note
• Specifies the tempo
• Specifies the type of instrument

5(c)(ii) Four from: 4


• It uses a single wire «
• « therefore, it is cheaper to manufacture / buy / install
• « therefore, less likely to have interference // no crosstalk
• « therefore, can be used over longer distances
• Data is sent a bit at a time «
• « therefore, less chance of data being skewed // data is received in order
• Transmission can be synchronised «
• « can reduce rate of errors

© UCLES 2019 Page 7 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

6 One mark for each correct tick 6

Resistive Capacitive
Statement
(9) (9)

This touch screen has multi-touch capabilities 9

This touch screen cannot be used whilst wearing gloves 9

This touch screen is made up of two layers with a small


9
space in between

This touch screen uses the electrical properties of the


9
human body

This touch screen is normally cheaper to manufacture 9

This touch screen has a quicker response time 9

© UCLES 2019 Page 8 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

7(a) Four from: 4


• Membrane / matrix / circuit board present at base of keys
• A key is pressed that presses a switch
• When a key is pressed it completes a circuit // changes the current in a circuit
• The location of the keypress is calculated
• An index of characters is searched to find the corresponding keypress
• Each character has an ASCII / Unicode value
• The ASCII / Unicode value has a binary value
• Keypress generates an interrupt
• Each character / keypress is added to a buffer to wait to be processed
• The binary can then be processed by the CPU to action the key press

7(b) Three from: 3


• Display a web page
• Sends a request to the web server
• Receives data from web server
• Translates HTML files
• Processes client-side script, e.g. JavaScript
• Store favourites
• Store history
• Navigation forward and backward
• Check security
• Store / access cookies
• Find specific text within a web page
• Downloading file from the web
• Allows a homepage
• Allows multiple tabs / web pages to be opened
• Stores data in its cache

© UCLES 2019 Page 9 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

7(c) Three from: 3


• Hypertext Transfer Protocol Secure // It is a protocol «
• « that is a set of rules/standards
• Secure version of HTTP
• Secure website // secures data
• Uses TLS / SSL
• Uses encryption

Question Answer Marks

8(a) • X = 1 if (A is 1 XOR C is 1) OR (B is 1 NAND C is NOT 1) 3


• X = (A XOR C) OR (B NAND NOTC)

One mark for each bullet:


• (A XOR C)
• OR
• (B NAND NOTC)

© UCLES 2019 Page 10 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

8(b) Four marks for 8 correct outputs 4


Three marks for 6 or 7 correct outputs
Two marks for 4 or 5 correct outputs
One mark for 2 or 3 correct outputs

A B C Working space X

0 0 0 1

0 0 1 1

0 1 0 0

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 1

© UCLES 2019 Page 11 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

9(a) One mark per each correct tick 5

True False
Statement
(9) (9)
Duplex data transmission can be either serial or
9
parallel
Duplex data transmission is when data is transmitted
9
both ways, but only one way at a time
Duplex data transmission is always used to connect a
9
device to a computer
Duplex data transmission is when data is transmitted
9
both ways at the same time
Duplex data transmission automatically detects any
9
errors in data

9(b) • Parallel data transmission 1

© UCLES 2019 Page 12 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

9(c) Four from (maximum two marks per benefit): 4


• It is a universal standard «
• « so it is likely to be compatible with the computer

• It can only be inserted one way «


• « so there is less chance of connecting a device incorrectly

• It is a high-speed connection «
• « so data will be transmitted quicker

• It uses serial transmission «


• « so it is cheaper to manufacture/buy
• « less chance of skewing / errors

• It doesn’t require a (wireless) network «


• « therefore, can be used if a network is down

• It is backwards compatible «
• « so no additional technology is needed

• It can power the device «


• « therefore no separate source of power is needed

• Drivers are automatically downloaded // device is automatically identified «


• « so no need to find them online / install them manually

© UCLES 2019 Page 13 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

10(a) Four from: 4


• Validation method
• Used to check data entry
• Digit is calculated from data // by example
• Digit is appended / added to data
• Digit is recalculated when data has been input
• Digits are compared
• If digits are different, error is detected // If digits match, no error is detected

10(b) Six from (maximum three marks per security method): 6


• Firewall «
• « Monitors the traffic
• « Blocks any traffic that doesn’t meet the criteria / rules

• (Strong) password // biometric «


• « Data cannot be accessed without the use of the password / bio data
• « Prevent brute force attacks

• Encryption «
• « Data will be scrambled
• « Key is required to decrypt the data
• « If data is stolen it will be meaningless

• Physical security methods «


• « The physical security will need to be overcome
• « This can help deter theft of the data

• Antispyware «
• « will remove any spyware from system
• « will prevent data being relayed to a third party

© UCLES 2019 Page 14 of 15


0478/12 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

11(a) RAM 3
• To store the data / instructions / parts of OS that are currently in use
ROM
• To store the firmware / bootup instructions / BIOS
SSD
• To store files / software // by example

11(b) Two from: 2


• It is more durable // it has no moving parts
• It has a faster read / write / access speed
• It is more compact / light weight / smaller / portable
• It uses less energy // battery will last longer
• It is quieter
• Not affected by magnetic forces
• It runs at a cooler temperature
• Less latency // takes less time to warm up

© UCLES 2019 Page 15 of 15


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 2 0 5 9 2 6 7 9 2 0 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

DC (PQ/TP) 173648/2
© UCLES 2019 [Turn over
2

1 A library has a system that allows customers to check out the books that they want to borrow.

Each book has a barcode that can be used to identify the book.

(a) (i) Identify two input devices that may be used in the library’s system.

Input device 1 ....................................................................................................................

Input device 2 ....................................................................................................................


[2]

(ii) Identify two storage devices that may be used in the library’s system.

Storage device 1 ...............................................................................................................

Storage device 2 ...............................................................................................................


[2]

(iii) Identify two output devices that may be used in the library’s system.

Output device 1 .................................................................................................................

Output device 2 .................................................................................................................


[2]

(b) The data stored by the library is archived at the end of each day. The archive is held on a
server in the library office.

The data is encrypted with an 8-bit key. As some of the data is confidential, the library wants
to make the encryption more secure.

(i) State how the library could make the encryption more secure.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) The term used to describe data before it is encrypted is plain text.

State the term used to describe encrypted data.

..................................................................................................................................... [1]

© UCLES 2019 0478/13/O/N/19


3

(iii) The library’s archive system uses an error detection and correction system that combines
a parity check with an automatic repeat request (ARQ).

Describe how this system uses the parity check and ARQ.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

(c) The library has a website that customers can use to search for a book.

(i) The website has a background colour with the hexadecimal colour code #F92A10

The colour code is stored in two 12-bit binary registers.

Show how the colour code would be stored in the registers.

F92

A10
[6]

© UCLES 2019 0478/13/O/N/19 [Turn over


4

(ii) Videos on the library website show customers which books the library will soon have
in stock.

The library wants the file size of a video to be as small as possible.

Identify and describe a method the library could use to reduce the file size of a video as
much as possible.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(d) The library often holds events that introduce new authors.

At the events, the library has a Liquid Crystal Display (LCD) screen that displays data,
including an image and information about the author.

Describe how an LCD screen operates to display this data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 0478/13/O/N/19


5

2 A programmer uses a high-level language to write a computer program.

(a) Four statements are given about high-level programming languages.

Tick (3) to show if each statement is True or False.

True False
Statement
(3) (3)
High-level languages need to be translated into machine code to run on a
computer
High-level languages are written using mnemonic codes
High-level languages are specific to the computer’s hardware
High-level languages are portable languages
[4]

(b) Tick (3) to show which of the following is an example of a high-level language program.

Tick
Example program
(3)
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
print("Correct")
else:
print("Incorrect")
[1]

© UCLES 2019 0478/13/O/N/19 [Turn over


6

3 Blair writes a paragraph about data transmission in her Computer Science examination.

Use the list given to complete Blair’s paragraph by inserting the correct five missing terms. Not all
terms will be used. Terms can be used more than once.

• duplex
• half-duplex
• parallel
• serial
• simplex

....................................................................... data transmission is when data is transmitted a

single bit at a time. ....................................................................... data transmission is when

multiple bits of data are sent all at once. If a user wants to transmit data over a long distance, with

the highest chance of accuracy, ....................................................................... data transmission

should be used. If data needs to be transmitted in one direction only, for example from a computer

to a printer, ....................................................................... data transmission should be used. If a

user has a large amount of data to transmit and this needs to be done as quickly as possible

....................................................................... data transmission should be used.


[5]

© UCLES 2019 0478/13/O/N/19


7

Question 4 starts on page 8.

© UCLES 2019 0478/13/O/N/19 [Turn over


8

4 A factory that manufactures cleaning products has a system that monitors conditions throughout
the manufacturing process.

The inputs to the system are:

Input Binary value Condition


1 pH > 7
A
0 pH < = 7
1 Temperature < 35 °C
T
0 Temperature > = 35 °C
1 Pressure > = 80 %
P
0 Pressure < 80 %

(a) The system will sound an alarm (X) when certain conditions are detected.

The alarm will sound when:

• The pressure > = 80 % and the temperature > = 35 °C

or

• The temperature < 35 °C and the pH > 7

Draw a logic circuit to represent the alarm system in the factory. Each logic gate must have a
maximum of two inputs.

T X

[4]

© UCLES 2019 0478/13/O/N/19


9

(b) Complete the truth table for the given logic problem.

Working space
A T P X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

(c) A sensor and a microprocessor are used to monitor the pH of the cleaning products. The
system records each reading that is taken. If the reading is greater than 7 a warning message
is displayed on a monitor.

Explain how the sensor and microprocessor are used in the system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0478/13/O/N/19 [Turn over


10

5 The contents of three binary registers have been transmitted from one computer to another. Odd
parity has been used as an error detection method.

The outcome after transmission is:

• Register A and Register B have been transmitted correctly.

• Register C has been transmitted incorrectly.

Write the appropriate Parity bit for each register to show the given outcome.

Parity
bit
Register A 0 1 0 0 0 1 1

Register B 0 0 0 0 1 1 1

Register C 0 0 0 0 0 1 1
[3]

6 Jesse is taking his Computer Science examination. He answers five questions about ethics.

(a) For the first question, he writes the answer:

“This type of software can be copied and shared without the permission of the owner.”

State what Jesse is describing.

............................................................................................................................................. [1]

(b) For the second question, he writes the answer:

“With this type of software, the owner still retains the copyright for the software, but he gives
away copies of it for free.”

State what Jesse is describing.

............................................................................................................................................. [1]

(c) For the third question, he writes the answer:

“This type of software is often a trial version of the full software. To use the full version the
user normally needs to pay a fee.”

State what Jesse is describing.

............................................................................................................................................. [1]

© UCLES 2019 0478/13/O/N/19


11

(d) For the fourth question, he writes the answer:

“This is when a person copies another person’s computer program and tries to claim it as his
own.”

State what Jesse is describing.

............................................................................................................................................. [1]

(e) For the fifth question, he writes the answer:

“This is the legal protection that a person can obtain, to provide protection against his work
being stolen.”

State what Jesse is describing.

............................................................................................................................................. [1]

7 The Von Neumann model for a computer system has several components that are used in the
fetch-execute cycle.

(a) One component is main memory.

(i) Describe what is meant by main memory and how it is used in the Von Neumann model
for a computer system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) State two other components in the Von Neumann model for a computer system.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 0478/13/O/N/19 [Turn over


12

(b) Computer systems often use interrupts.

Five statements are given about interrupts.

Tick (3) to show if each statement is True or False.

True False
Statement
(3) (3)
Interrupts can be hardware based or software based
Interrupts are handled by the operating system
Interrupts allow a computer to multitask
Interrupts work out which program to give priority to
Interrupts are vital to a computer and it cannot function without them
[5]

8 A company discovers malware on its network.

Explain two ways that the malware could have been introduced to the company’s network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/13/O/N/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

COMPUTER SCIENCE 0478/13


Paper 1 October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages.

© UCLES 2019 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific
content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking
principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope
of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question
as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors.

© UCLES 2019 Page 2 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be
limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade
descriptors in mind.

© UCLES 2019 Page 3 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(a)(i) Two from: 2


• 2D scanner
• Touchscreen
• Keypad/keyboard
• Card reader
• Mouse
• Digital camera

1(a)(ii) Two from: 2


• HDD
• SSD
• USB flash memory drive
• SD card
• Any optical

1(a)(iii) Two from: 2


• Monitor/Touch screen
• Speaker
• Printer
• LED // Light

1(b)(i) • Increase the length of the key // make key 12-bit, etc. 1

1(b)(ii) • Cypher text 1

© UCLES 2019 Page 4 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(b)(iii) Six from: 6


• The system could use odd or even parity
• A parity bit is added
• The data is checked to see if it has incorrect/correct parity // by example

• If parity is correct no error is found


• An acknowledgement is sent that data is received correctly
• The next packet of data is transmitted

• If incorrect parity is found an error has occurred


• A signal is sent back to request the data is resent
• The data is resent until data is received correctly/timeout occurs

1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0

1 mark 1 mark 1 mark

1 0 1 0 0 0 0 1 0 0 0 0

1 mark 1 mark 1 mark

© UCLES 2019 Page 5 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(c)(ii) One mark for identification: 4


• Compression

Three from e.g.:


• Best compression would be lossy
• Use compression algorithm
• This would remove all the unnecessary data from the file // removes detail/sound that the human eye/ear may not see/hear
• Reduce colour palette «
• « so each pixel requires fewer bits
• Reduce resolution
• Only store what changes between frames // temporal redundancy

1(d) Five from: 5


• The display is made up of pixels «
• « that are arranged together as a matrix
• Each pixel has three filters, red, blue and green
• Shades of colour are achieved by mixing red, blue and green
• The screen is backlit
• Light is shone through the liquid crystals
• The liquid crystals can be made to turn solid or transparent/on or off «
• « by changing the shape of the crystal

© UCLES 2019 Page 6 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

2(a) One mark for each correct row 4

True False
Statement
(9) (9)

High-level languages need to be translated into machine code to run on a 9


computer

High-level languages are written using mnemonic codes 9

High-level languages are specific to the computer’s hardware 9

High-level languages are portable languages 9

© UCLES 2019 Page 7 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

2(b) One mark for the correct tick 1

Example program Tick


(9)

1011100000110000
0000011011100010

INP
STA ONE
INP
STA TWO
ADD ONE

a = input()
b = input()
if a == b:
9
print("Correct")
else:
print("Incorrect")

Question Answer Marks

3 One mark for each correct term in the correct order 5


• Serial
• Parallel
• Serial
• Simplex
• Parallel

© UCLES 2019 Page 8 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

4(a) One mark for each correct logic gate with correct input(s) 4

© UCLES 2019 Page 9 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

4(b) Four mark for 8 correct outputs 4


Three marks for 6 or 7 correct outputs
Two mark for 4 or 5 correct outputs
One mark for 2 or 3 correct outputs

A T P Working space X

0 0 0 0

0 0 1 1

0 1 0 0

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 1

4(c) Six from: 6


• Sensor sends a signal/reading/data to the microprocessor
• Signal/reading/data is analogue and is converted to digital using ADC
• Reading/data is stored in the system
• Microprocessor compares data/reading to the pre-set value of 7
• If value is greater than 7 «
• « a signal/data is sent by the microprocessor to display a warning message on a monitor
• The process is continuous

© UCLES 2019 Page 10 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

5 One mark for each correct parity bit 3

Parity
bit
Register A 0 0 1 0 0 0 1 1

Register B 0 0 0 0 0 1 1 1

Register C 0 0 0 0 0 0 1 1

Question Answer Marks

6(a) • Free software 1

6(b) • Freeware 1

6(c) • Shareware 1

6(d) • Plagiarism // Intellectual property theft 1

6(e) • Copyright 1

© UCLES 2019 Page 11 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

7(a)(i) Three from: 3


• RAM
• Primary memory
• Volatile memory
• Holds currently in use data/instructions
• Directly accessed by the CPU

7(a)(ii) Two from: 2


• Arithmetic and logic unit (ALU)
• Memory address register (MAR)
• Memory data register (MDR) // Memory buffer register (MBR)
• Accumulator (ACC)
• Immediate Access Store (IAS)
• Control Unit (CU)
• Program counter (PC)
• Current instruction register (CIR)
• Address bus
• Data bus
• Control bus
• Input device
• Output device
• Secondary storage device

© UCLES 2019 Page 12 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

7(b) One mark for each correct row 5

True False
Statement
(9) (9)

Interrupts can be hardware based or software based 9

Interrupts are handled by the operating system 9

Interrupts allow a computer to multitask 9

Interrupts work out which program to give priority to 9

Interrupts are vital to a computer and it cannot function without them 9

© UCLES 2019 Page 13 of 14


0478/13 Cambridge IGCSE – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

8 Four from: 4
• A hacker could have hacked the network «
• « and downloaded the malware onto the network

• Clicking a link/attachment/downloaded a file from an email/on a webpage «


• « the malware could have been embedded into the link/attachment/file

• Opening an infected software package «


• « this would trigger the malware to download onto the network

• Inserting an infected portable storage device «


• « when the drive is accessed the malware is downloaded to the network

• Firewall has been turned off «


• « so malware would not be detected/checked for when entering network

• Anti-malware has been turned off «


• « so malware is not detected/checked for when files are downloaded

© UCLES 2019 Page 14 of 14


Cambridge IGCSE™
* 9 1 1 9 7 5 8 2 3 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (CE/SW) 189019/3
© UCLES 2020 [Turn over
2

1 A Von Neumann model for a computer system has a central processing unit (CPU) that makes
use of registers.

(a) Identify three registers that may be used.

Register 1 .................................................................................................................................

Register 2 .................................................................................................................................

Register 3 .................................................................................................................................
[3]

(b) The CPU is responsible for processing instructions.

One stage of processing instructions is the decode stage.

(i) Identify the two other stages of processing instructions.

Stage 1 ..............................................................................................................................

Stage 2 ..............................................................................................................................
[2]

(ii) Identify the component of the CPU that is responsible for decoding instructions.

..................................................................................................................................... [1]

2 Both an interpreter and a compiler can be used when writing a program in a high-level language.

(a) Explain why a programmer would make use of both an interpreter and a compiler.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0478/12/M/J/20


3

(b) Give three reasons why a programmer would choose to write a program in a high-level
language, instead of a low-level language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

Reason 3 ..................................................................................................................................

...................................................................................................................................................
[3]

3 A company collects and stores data about its customers. The data is stored on a server in the
company’s office.

The data is transmitted to cloud storage to create a back-up.

The data is encrypted using symmetric encryption before it is sent to the cloud storage.

(a) Describe how the data is encrypted.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Give three other methods that can be used to secure the data in the office.

Method 1 ...................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

Method 3 ...................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2020 0478/12/M/J/20 [Turn over
4

4 (a) Identify the name and draw the single logic gate that can replace the given logic circuits.

(i)
A
X
B

Name of gate: …………………………… Drawing of gate:

[2]

(ii)
A
X
B

Name of gate: …………………………… Drawing of gate:

[2]

(b) Complete the truth table for the given logic statement:

X = (((A OR C) AND (NOT A AND NOT C)) XOR B)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 0478/12/M/J/20


5

5 Meena uses a browser to research information for her business.

(a) Give three functions of a browser.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Meena buys products for her business using the Internet.

The Transport Layer Security (TLS) protocol is used for transferring data when she buys
products.

One layer of the TLS protocol is the handshake layer.

(i) Describe the purpose of the handshake layer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify the other layer of the TLS protocol.

..................................................................................................................................... [1]

(iii) Identify another protocol that can be used to transfer data securely.

..................................................................................................................................... [1]

(c) Meena visits a website to buy products for her business.

The browser uses a small file to store the details of the products she views. This allows the
website to display advertisements for other products she may like.

The small file also stores her log-in details.

Give the name of this type of file.

............................................................................................................................................. [1]

© UCLES 2020 0478/12/M/J/20 [Turn over


6

6 Six statements are given about touch screen technology.

Tick (3) to show if the statement applies to Capacitive or Resistive touch screen technology.

Capacitive Resistive
Statement
(3) (3)

Needs pressure to be applied to create a circuit

May not register a touch if the user is wearing gloves

More commonly used in smartphones

More responsive to a touch

Needs an electrical field to be changed to register a touch

Cheaper to manufacture

[6]

© UCLES 2020 0478/12/M/J/20


7

7 (a) Give the denary value of each of the three 12-bit binary values.

(i) 000000001100

..................................................................................................................................... [1]

(ii) 000011000110

..................................................................................................................................... [1]

(iii) 010011000001

..................................................................................................................................... [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) 12-bit binary values can also be represented as hexadecimal values.

Give the hexadecimal value of the 12-bit binary value.

000011101001

............................................................................................................................................. [3]

© UCLES 2020 0478/12/M/J/20 [Turn over


8

8 Leonard has a new laser printer to print letters for his business.

Leonard connects his printer to his computer using the USB port.

(a) Give three benefits of using the USB port to connect the printer to the computer.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

(b) State two benefits and one drawback of Leonard using a laser printer, instead of an inkjet
printer, to print the letters.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[3]

(c) An interrupt signal is sent from the printer to the computer.

(i) Give two examples of when a printer would generate an interrupt signal.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

(ii) Many devices send interrupt signals.

Identify the software in the computer that will receive and manage all interrupt signals.

..................................................................................................................................... [1]

© UCLES 2020 0478/12/M/J/20


9

9 (a) Six statements are given about storage devices.

Tick (3) to show if the statement applies to hard disk drive (HDD) storage or
solid state drive (SSD) storage.

Some statements can apply to both.

HDD SSD
Statement
(3) (3)

It has a limited number of read/write cycles

It uses magnetic properties to store data

It has moving parts

It is non-volatile storage

It can be used as an external storage device to back up data

It uses flash memory to store data

[6]

(b) Optical storage is another type of storage.

Give two examples of optical storage.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................
[2]

© UCLES 2020 0478/12/M/J/20 [Turn over


10

10 Uma is concerned about risks that she may encounter when using the Internet.

Two of the risks she is concerned about are phishing and pharming.

(a) Give one similarity and two differences between phishing and pharming.

Similarity ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 1 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) Identify two other risks that Uma could encounter when using the Internet.

Risk 1 ........................................................................................................................................

Risk 2 ........................................................................................................................................
[2]

© UCLES 2020 0478/12/M/J/20


11

(c) Uma uses a firewall to secure the data on her computer.

(i) Uma tells her friend that a firewall can only be software-based.

Tick (3) to show whether Uma is Correct or Incorrect.

Correct

Incorrect
[1]

(ii) Describe how the firewall helps to keep Uma’s data secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 0478/12/M/J/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/12/M/J/20


Cambridge IGCSE™

COMPUTER SCIENCE 0478/12


Paper 1 May/June 2020
MARK SCHEME
Maximum Mark: 75

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

1(a) Any three from: 3


− MAR
− MDR // MBR
− PC // IAR // NIR // SCR
− ACC
− CIR // IR
− IAS

1(b)(i) − Fetch 2
− Execute

1(b)(ii) − Control unit 1

Question Answer Marks

2(a) Any four from: 4


− To translate the high-level language into low-level language
− Interpreter used whilst writing the program
− Interpreter used to debug code line by line
− Compiler used when program completed
− Compiler used to create separate executable file (so compiler no longer needed)
− If it runs first time in a compiler there are no syntax errors

2(b) Any three from: 3


− Easier to understand // Don’t know assembly code
− Easier to debug
− Easier to maintain
− Portable
− Knowledge of manipulating memory locations/registers not required
− Can use an IDE
− Greater range of languages

© UCLES 2020 Page 4 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

3(a) Any four from: 4


− Encryption key is used
− Encryption algorithm is used
− Encryption key / algorithm is applied to plain text
− … to convert it into cypher text
− Same key is used to encrypt and decrypt the text

3(b) Any three from: 3


− Firewall
− Password
− Proxy server
− Physical methods (by example e.g. CCTV, Locks)
− Access rights
− Asymmetric encryption
− Disconnect from network

Question Answer Marks

4(a)(i) − NAND 2

4(a)(ii) − NOR 2

© UCLES 2020 Page 5 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

4(b) 4
A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 1
4 marks for 8 correct outputs
3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs

Question Answer Marks

5(a) Any three from: 3


− Convert HTML code
− Display web pages
− Check if a website is secure
− Request web pages from a web server
− Send URL/domain name
− Runs active script
− Store history/favourites/bookmarks
− Create tabs

© UCLES 2020 Page 6 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

5(b)(i) − Carries out authentication of server and client 2


− Handles encryption algorithms / keys

5(b)(ii) − Record layer 1

5(b)(iii) Any one from: 1


− SSL
− HTTPS

5(c) − Cookies 1

Question Answer Marks

6 6
Capacitive Resistive
Statement
() ()

Needs pressure to be applied to create a circuit 

May not register a touch if the user is wearing



gloves

More commonly used in smartphones 

More responsive to a touch 

Needs an electrical field to be changed to



register a touch

Cheaper to manufacture 

One mark per correct tick

© UCLES 2020 Page 7 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

7(a)(i) − 12 (ignore leading zeros) 1

7(a)(ii) − 198 (ignore leading zeros) 1

7(a)(iii) − 1217 1

7(b) One mark per each correct hex value in correct order 3
− 0E9

Question Answer Marks

8(a) Any three from: 3


− It is a universal standard
− It can’t be inserted the wrong way around
− Supports different transmission speeds
− Automatically detects if correct driver installed

8(b) Two marks for benefits, one mark for drawback 3


Benefits:
− Faster speed of printing
− Can print duplex / on both sides
− Many letters can be printed from one toner cartridge
− Can print in high volumes
Drawback
− Toner cartridge more expensive to buy
− More time to warm-up
− Larger footprint

© UCLES 2020 Page 8 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

8(c)(i) Any two from: 2


− Paper jam
− Out of paper
− Out of toner/ink
− Buffer full
− Awaiting input
− Print complete
− Printer ready

Award any other valid example

8(c)(ii) Any one from: 1


− Operating system
− Interrupt handler
− Interrupt service routine

Question Answer Marks

9(a) 6
HDD SSD
Statement
() ()

It has a limited number of read/write cycles 

It uses magnetic properties to store data 

It has moving parts 

It is non-volatile storage  

It can be used as an external storage device to back-up data  

It uses flash memory to store data 

© UCLES 2020 Page 9 of 10


0478/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

9(b) Any two from: 2


− CD (drive)
− DVD (drive)
− Blu-ray (drive)

Question Answer Marks

10(a) One mark for similarity, two marks for differences 3


Similarity:
− Both are designed to steal personal data
− They both pose as a real company/person
Differences:
− Pharming uses malicious code installed on hard drive
− Phishing is in form of an email
− Phishing requires use to follow a link / open an attachment

10(b) − Virus 2
− Malware

10(c)(i) − Incorrect 1

10(c)(ii) Any four from: 4


− Can help prevent hacking
− Can monitor incoming and outgoing traffic
− Can set criteria / rules are set for traffic
− Can check whether traffic meets / defies criteria rules
− Can rejects any traffic that does not meet / defies criteria

© UCLES 2020 Page 10 of 10


Cambridge IGCSE™
* 4 1 2 4 5 5 1 0 3 7 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (JC/CT) 186484/3
© UCLES 2020 [Turn over
2

1 Pradeep is reading hexadecimal values for a project he is working on.

(a) The first three hexadecimal values he reads are 15, 102 and A9.

Give the denary values for the three hexadecimal values.

15 ..............................................................................................................................................

102 ............................................................................................................................................

A9 .............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Pradeep has two 8-bit binary values that he needs to convert to hexadecimal values for his
project.

Give the hexadecimal values for the two 8-bit binary values.

01010000 ..................................................................................................................................

00111101 ..................................................................................................................................
[4]

© UCLES 2020 0478/13/M/J/20


3

2 (a) Six hardware devices are shown.

Tick (✓) to show if each hardware device is an Input, Output or Storage device.

Input Output Storage


Hardware device
(✓) (✓) (✓)
Solid state drive (SSD)
Sensor
Headphones
Microphone
USB flash drive
Actuator
[6]

(b) Genevieve writes a paragraph about a barcode reader.

Using the list given, complete the paragraph. Not all terms in the list need to be used.

• actuators
• binary
• black
• input
• microprocessors
• output
• sensors
• storage
• white

A barcode reader is an ............................................... device. It shines a light at the barcode

and the light is reflected back. The ............................................... bars in the barcode reflect

less light than the ............................................... bars.

............................................... are used to capture the amount of reflected light and the

different reflections are converted to ............................................... values.


[5]

© UCLES 2020 0478/13/M/J/20 [Turn over


4

3 Thomas has an online business that sells homemade furniture. He has a web server that hosts his
website for his business.

(a) Describe the role of a web browser in requesting and displaying the web pages for the
website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Thomas is worried about a denial of service (DoS) attack on his web server.

Describe what happens in a denial of service attack.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0478/13/M/J/20


5

4 The table shows four definitions.

Complete the table giving the missing Term for each definition.

Term Definition

A data transmission method that sends data


one bit at a time, down a single wire

An address given to a device on a network.


The address is assigned by the network

The software used to render HTML and display


a web page

An address given to a device at the


manufacturing stage that can be used to
identify the device on a network
[4]

© UCLES 2020 0478/13/M/J/20 [Turn over


6

5 (a) A clothing shop uses a barcode reader at the checkout.

The checkout is linked to a stock control system. The system monitors stock levels and
automatically keeps them above a minimum level.

Explain how the stock control system automatically keeps the stock levels above a minimum
level.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The software for the stock control system is stored on a central computer. The computer uses
random access memory (RAM), read only memory (ROM) and a hard disk drive (HDD).

The computer is a Von Neumann model computer system with a central processing
unit (CPU).

(i) State the purpose of the RAM, ROM and HDD in the central computer.

RAM ..................................................................................................................................

...........................................................................................................................................

ROM ..................................................................................................................................

...........................................................................................................................................

HDD ..................................................................................................................................

...........................................................................................................................................
[3]

(ii) Identify four components that are part of the CPU.

Component 1 .....................................................................................................................

Component 2 .....................................................................................................................

Component 3 .....................................................................................................................

Component 4 .....................................................................................................................
[4]

© UCLES 2020 0478/13/M/J/20


7

6 Consider the given logic statement:

X = (((A XOR B) AND C) OR NOT C)

(a) Draw a logic circuit to match the given logic statement.

All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.

B X

[4]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

© UCLES 2020 0478/13/M/J/20 [Turn over


8

7 Edie uses a firewall to help prevent her children from accessing websites that she does not want
them to see.

(a) Describe how the firewall helps prevent her children from accessing these websites.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Edie is concerned that her children may download a virus when accessing websites.

State what is meant by a virus and explain what could happen if a virus was downloaded.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Edie explains to her children how to identify if a website is secure.

(i) Give two ways that her children can identify if a website is secure.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2020 0478/13/M/J/20


9

(ii) Describe how a browser checks that a website is secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

8 Six statements are given about printers.

Tick (✓) to show whether the statement applies to a 3D printer, an Inkjet printer or a Laser printer.

Some statements apply to more than one printer.

3D Inkjet Laser
Statement
(✓) (✓) (✓)
Uses a moving print head
Uses liquid ink
Produces output using materials such as plastic and resin
Uses piezoelectric or thermal technology
Uses a rotating drum to transfer the image to the paper
Uses layer upon layer of material to create the output
[6]

© UCLES 2020 0478/13/M/J/20 [Turn over


10

9 Four 7-bit binary values are being transmitted from one computer to another. An odd parity check
is being used to check for errors in the binary values.

Write the correct Parity bit for each 7-bit binary value to make sure it meets odd parity.

Parity bit 7-bit binary value

..................... 0000011

..................... 1000000

..................... 0111111

..................... 1010101
[4]

10 Clive has a laptop computer that he uses for his business. He enters a username and password to
log in to his laptop.

Clive is worried about spyware being used to find out his username and password.

(a) Describe how spyware could be used to find out Clive’s username and password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The threat of spyware makes Clive concerned about typing a password to log in to his laptop.

Give an example of how Clive could log in securely without typing a password.

............................................................................................................................................. [1]

© UCLES 2020 0478/13/M/J/20


11

BLANK PAGE

© UCLES 2020 0478/13/M/J/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/13/M/J/20


Cambridge IGCSE™

COMPUTER SCIENCE 0478/13


Paper 1 May/June 2020
MARK SCHEME
Maximum Mark: 75

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

1(a) − 21 3
− 258
− 169

1(b) 1 mark for each correct hex value 4


− 50
− 3D

Question Answer Marks

2(a) 6
Input Output Storage
Hardware device
() () ()

Solid state drive (SSD) 

Sensor 

Headphones 

Microphone 

USB flash drive 

Actuator 

One mark for each correct tick

© UCLES 2020 Page 4 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

2(b) − Input 5
− Black
− White
− Sensors
− Binary

One mark for each correct term in the correct place

Question Answer Marks

3(a) Any three from: 3


− Sends request to webserver
− Receives web pages back from webserver
− Converts HTML to display web page
− Manages protocols

3(b) Any three from: 3


− Many requests are sent from a computer
− Requests are sent to the webserver
− The webserver becomes flooded with traffic
− The webserver cannot handle the requests / fails
− The website can no longer be accessed
− Attack maybe distributed

Question Answer Marks

4 − Serial (ignore any ref to simplex etc.) 4


− IP (address)
− Browser
− MAC (address)

© UCLES 2020 Page 5 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

5(a) Any four from: 4


− Stock control system has a database of stock
− Each product has a (unique) barcode
− Barcode is scanned, and product looked up in database
− Stock levels for product are reduced (by 1)
− Stock is checked against minimum level
− If stock at/below minimum level an order is placed
− When stock is re-ordered flag is reset

5(b) − It has RAM to store the data / programs / by example currently in use 3
− It has ROM to permanently store the boot up instructions
− It has HDD to store the stock database / software / OS / by example

5(c) Any four from: 4


− MAR
− MDR
− PC
− ALU
− CU
− ACC
− CIR
− Buses
− Registers

© UCLES 2020 Page 6 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

6(a) 4
A

B X

One mark for each correct gate.

© UCLES 2020 Page 7 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

6(b) 4
A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0

Question Answer Marks

7(a) Any four from: 4


− Examines outgoing traffic to check what is being requested
− Examines incoming traffic to check the content of what is being received
− Sets rules/criteria for websites that can/cannot be accessed // creates a blacklist
− Check if traffic meets/does not meet rules/criteria
− If it does/does not, access to website granted/denied

7(b) Any three from: 3


− Software that can replicate itself
− It could cause the computer to crash / run slow / generate errors
− It could delete/damage files
− It could fill up the storage space
− It could stop the hardware being able to communicate
− It could spread to other devices on the network
© UCLES 2020 Page 8 of 10
0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

7(c)(i) Any two from: 2


− Locked padlock
− HTTPS
− View the certificate

7(c)(ii) Any four from: 4


− requests web server to identify itself/view the (SSL) certificate
− receives a copy of the (SSL) certificate, sent from the webserver
− checks if (SSL) certificate is authentic/trustworthy
− sends signal back to webserver that the certificate is authentic/trustworthy
− starts to transmit data once connection is established as secure

Question Answer Marks

8 6
3D Inkjet Laser
Statement
() () ()

Uses a moving print head  

Uses liquid ink 

Produces output using materials such as plastic and resin 

Uses piezoelectric or thermal technology () 

Uses a rotating drum to transfer the image to the paper 

Uses layer upon layer of material to create the output 


One mark per each correct row.

© UCLES 2020 Page 9 of 10


0478/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

9 − 1 4
− 0
− 1
− 1

Question Answer Marks

10(a) Any four from: 4


− Example of spyware e.g. Keylogger is used
− Spyware is downloaded without knowledge (by example)
− Spyware records key presses / screen clicks / screen activity
− Data is relayed back to third party
− Data is analysed // Patterns in data could reveal log-in details …
− … details can then be used to log into the laptop (remotely)

10(b) − Biometric device 1


− Two step authentication

© UCLES 2020 Page 10 of 10


Cambridge IGCSE™
* 4 1 9 2 4 0 4 4 3 3 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory October/November 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (LK) 186555/3
© UCLES 2020 [Turn over
2

1 Six devices are shown.

Tick (3) to show if each device is an Input, Output or Storage device.

Input Output Storage


Device
(3) (3) (3)

Keyboard

Sensor

3D cutter

2D scanner

Microphone

Hard disk drive (HDD)


[6]

2 Ron is attending a music concert. He has bought three tickets.

Each ticket number is displayed as a hexadecimal number.

(a) Complete the table to show the 12-bit binary values and the Denary values for each
Hexadecimal ticket number.

Hexadecimal 12-bit binary value Denary value


ticket number

028

1A9

20C
[6]

Working space

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2020 0478/11/O/N/20


3

(b) Each ticket also has a QR code. The QR code is scanned at the entrance to the venue.

A person can only enter the venue with a valid QR code that allows entry.

When a person enters, a count is incremented to show how many people have entered the
venue.

Explain how the system scans the QR code, checks if a person can enter and counts how
many people have entered.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

3 Transport Layer Security (TLS) protocol is used to secure the transmission of data over the
Internet.

(a) Identify the two layers in the TLS protocol.

Layer 1 ......................................................................................................................................

Layer 2 ......................................................................................................................................
[2]

© UCLES 2020 0478/11/O/N/20 [Turn over


4

(b) The following paragraph explains how data is sent securely using the TLS protocol.

Use the terms to complete the paragraph. Not all terms may need to be used.

• authentic
• binary
• browser
• certificate
• internet service provider
• signal
• web page
• web server
• website

The browser requests the .................................................................... to identify itself

by providing its .................................................................... . This is sent and a check

is performed to see if it is .................................................................... . If it is, the

................................................................... sends a ...................................................................

back to the web server and data transmission begins.


[5]

(c) Identify one other protocol that can be used to secure data transmission over the Internet.

............................................................................................................................................. [1]

© UCLES 2020 0478/11/O/N/20


5

Question 4 starts on page 6.

© UCLES 2020 0478/11/O/N/20 [Turn over


6

4 Consider the given logic statement:

X = ((NOT (A NAND B)) OR (B NOR C))

(a) Draw a logic circuit to represent the given logic statement.

All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.

B X

[4]

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 0478/11/O/N/20


7

(c) The logic statement given has four different logic gates.

Identify two other logic gates and complete a truth table for each.

Logic gate Truth table


A B X

...................................... 0 0

0 1

1 0

1 1

Logic gate Truth table


A B X

...................................... 0 0

0 1

1 0

1 1
[4]

5 Luke is creating a website for his t-shirt design business.

(a) He is using HTML to create the website. HTML can be separated into structure and
presentation.

(i) Give two examples of HTML structure.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

(ii) Give two examples of HTML presentation.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

© UCLES 2020 0478/11/O/N/20 [Turn over


8

(b) Luke is concerned that his web server may be hacked or subjected to a denial of service
(DoS) attack.

State two security methods that Luke could use to help protect the web server from hacking
or a DoS attack.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................
[2]

6 A Von Neumann model for a computer system contains several integrated circuits (IC).

(a) Parallel data transmission is used in an IC.

(i) Describe how data is transmitted using parallel data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give one benefit of using parallel, rather than serial, data transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) The computer has a central processing unit (CPU).

(i) Identify the bus that carries signals around the CPU to control the components.

..................................................................................................................................... [1]

(ii) Identify the register built into the arithmetic logic unit (ALU).

..................................................................................................................................... [1]

© UCLES 2020 0478/11/O/N/20


9

(iii) Four statements about a Von Neumann model for a computer system are shown.

Tick (3) to show if each statement is True or False.

True False
Statement
(3) (3)

Data and instructions are stored in the same memory unit

The control unit manages operations within the CPU

Data and instructions can be fetched into the CPU at the same time

The control unit is responsible for decoding an instruction

[4]

7 Nina is recording some music tracks that she has written. She is researching whether she should
record them in MIDI or MP3 format.

Explain what is meant by MIDI and MP3 format.

MIDI ..................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

MP3 ..................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2020 0478/11/O/N/20 [Turn over


10

8 Matthew is buying a new television with a display that uses LED technology.

(a) Explain what is meant by LED technology.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) State three benefits of LED technology.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

(c) Identify one other technology that could have been used for the display.

............................................................................................................................................. [1]

9 Victoria is entering data into a computer system. The data will be transmitted to cloud storage.

(a) An even parity check is used to check for errors in the binary values after transmission.

For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met.

7-bit binary value Parity bit

1100010 ......................

1001011 ......................

0100010 ......................

0010111 ......................
[4]

© UCLES 2020 0478/11/O/N/20


11

(b) Identify two other error checking methods that could be used to check the binary values are
correct after transmission.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................
[2]

(c) A check digit is used to check whether data is correct when entered into the system.

Describe how a check digit can be used to make sure the data entered is correct.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0478/11/O/N/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/11/O/N/20


Cambridge IGCSE™

COMPUTER SCIENCE 0478/11


Paper 1 October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 11 printed pages.

© UCLES 2020 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1 One mark per each correct row: 6

Input Output Storage


Device
() () ()

Keyboard 

Sensor 

3D Cutter 

2D Scanner 

Microphone 

Hard disk drive (HDD) 

Question Answer Marks

2(a) One mark for each correct binary conversion 6


One mark for each correct denary conversion

Hexadecimal 12-bit binary value Denary value


ticket number

028 0000 0010 1000 40

1A9 0001 1010 1001 425

20C 0010 0000 1100 524

© UCLES 2020 Page 4 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

2(b) Seven from: 7


− Camera captures code // Laser/light shone on code
− Black squares reflect different light to white
− Corner squares are used for alignment
− Pattern converted to digital data // by example
− (Digital) data sent to microprocessor
− There is a database of valid QR codes
− Data compared to stored values/valid QR codes …
− … If data matches entry is granted is raised
− … If data matches count is incremented
− … If data does not match, entry is denied

Question Answer Marks

3(a) − Handshake 2
− Record

3(b) 5
− Web server
− Certificate
− Authentic
− Browser
− Signal

3(c) Any one from: 1


− SSL
− HTTPS

© UCLES 2020 Page 5 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(a) 4

One mark for each correct gate with correct input

© UCLES 2020 Page 6 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(b) Four marks for 8 correct outputs 4


Three marks for 6/7 correct outputs
Two marks for 4/5 correct outputs
One mark for 2/3 correct outputs

A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 0

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 1

1 1 1 1

© UCLES 2020 Page 7 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(c) One mark for the correct gate and one mark for the correct truth table 4

− AND
A B X

0 0 0

0 1 0

1 0 0

1 1 1

− XOR
A B X

0 0 0

0 1 1

1 0 1

1 1 0

Question Answer Marks

5(a)(i) − Two valid examples of Structure e.g. where text is placed, margins of page 2

5(a)(ii) − Two valid examples of Presentation e.g. font size, font colour 2

5(b) − Firewall 2
− Proxy server

© UCLES 2020 Page 8 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

6(a)(i) − Uses multiple wires 2


− Sends multiple bits of data at a time

6(a)(ii) − Faster transmission speed 1

6(b)(i) − Control (bus) 1

6(b)(ii) − Accumulator (ACC) 1

6(b)(iii) 4
True False
Statement
() ()

Data and instructions are stored in the same memory unit 

The control unit manages operations within the CPU 

Data and instructions can be fetched into the CPU at the same time 

The control unit is responsible for decoding an instruction 

© UCLES 2020 Page 9 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

7 Four from (Max two per format): 4

MIDI
− Musical Instrument Digital Interface (file)
− Stores a set of commands/instructions (for how the sound should be played)
− Does not store the actual sounds
− Data in the file has been recorded using digital instruments // produced by synthesizer
− Specifies pitch of the note // specifies the note to be played
− Specifies when each note plays and stops playing // Specifies key on/off
− Specifies duration of the note
− Specifies volume of the note
− Specifies the tempo
− Specifies the type of instrument
− Individual notes can be edited
MP3
− MP3 is a format for digital audio
− MP3 is an actual recording of the sound
− MP3 is a (lossy) compression format
− Recorded using a microphone

Question Answer Marks

8(a) Any three from: 3


− Light emitting diodes (technology)
− The display is made up of pixels
− … that are arranged together as a matrix
− … each is formed of three LEDs/filters
− Shades of colour are achieved by mixing red, blue and green
− The screen can be back-lit/edge-lit

NOTE: Use of liquid crystals with LED technology can also be awarded

© UCLES 2020 Page 10 of 11


0478/11 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

8(b) Any three from: 3


− Energy efficient // low power consumption
− Long lasting // longevity
− Focussed beam // less light strays from beam
− Brighter/vivid colours
− High resolution
− No flicker
− Display is thinner
− Mercury free technology // environmentally friendly
− Fewer pixel failure
− Increased viewing in sunlight

8(c) − LCD 1

Question Answer Marks

9(a) − 1 4
− 0
− 0
− 0

9(b) Two from: 2


− Checksum
− Automatic repeat request // ARQ

9(c) Any four from: 4


− Data is input with check digit
− A calculation is performed on the (inputted) data // by example
− The calculated digit is compared to a stored value
− If it matches, the data entered is correct
− If it does not match, the data entered is incorrect

© UCLES 2020 Page 11 of 11


Cambridge IGCSE™

COMPUTER SCIENCE 0478/12


Paper 1 October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2020 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1(a) Any one from: 1


− Hypertext Mark-up Language
− Web authoring language // language used to write/create websites/web pages

1(b)(i) − Presentation 1

1(b)(ii) One mark per each nibble: 6

43 0 1 0 0 0 0 1 1

B7 1 0 1 1 0 1 1 1

F0 1 1 1 1 0 0 0 0

1(c)(i) − Input 1

© UCLES 2020 Page 4 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1(c)(ii) One from: 4


− Lossy (compression)

Any three from:


− A (compression) algorithm is used
− Removes redundant/unnecessary data from the file
− Removes sounds that cannot be heard by the human ear/background noise
− Reduces sample rate
− Reduces sample resolution
− Data is permanently removed // original file cannot be re-instated
− Perceptual music shaping is used

NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.

Any three from (lossless):


− A (compression) algorithm is used
− Repeating patterns are identified
− … are replaced with a value
− … and indexed
− No data is permanently removed // original file can be re-instated
− Suitable example of a lossless algorithm

1(c)(iii) Any two from: 2


− Quicker for her to upload
− Quicker for users to download
− Won’t slow website down as much when loading
− Takes up less storage space

1(d)(i) − Handshake (layer) 2


− Record (layer)

© UCLES 2020 Page 5 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1(d)(ii) Any six from: 6


− Client/browser requests secure connection to server
− Client/browser requests the server to identify itself
− Server provides a digital certificate
− Client/browser validates the certificate
− Client/browser send signal back to server (to begin transmission)
− Session caching can be used
− A session key is generated
− Encryption method is agreed // data is encrypted

1(e)(i) Any three from: 3


− Hacking
− Denial of service (DoS) attack
− Virus
− Malware

NOTE: Three different type of malware can be awarded

1(e)(ii) Any four from: 4


− Acts as a firewall
− Monitor/filters/examines incoming and outgoing traffic
− Rules/criteria for traffic can be set // blacklist/whitelist set
− Blocks any traffic that does not meet criteria …
− … and can send a warning message to the user
− Stop the website failing in a DoS attack // DoS attack hits the proxy server and not the webserver

© UCLES 2020 Page 6 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

2(a) One mark for each correct row: 4

Even Odd
8-bit binary value
() ()

11111111 

01100110 

01111011 

10000000 

2(b) Any five from: 5


− A value is calculated from the data
− The value is calculated using an algorithm // by example
− The value is appended to the data to be transmitted
− Value is recalculated after transmission
− Values are compared
− If the values match the data is correct // if the values do not match the data is incorrect

© UCLES 2020 Page 7 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

3(a)(i) Any three from: 3


− Loss of power/electricity
− Spillage of liquids
− Flood
− Fire
− Human error
− Hardware failure
− Software failure

NOTE: Three different types of human error can be awarded e.g. accidental deletion, not saving data, incorrect shutdown
procedure

3(a)(ii) − Create a backup 1

3(b) Max three from: 4


− Solid state drive
− Non-volatile
− Secondary storage
− Flash memory
− Has no mechanical/moving parts
− Uses transistors
− … and cells that are laid out in a grid
− Uses control gates and floating gates
− Can be NAND/NOR (technology)
− Use EEPROM technology

Max two from:


− Stores data by flashing it onto the chips
− Data stored by controlling the flow of electrons through/using transistors/chips/gates
− The electric current reaches the control gate and flows through to the floating gate to be stored
− When data is stored the transistor is converted from 1 to 0

© UCLES 2020 Page 8 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

3(c) One mark for each correct row: 6

Blu-ray CD DVD
Statement
() () ()

A type of optical storage   

Has the largest storage capacity 

Can be dual layer  

Read using a red laser  

Has the smallest storage capacity 

Stores data in a spiral track   

© UCLES 2020 Page 9 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(a) One mark for each correct logic gate with correct input: 4

© UCLES 2020 Page 10 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(b) Four marks for 8 correct outputs 4


Three marks for 6/7 correct outputs
Two marks for 4/5 correct outputs
One mark for 2/3 correct outputs

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 1

© UCLES 2020 Page 11 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

5(a) One mark for each correct row: 5

True False
Statement
() ()

It is a flat panel display 

It creates images using red, green and blue diodes 

It is not very energy efficient and gives off heat 

It is also used in mobile devices such as smartphones and tablets 

It is a front-lit display 

5(b) One mark for each correct term in the correct place: 5
− Control
− Unique
− Identify
− Protocol
− Dynamic

© UCLES 2020 Page 12 of 13


0478/12 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

5(c) Any four from: 4


− Allows user to view web pages
− Renders HTML
− Allows user to bookmark/favourite web pages
− Provides navigation features
− Allows (multiple) tabs
− Stores cookies
− Records history of pages visited
− Has a homepage
− Runs active script
− Allows files to be downloaded from website/internet
− Sends a request to the IP address/web server (to obtain the contents of a web page)
− Sends URL to DNS
− Manages HTTP/HTTPS protocol

© UCLES 2020 Page 13 of 13


Cambridge IGCSE™
* 1 8 6 8 6 1 8 8 1 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (LK) 186556/2
© UCLES 2020 [Turn over
2

1 Tina is creating a website for charity events. She uses HTML to create the website.

(a) State what is meant by HTML.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.

(i) State whether background colour is an example of structure or presentation, in the


website.

..................................................................................................................................... [1]

(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.

Give the 8-bit binary values for each part of the hexadecimal code.

43

B7

F0
[6]

(c) Tina uses a microphone to record a welcome message for her website.

(i) State whether the microphone is an input or output device.

..................................................................................................................................... [1]

© UCLES 2020 0478/12/O/N/20


3

(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.

Identify which type of compression she should use and describe how this would compress
the file for the website.

Type of compression .........................................................................................................

Description

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Give two benefits of compressing the file for the website.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2020 0478/12/O/N/20 [Turn over


4

(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity
events. This makes sure that their personal data is transmitted securely.

(i) Identify the two layers that are present in the TLS protocol.

Layer 1 ..............................................................................................................................

Layer 2 ..............................................................................................................................
[2]

(ii) Explain how data is sent securely using the TLS protocol.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 0478/12/O/N/20


5

(e) Tina is concerned about security threats to her web server.

(i) Identify three security threats to her web server that Tina might be concerned about.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Tina installs a proxy server to help protect her website from security threats.

Describe how the proxy server will help protect the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.

(a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary
value.

Even Odd
8-bit binary value
(✓) (✓)

11111111

01100110

01111011

10000000
[4]

© UCLES 2020 0478/12/O/N/20 [Turn over


6

(b) The data will also be checked using a checksum.

Describe how a checksum can be used to check that the data has been transmitted correctly.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

3 Alessandro has some important data stored on his computer.

He is concerned about accidental damage to his data.

(a) (i) Identify three ways that the data could be accidentally damaged.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.

..................................................................................................................................... [1]

© UCLES 2020 0478/12/O/N/20


7

(b) Alessandro uses an SSD to store his data.

Describe what is meant by an SSD and how it operates to store data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Alessandro also uses off-line storage to store his data.

Three examples of off-line storage are Blu-ray, CD and DVD.

Six statements are given about off-line storage.

Tick (✓) to show if each statement applies to Blu-ray, CD, or DVD.

Some statements apply to more than one example of off-line storage.

Blu-ray CD DVD
Statement
(✓) (✓) (✓)

A type of optical storage

Has the largest storage capacity

Can be dual layer

Read using a red laser

Has the smallest storage capacity

Stores data in a spiral track


[6]

© UCLES 2020 0478/12/O/N/20 [Turn over


8

4 Consider the logic statement:

X = (((A NAND B) NOR (B AND C)) OR C)

(a) Draw a logic circuit to match the given logic statement.

All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.

B X

[4]

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 0478/12/O/N/20


9

5 Tammy is buying a new computer that has an LED display.

(a) Five statements about LED displays are given.

Tick (✓) to show if each statement is True or False.

True False
Statement
(✓) (✓)

It is a flat panel display

It creates images using red, green and blue diodes

It is not very energy efficient and gives off heat

It can be used in mobile devices such as smartphones and tablets

It is a front-lit display
[5]

© UCLES 2020 0478/12/O/N/20 [Turn over


10

(b) Tammy connects the computer to her home network. The computer has a MAC address and
an IP address.

A paragraph is given about MAC addresses and IP addresses.

Complete the paragraph using the list of terms given. Not all terms need to be used.

• compiled
• computer
• control
• dynamic
• identify
• packet
• principal
• protocol
• similar
• unique

A MAC address is a media access …………………………………………………….. address.

A network device has a ……………………………………………………… MAC address that

can help ………………………………………………. the device in the network. An IP address

is an Internet ………………………………………… address. An IP address can be static or

…………………………………………… .
[5]

(c) Tammy uses a browser when accessing the Internet.

Describe the role of the browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0478/12/O/N/20


11

BLANK PAGE

© UCLES 2020 0478/12/O/N/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/12/O/N/20


Cambridge IGCSE™
* 6 3 5 3 6 1 2 9 0 4 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory October/November 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (PQ) 186557/2
© UCLES 2020 [Turn over
2

1 Five hardware devices are given.

Tick (3) to show if each device is an Input, Output or Storage device.

Input Output Storage


Device
(3) (3) (3)
Solid state drive (SSD)

Headphones

2D cutter

LCD projector

Microphone
[5]

2 Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model
for a computer system.

(a) Identify the component within the CPU that controls the flow of data.

............................................................................................................................................. [1]

(b) Identify the component within the CPU where calculations are carried out.

............................................................................................................................................. [1]

(c) Identify the component within the CPU that stores the address of the next instruction to be
processed.

............................................................................................................................................. [1]

(d) Identify the register within the CPU that holds an instruction that has been fetched from
memory.

............................................................................................................................................. [1]

(e) Identify the register within the CPU that holds data that has been fetched from memory.

............................................................................................................................................. [1]

© UCLES 2020 0478/13/O/N/20


3

3 (a) Four denary to 8-bit binary conversions are given.

Tick (3) to show if each denary to 8-bit binary conversion is Correct or Incorrect.

Correct Incorrect
Denary Binary Conversion
(3) (3)
145 10010001

179 10110101

11 00010011

100 01100010
[4]

(b) Convert the 12-bit binary number into hexadecimal.

1 1 0 0 0 1 0 0 0 0 0 0

............................................................................................................................................. [3]

4 Eugene has a web server that stores his online shopping website.

Customers access the website using a browser.

(a) Describe how the webpages are requested and displayed on the customer’s computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) State three online security threats to Eugene’s web server.

Threat 1 ....................................................................................................................................

Threat 2 ....................................................................................................................................

Threat 3 ....................................................................................................................................
[3]

© UCLES 2020 0478/13/O/N/20 [Turn over


4

5 Arjun uses a scanner to create digital versions of some printed documents.

The scanner is attached to his computer using a USB connection.

(a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission.

Describe your chosen method of data transmission.

Parallel

Serial

Description

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give three benefits of a USB connection.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.

Identify two protocols that can be used to transfer data securely.

Protocol 1 .................................................................................................................................

Protocol 2 .................................................................................................................................
[2]

© UCLES 2020 0478/13/O/N/20


5

6 Elsa writes a paragraph in an examination about encryption.

There are several terms missing from the paragraph.

Complete the paragraph using the list of given terms. Not all terms may need to be used.

Some terms may be used more than once.

• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed

The data is encrypted using a ....................................................................... . This is an

....................................................................... that is used to scramble the data. The data before

encryption is known as ....................................................................... text. When the data has been

encrypted it is known as ....................................................................... text. To read the encrypted

data it needs to be decrypted using a ....................................................................... .


[5]

© UCLES 2020 0478/13/O/N/20 [Turn over


6

7 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.

(a) Tick (3) to show whether an Even or an Odd parity check has been used for each binary
value.

Even Odd
8-bit binary value
(3) (3)
10000001

10000010

00101001

00101000
[4]

(b) A parity check may not always detect errors that have occurred in data transmission.

State why a parity check may not detect data transmission errors.

............................................................................................................................................. [1]

(c) Give one other error checking method that could be used to check for errors in data
transmission.

............................................................................................................................................. [1]

© UCLES 2020 0478/13/O/N/20


7

8 Edith is buying a new computer monitor that displays images using LCD technology.

(a) Explain what is meant by LCD technology.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) State three benefits of LCD technology.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

9 Elle uses both CDs and DVDs to store her school projects.

(a) Give three similarities between a CD and a DVD.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) State one difference between a CD and a DVD.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2020 0478/13/O/N/20 [Turn over


8

10 Consider the following logic statement:

X = ((B AND NOT A) XOR (A OR C))

(a) Draw a logic circuit to match the given logic statement.

All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.

B X

[4]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 0478/13/O/N/20


9

11 A theme park has a game where a player tries to run from the start to the finish without getting wet.

The system for the game uses sensors and a microprocessor to spray water at a player as they
run past each sensor.

Describe how the sensors and the microprocessor are used in this system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

12 Warner says that he has a very good Internet Service Provider (ISP) that provides several services.

Five statements about ISPs are given.

Tick (3) to show if each statement is True or False.

True False
Statement
(3) (3)
Provides access to the Internet for customers

Can determine the maximum bandwidth available for customers

Monitors the volume of data downloaded by customers

Can provide an IP address for the customer

Stores the content for all web pages available on the Internet
[5]

© UCLES 2020 0478/13/O/N/20 [Turn over


10

13 Phishing and pharming are two security issues a user should be aware of when using the Internet.

(a) State one similarity between phishing and pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Explain two differences between phishing and pharming.

Difference 1 ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 0478/13/O/N/20


11

BLANK PAGE

© UCLES 2020 0478/13/O/N/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/13/O/N/20


Cambridge IGCSE™

COMPUTER SCIENCE 0478/13


Paper 1 October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2020 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1 One mark for each correct row: 5

Input Output Storage


Device
() () ()

Solid state drive (SSD) 

Headphones 

2D cutter 

LCD projector 

Microphone 

Question Answer Marks

2(a) − Control unit // CU 1

2(b) − Arithmetic logic unit // ALU 1

2(c) − Program counter // memory address register // PC // MAR 1

2(d) − Memory data register // current instruction register // MDR // CIR 1

2(e) − Memory data register // MDR 1

© UCLES 2020 Page 4 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

3(a) One mark per each correct row: 4

Denary Binary Conversion Correct Incorrect


() ()

145 10010001 

179 10110101 

11 00010011 

100 01100010 

3(b) One mark for each correct conversion in the correct order: 3
− C
− 4
− 0

Question Answer Marks

4(a) Any four from: 4


− Browsers sends URL to DNS
− … using HTTP
− DNS finds matching IP addresses for URL
− … and sends IP address to web browser
− Web browser sends request to IP address/web server for web pages
− Web pages are sent from web server to browser
− Browser renders HTML to display web pages
− Any security certificates are exchanged/authenticated // SSL/HTTPS is used to secure the data
− … encrypting any data sent

© UCLES 2020 Page 5 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(b) Any three from: 3


− Hacking
− Denial of service (DoS)
− Malware
− Virus

NOTE: three suitable types of malware can be awarded

Question Answer Marks

5(a) One mark for correct tick, two marks for description 3

− Serial

− Bits sent one at a time


− Single wire

If parallel given, no mark for parallel, but follow through for correct description of parallel:

− Multiple bits sent at a time


− Multiple wires

5(b) Any three from: 3


− Universal connection // industry standard
− Can only be inserted one way
− Backward compatible
− Auto configures // automatically recognised devices
− Can power devices
− Fast data transfer speed
− Inexpensive to purchase/manufacture

© UCLES 2020 Page 6 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

5(c) Any two from: 2


− TLS
− SSL
− HTTPS

Question Answer Marks

6 − Key // Algorithm 5
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm

Question Answer Marks

7(a) One mark for each correct row: 4

Even Odd
8-bit binary value
() ()

10000001 

10000010 

00101001 

00101000 

7(b) Any one from: 1


− Transposition error
− When bits still add up to odd/even number
− Even number of incorrect bits

© UCLES 2020 Page 7 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

7(c) Any one from: 1


− ARQ
− Checksum

Question Answer Marks

8(a) Any three from: 3


− Liquid crystal display
− The display is made of pixels
− … arranged in a matrix
− Uses a flat panel display
− Backlit display
− … with CCFLs/LEDs
− Uses light-modulating properties of liquid crystals
− Crystals can be turned between opaque and transparent (to allow light to pass)
− Colours created using RGB

8(b) Any three from: 3


− Low power consumption
− Runs at cool temperature
− Do not suffer image burn
− Do not suffer flicker issues
− Bright image/colours
− High resolution image
− Cheaper to purchase than e.g. LED screen

© UCLES 2020 Page 8 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

9(a) Any three from: 3


− Both need a red laser to read/write data
− Both are spun to be read
− Both use spiral tracks for data
− Both are optical storage
− Both are off-line storage // both non-volatile
− Both use pits and lands to store data

9(b) Any one from: 1


− DVD can be dual layer, but CD can only be single
− DVD has higher storage capacity
− DVD has a shorter wavelength laser
− DVD are spun faster
− DVDs have a higher data transfer rate

© UCLES 2020 Page 9 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

10(a) One mark for each correct logic gate with the correct input: 4

© UCLES 2020 Page 10 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

10(b) Four marks for 8 correct outputs 4


Three marks for 6/7 correct outputs
Two marks for 4/5 correct outputs
One mark for 2/3 correct outputs

Working space
A B C X

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 1

11 Six from: 6
− Suitable sensor used e.g. motion sensor/pressure sensor
− (Analogue) data is converted to digital (using ADC)
− Sensor sends data to microprocessor
− Data compared to stored data …
− … if value outside range/within range water is sprayed
− … signal sent to actuator to spray water
− … if value within range/outside range no action taken
− Continuous loop

© UCLES 2020 Page 11 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

12 One mark for each correct row: 5

True False
Statement
() ()

Provides access to the Internet for customers 

Can determine the maximum bandwidth available for customers 

Monitors the volume of data downloaded by customers 

Can provide an IP address for the customer 

Stores the content for all web pages available on the Internet 

© UCLES 2020 Page 12 of 13


0478/13 Cambridge IGCSE – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

13(a) Any one from: 1


− Both are designed to steal/collect personal data
− Both pretend to be a real company
− Both use fake websites

13(b) − Phishing involves use of an email whereas pharming involves installing malicious code 2
− Phishing involves clicking a link or an attachment whereas pharming creates a redirection

© UCLES 2020 Page 13 of 13


Cambridge IGCSE™
* 3 0 5 1 9 9 1 3 9 5 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK/SG) 202678/4
© UCLES 2021 [Turn over
2

1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:

198.167.214.0

The IP address is represented as denary values.

(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.

167

214

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.

(i) Identify one similarity between an IP address and a MAC address.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify two differences between an IP address and a MAC address.

Difference 1 .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Difference 2 .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 0478/11/M/J/21


3

2 Julia inputs personal data into her computer.

She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a
USB flash memory drive.

(a) Identify three devices Julia can use to input personal data into her computer.

Device 1 ....................................................................................................................................

Device 2 ....................................................................................................................................

Device 3 ....................................................................................................................................
[3]

(b) Six statements are shown about HDDs, SSDs and USB flash memory drives.

Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.

USB flash
memory
Statement
HDD SSD drive
(✓) (✓) (✓)

it has no moving parts

it is non-volatile

it can use NAND gates to store data

it uses magnetic properties to store data

it has the smallest physical size

it has the slowest read/write speeds


[6]

© UCLES 2021 0478/11/M/J/21 [Turn over


4

(c) Julia uses a USB connection to transfer data onto her USB flash memory drive.

(i) One benefit of using a USB connection is that it is a universal connection.

State two other benefits of using a USB connection.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

(ii) Identify the type of data transmission used in a USB connection.

..................................................................................................................................... [1]

© UCLES 2021 0478/11/M/J/21


5

3 A firewall can be used to help keep the data secure that is stored on a computer.

(a) The given paragraph describes how the firewall operates to help keep the data secure.

Complete the paragraph using the most appropriate terms from the given list. Not all of the
terms on the list need to be used.

• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage

A firewall can be ............................................ or hardware based. It monitors traffic between

the computer and the ............................................ The user sets ............................................

for the traffic. The firewall will .............................................. or ............................................

the traffic based on this. It can help prevent ............................................ and malicious

software that could be a threat to the security of the data.


[6]

(b) Identify three other methods that could be used to keep the data secure.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................

Method 3 ...................................................................................................................................
[3]

© UCLES 2021 0478/11/M/J/21 [Turn over


6

4 Two internet risks are phishing and pharming.

Describe what is meant by phishing and pharming.

Phishing ...........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Pharming ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2021 0478/11/M/J/21


7

5 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).

A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:

• open a window and turn a heater off if it gets too hot


• close a window and turn a heater on if it gets too cold.

Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2021 0478/11/M/J/21 [Turn over


8

6 Consider the logic statement:

X = (((A AND B) OR (C AND NOT B)) XOR NOT C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.

B X

[6]

© UCLES 2021 0478/11/M/J/21


9

(b) Consider the completed truth table for the given logic statement.

Row Working space


A B C X
number

1 0 0 0 0

2 0 0 1 1

3 0 1 0 0

4 0 1 1 1

5 1 0 0 0

6 1 0 1 1

7 1 1 0 0

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row ........................

Row ........................

Row ........................

Row ........................
[4]

© UCLES 2021 0478/11/M/J/21 [Turn over


10

7 A music company has a website that allows users to stream music. The music is stored in sound
files.

(a) The sound files are compressed using lossless compression.

(i) Describe how the sound files are compressed using lossless compression.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State one reason why the music company would compress the sound files using
lossless, rather than lossy, compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give one benefit, to the user, of the music company compressing the sound files.

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) Give one drawback of the music company using lossless, rather than lossy, compression
for the sound files.

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 0478/11/M/J/21


11

(b) Describe how the web pages for the website are requested and displayed on a user’s
computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) The web server that hosts the website suffers a denial of service (DoS) attack.

Explain why this will prevent users from accessing the website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0478/11/M/J/21 [Turn over


12

8 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.

(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.

8-bit binary value Type of parity

01100100

10010001

00000011

10110010
[4]

(b) An error may not be detected when using a parity check.

Identify why an error may not be detected.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The data is sent using parallel half-duplex data transmission.

(i) Describe how data is sent using parallel half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State two drawbacks of using parallel data transmission.

Drawback 1 .......................................................................................................................

...........................................................................................................................................

Drawback 2 .......................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 0478/11/M/J/21


13

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


14

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


15

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/11/M/J/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/11


Paper 1 May/June 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 8 printed pages.

© UCLES 2021 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.

© UCLES 2021 Page 3 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(a) One mark per each correct register. 2

1 0 1 0 0 1 1 1

1 1 0 1 0 1 1 0

1(b)(i) Any one from: 1


− Both addresses can be used to identify a computer/device
− Both are unique
− Both can be represented as hexadecimal
− Both addresses do not change if IP address is static

1(b)(ii) Any two from: 2


− An IP address is assigned by the network/router/ISP, A MAC address is
assigned by the manufacturer
− An IP address can be changed (if dynamic), MAC address cannot be
changed
− IP address has 4/8 groups of values, MAC address has 6 groups/pairs of
values
− IP address is 32-bit/128-bit, MAC address is 48-bit
− IP address does not contain serial number/manufacturer number, MAC
address does
− IP(v4) address is denary and MAC address is hexadecimal

Question Answer Marks

2(a) Any three from: 3


− Keyboard
− Mouse
− Microphone
− Keypad
− Touchscreen
− Touchpad

© UCLES 2021 Page 4 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

2(b) One mark for each correct row. 6

USB flash
memory
Statement
HDD SSD drive
() () ()

it has no moving parts  

it is non-volatile   

it can use NAND gates to store data  

it uses magnetic properties to store data 

it has the smallest physical size 

it has the slowest read/write speeds 

2(c)(i) Any two from: 2


− It cannot be inserted incorrectly
− Supports different transmission speeds
− High speed transmission
− Automatically detected (not connected) // automatically downloads
drivers
− Powers the device (for data transfer)
− Backward compatible

2(c)(ii) − Serial 1

Question Answer Marks

3(a) One mark per each correct term in the correct order. 6
− Software
− Network
− Criteria
− Accept // reject
− Reject // accept
− Hacking

© UCLES 2021 Page 5 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(b) Any three from: 3


− Password
− Biometrics (device)
− Encryption
− Physical methods (e.g. locks)
− Two-factor authentication // Two-step verification
− Anti-viruses

Question Answer Marks

4 Any six from: 6

Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user

Pharming
− Malicious code/malware is downloaded/installed // software downloaded
without users' knowledge
− … that re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user

Question Answer Marks

5 Eight from: 8
− Sensor send data/readings/signal to microprocessor
− Data is converted from analogue to digital (using ADC)
− Microprocessor compares/checks data to stored values/range of values

− … If data is greater than 30 / above the range microprocessor sends
signal to open window and to turn heater off
− … If data is below 25 the microprocessor sends signal to turn on heater
and to close window
− … If data is between 25 and 30 / within the range no action taken
− Actuator is used to operate heater/window
− Whole process is continuous

© UCLES 2021 Page 6 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

6(a) One mark per each correct logic gate, with correct input: 6

6(b) − Row 1 4
− Row 3
− Row 4
− Row 5

Question Answer Marks

7(a)(i) Four from: 4


− (Compression) algorithm is used
− No data will be removed // original file can be restored
− Example of type of algorithm that would be used e.g. RLE
− Repeated patterns in the music are identified
− … and indexed

NOTE: If another lossless method is described, marks can be awarded.

7(a)(ii) Any one from: 1


− To provide the highest quality of music file (that compression will allow)
− The user is able to listen to the original sound file
− No loss of quality for the sound file provided

7(a)(iii) Any one from: 1


− Allow for quicker streaming speed
− Would not require as much bandwidth (to stream)
− Does not need as much RAM
− Smoother listening experience // less lag
− Will not use as much of data allowance

© UCLES 2021 Page 7 of 8


0478/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(a)(iv) Two from: 2


− Streaming speed may be slower
− … and may affect listening experience // buffering may occur
− User may need more bandwidth to stream
− … that could be more expensive
− It would be a larger file size
− … so may take longer to upload
− … so will take up more storage space …
− … on webserver

7(b) Any four from: 4


− Browser sends URL to DNS
− … using HTTP/HTTPS
− IP address is found on DNS
− DNS returns IP address to the browser
− Browser sends request to web server/IP address
− Web server sends web pages back to browser
− Browser interprets/renders the HTML (to display web pages)
− Security certificates exchanged

7(c) Two from: 2


− Web server has been flooded with traffic // web server has been sent
many requests at once
− … so, server is brought to a halt / crashes

Question Answer Marks

8(a) − Odd 4
− Odd
− Even
− Even

8(b) Any one from: 1


− there is a transposition of bits
− it does not check the order of the bits (just the sum of 1s/0s)
− even number of bits change
− incorrect bits still add up to correct parity

8(c)(i) Four from: 4


− Multiple bits are sent at the same time
− Uses multiple wires
− Data is sent in both directions …
− … but only one direction at a time

8(c)(ii) Any two from: 2


− Bits may arrive skewed
− More expensive to setup/manufacture/purchase cable
− Limited distance
− More prone to interference/error

© UCLES 2021 Page 8 of 8


Cambridge IGCSE™
* 1 8 7 5 9 9 1 1 3 6 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
2

1 A denary value can be converted into hexadecimal and binary.

(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.

Denary Hexadecimal 8-bit binary

49

123

200

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give two benefits, to users, of converting binary values to hexadecimal.

Benefit 1 ....................................................................................................................................

...................................................................................................................................................

Benefit 2 ....................................................................................................................................

...................................................................................................................................................
[2]

(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.

Identify three other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


3

2 Data storage can be magnetic, solid state or optical.

(a) Six statements are given about data storage.

Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.

Magnetic Solid state Optical


Statement
(3) (3) (3)
no moving parts are used to store data

pits and lands are used to store data

data is stored on platters

flash memory is used to store data

parts are rotated to store data

data can be stored permanently


[6]

(b) (i) Give one example of magnetic storage.

..................................................................................................................................... [1]

(ii) Give one example of optical storage.

..................................................................................................................................... [1]

(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.

Type of storage ..................................................................................................................

Justification ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(c) Describe the operation of USB flash memory and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0478/12/M/J/21 [Turn over


4

3 Consider the logic statement:

X = ((((NOT A AND B) OR C) AND B) NOR (B OR C))

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.

B X

[6]

© UCLES 2021 0478/12/M/J/21


5

(b) Consider the completed truth table for the given logic statement.

Row Working space


A B C X
number
1 0 0 0 1

2 0 0 1 1

3 0 1 0 1

4 0 1 1 0

5 1 0 0 1

6 1 0 1 0

7 1 1 0 1

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row .......................

Row .......................

Row .......................

Row .......................
[4]

© UCLES 2021 0478/12/M/J/21 [Turn over


6

4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.

(a) Six statements are given about Internet security risks.

Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.

Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard

can be installed onto a web server

prevents access to a website

is malicious code on a computer

is self-replicating

damages the files on a user’s hard drive


[6]

(b) Identify three other types of Internet security risks.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.

State three ways that data could be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


7

5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.

Sensors and a microprocessor are used to control the security light system.

(a) Identify two sensors that would be used in the security light system.

Sensor 1 ...................................................................................................................................

Sensor 2 ...................................................................................................................................
[2]

(b) Describe how the sensors and the microprocessor control the security light system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0478/12/M/J/21 [Turn over


8

6 Cookies can be used to store a user’s personal data and online browsing habits.

(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.

Describe how cookies can be used to store and automatically enter a user’s payment details.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0478/12/M/J/21


9

7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.

(a) (i) Give one example of HTML structure.

..................................................................................................................................... [1]

(ii) Give two examples of HTML presentation.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(b) Explain why Jolene separates the HTML into structure and presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

8 A keyboard is a type of input device that can be used to enter data into a computer.

Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.

• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch

A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a

............................................. that completes a ............................................. . This allows

............................................. to flow. The location of the key pressed is

............................................. . The location of the key pressed is compared to a

............................................. map to find the ............................................. value for the key that

has been pressed.


[6]

© UCLES 2021 0478/12/M/J/21


10

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


11

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/M/J/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/12


Paper 1 May/June 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 8 printed pages.

© UCLES 2021 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.

© UCLES 2021 Page 3 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(a) One mark per each correct binary value. 6


One mark per each correct hex value.

Denary Hexadecimal 8-bit binary

49 31 00110001

123 7B 01111011

200 C8 11001000

1(b) Any two from: 2


− Easier/quicker to read/write/understand
− Easier/quicker to identify errors/debug
− Takes up less screen/display space
− Less chance of making an error

1(c) Any three from: 3


− MAC address
− URL
− Assembly language
− Error codes // error messages
− IP addresses
− Locations in memory
− Memory dumps

Question Answer Marks

2(a) One mark per each correct row. 6

Magnetic Solid Optical


Statement () state ()
()

no moving parts are used to store data 

pits and lands are used to store data 

data is stored on platters 

flash memory is used to store data 

parts are rotated to store data  

data can be stored permanently   

2(b)(i) Any one from: 1


− Hard disk drive // HDD
− Magnetic tape

© UCLES 2021 Page 4 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

2(b)(ii) Any one from: 1


− CD
− DVD
− Blu-ray disk

2(b)(iii) One for type of storage, two for matching justification from: 3
− Magnetic // HDD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and magnetic is high
capacity
− Magnetic is cheaper to buy for storage per unit than solid state
− Magnetic is capable of more of read/write requests over time // has more
longevity // SSD has more limited number of read/write requests (before
it is no longer usable)
− No requirement for it to be portable, so moving parts does not matter

− Solid-state // SSD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and solid-state is high
capacity
− Solid-state is more energy efficient
− Solid-state runs cooler so will not overheat
− Solid state has faster read/write speeds to handle volume of traffic

2(c) Any three from: 3


− Data is flashed onto (silicon) chips
− Uses NAND/NOR technology // can use flip-flops
− Uses transistors/control gates/floating gates …
− … to control the flow of electrons
− It is a type of EEPROM technology
− When data is stored the transistor is converted from 1 to 0 / 0 to 1
− Writes (and reads) sequentially

3(a) One mark for each correct logic gate with correct input. 6

© UCLES 2021 Page 5 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(b) One mark per each correct row. 4


− Row 2
− Row 3
− Row 7
− Row 8

Question Answer Marks

4(a) One mark per each correct row. 6

Virus Spyware Denial of


Statement () () service
()

captures all data entered using a keyboard 

can be installed onto a web server  

prevents access to a website 

is malicious code on a computer  

is self-replicating 

damages the files on a user’s hard drive 

4(b) Any three from: 3


− Phishing
− Pharming
− Hacking // cracking

4(c) Any three from: 3


− Human error
− Power failure/surge
− Hardware failure
− Software failure
− Fire
− Flood

5(a) − Light sensor 2


− Motion sensor // infra-red sensor

© UCLES 2021 Page 6 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(b) Eight from: 8


− Sensors send data to microprocessor
− Data is converted to digital (using ADC)
− Microprocessor compares data to stored value(s) …
− … if one value or neither values are within range/out of range/match no
action is taken
− … If both values are out of range/in range/match microprocessor sends
signal to switch light on …
− … 1-minute timer is started
− Actuator used to switch on/off light
− When timer reaches 1 minute, microprocessor sends signal to switch
light off
− Whole process is continuous

6(a) Any three from: 3


− Webserver sends (cookie) file to user’s browser
− User’s payment details stored in encrypted text file // data is encrypted to
be stored
− Cookie file is stored by browser/on user’s HDD/SSD
− When user revisits website, webserver requests cookie file // webserver
can access the data stored in the cookie file (to automatically enter
details)
− … and browser sends cookie file back to webserver (to automatically
enter the details)

6(b) Four from: 4


− User does not see what information is stored // might collect data that
user does not know about …
− … so, user may feel their privacy is affected

− A profile could be built about the user …


− … that could expose a user’s identity // lead to identity theft

− Sensitive information stored in cookies could be intercepted in


transmission …
− Other websites could gain access to the cookies stored on a user’s
computer …
− Computer could be hacked to obtain data stored in cookies …
− … so, payment information could be stolen and used by a third party

Question Answer Marks

7(a)(i) Any one from: 1


− Placement of text/image
− Margins
− Line break
− Padding

NOTE: Any relevant example of structure can be awarded

© UCLES 2021 Page 7 of 8


0478/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(a)(ii) Any two from: 2


− Font colour
− Font style
− Font size
− Background colour
− Image size
− Border properties

NOTE: Any relevant example of presentation can be awarded

7(b) Any two from: 2


− Can easily change/edit the style of the webpage
− So, CSS can be used to create a template/style sheet
− Can add new content and apply the same style easily
− Can re-use the presentation/style for other websites

8 One mark for each correct term in the correct order 6


− Switch
− Circuit
− Current
− Calculated
− Character
− Binary

© UCLES 2021 Page 8 of 8


Cambridge IGCSE™
* 3 0 8 8 7 7 7 2 2 4 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (DH/SG) 202681/5
© UCLES 2021 [Turn over
2

1 Greta has a computer that she uses for schoolwork and leisure.

(a) The computer has the Media Access Control (MAC) address:

00:A0:C9:14:C8:29

(i) Tick (3) to show whether the MAC address is initially assigned to the computer by the
network, the manufacturer or the user.

Tick (3)

Network

Manufacturer

User

[1]

(ii) The values in the MAC address are hexadecimal values.

Convert the three given hexadecimal values into 8-bit binary.

14 ......................................................................................................................................

A0 ......................................................................................................................................

C9 ......................................................................................................................................
[3]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Convert the two given hexadecimal values into denary.

29 ......................................................................................................................................

C8 ......................................................................................................................................
[2]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2021 0478/13/M/J/21


3

(b) Greta stores data on several off-line storage devices, including an external hard disk drive
(HDD), a USB flash memory drive and a compact disc (CD).

(i) Identify the type of storage for each device.

External HDD ....................................................................................................................

USB flash memory drive ...................................................................................................

CD .....................................................................................................................................
[3]

(ii) Describe the operation of a HDD and how it stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/13/M/J/21 [Turn over


4

2 Jolene displays videos on her website. She uses lossy compression to reduce the file size of the
videos.

(a) Describe how lossy compression reduces the file size of the videos.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) State two reasons why Jolene would use lossy rather than lossless compression for the
videos.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


5

3 An optical mouse is a type of input device that can be used to input data into a computer system.

(a) Complete the paragraph about the operation of an optical mouse, using the most appropriate
terms from the given list. Not all terms need to be used.

• Ball
• Battery
• LCD
• LED
• Lens
• Magnifies
• Matrix
• Microswitch
• Photoelectric
• Photographic
• Reduces
• USB

An optical mouse shines an ............................................ from the bottom of the mouse onto a

surface. Light bounces straight back from the surface into a ............................................ cell.

This has a ............................................ that ............................................ the reflected light to

allow detection of smaller movements. When a button on the mouse is clicked, a

............................................ is pressed. A ............................................ connection is used to

carry the data to the computer.


[6]

(b) Identify two other input devices that can be used to enter data into a computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 [Turn over


6

4 Spencer finds out that his online music account has been accessed by an unauthorised person.

He believes his personal details for the account were obtained using phishing.

(a) Explain how the personal details could have been obtained using phishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Give two other Internet security risks that could have been used to obtain the personal
details.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


7

5 Six statements are given about programming languages.

Tick (3) to show whether each statement applies to high-level language, assembly language or
machine code. Some statements may apply to more than one type of programming language.

High-level Assembly Machine


Statement language language code
(3) (3) (3)
it requires a translator to be processed by a
computer

it is an example of low-level language

it uses mnemonics

it uses English-like statements

it can be used to directly manipulate hardware in


the computer

it is portable

[6]

© UCLES 2021 0478/13/M/J/21 [Turn over


8

6 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.

(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.

8-bit binary value Type of parity

01111100

10010000

10011001

00101001

[4]

(b) The 8-bit binary value 10110001 is transmitted and received as 10110010

A parity check does not identify any errors in the binary value received.

State why the parity check does not identify any errors.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The data is sent using serial duplex data transmission.

(i) Describe how data is sent using serial duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State one drawback of using serial data transmission, rather than parallel data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/13/M/J/21


9

7 Marco uses his computer for work. The data he uses on a daily basis is valuable to his business.

Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly
removing external storage devices, is one way that the data can be accidentally damaged.

(a) Identify two other ways that data can be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Removing storage devices correctly from the computer can help prevent data being
accidentally damaged.

Give two other ways that accidental damage to data can be prevented.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 [Turn over


10

8 Consider the following logic circuit:

X
B

(a) Two NOT gates are used in the given logic circuit.

Identify three other logic gates that are used in the given logic circuit.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/13/M/J/21


11

(b) Consider the completed truth table for the given logic circuit.

Row Working space


A B C X
number
1 0 0 0 0

2 0 0 1 1

3 0 1 0 0

4 0 1 1 0

5 1 0 0 1

6 1 0 1 1

7 1 1 0 0

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row .......................

Row .......................

Row .......................

Row .......................
[4]

© UCLES 2021 0478/13/M/J/21 [Turn over


12

9 An underground car park has a system that checks the height of vehicles. A vehicle can be no
higher than 1.8 metres to enter the car park.

The system also counts the number of vehicles that have entered the car park, so that it can
display how many parking spaces are still available.

Each parking space has a red and a green light above it. If a car is parked in the parking space
only the red light is on, otherwise only the green light is on.

Sensors and a microprocessor are used to control the system.

(a) Complete the table to identify a suitable sensor for each part of the system.

Task Sensor

check if a vehicle is too high

count the vehicles entering the car park

check if a vehicle is parked in a parking space

[3]

(b) Describe how the sensor and the microprocessor are used to display the red or green light
above the parking space.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0478/13/M/J/21


13

10 Several components are involved in processing an instruction in a Von Neumann model for a
computer system.

Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random
access memory (RAM).

(a) Six statements are given about the components.

Tick (3) to show if each statement applies to the ALU, CU or the RAM. Some statements may
apply to more than one component.

ALU CU RAM
Statement
(3) (3) (3)
stores data and instructions before they enter the central
processing unit (CPU)

contains a register called the accumulator

manages the transmission of data and instructions to the


correct components

contained within the CPU

uses the data bus to send data into or out of the CPU

carries out calculations on data

[6]

(b) The accumulator is a register that is part of the Von Neumann model.

Give two other registers that are part of the Von Neumann model.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


14

BLANK PAGE

© UCLES 2021 0478/13/M/J/21


15

BLANK PAGE

© UCLES 2021 0478/13/M/J/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/13/M/J/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/13


Paper 1 May/June 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 8 printed pages.

© UCLES 2021 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.

© UCLES 2021 Page 3 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(a)(i) − manufacturer 1

1(a)(ii) One mark per each correct binary value. 3

− 00010100
− 10100000
− 11001001

1a(iii) One mark per each correct denary value. 2

− 41
− 200

1(b)(i) − Magnetic 3
− Solid state
− Optical

1(b)(ii) Any four from: 4


− It has platters
− Platters/disk divided into tracks
− Platter/disk is spun
− Has a read/write arm that moves across storage media
− Read/writes data using electromagnets
− Uses magnetic fields to control magnetic dots of data
− Magnetic field determines binary value

Question Answer Marks

2(a) Any three from: 3


− A compression algorithm is used
− Redundant data is removed
− Reduce colour depth
− Reduce image resolution
− Reduce sample rate
− Reduce sample resolution
− Reduce frame rate
− Use perceptual music shaping
− Data is permanently removed

2(b) Any two from: 2


− Lossy decreases the file size more
− Take up less storage space on webserver/users' computer
− Quicker to upload/download
− May not need to be high quality
− Website will load faster for users
− Less lag/buffering when watching
− Takes up less bandwidth to download/upload
− Uses less data allowance

© UCLES 2021 Page 4 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(a) One mark per each correct term, in the correct place. 6
− LED
− Photoelectric
− Lens
− Magnifies
− Microswitch
− USB

3(b) Any two from: 2


− Keyboard
− Microphone
− 2D/3D Scanner
− Sensor
− Touchscreen
− Keypad
− Webcam
− Joystick

Question Answer Marks

4(a) − Legitimate looking/fake email sent to user 3


− … that contains a link to a fake website
− User clicks link and enters personal details (into fake website)

4(b) Any two from: 2


− Pharming
− Spyware
− Hacking/cracking

© UCLES 2021 Page 5 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5 One mark per each correct row 6

High-level Assembly Machine


Statement language language code
() () ()

It requires a translator to be
 
processed by a computer

It is an example of low-level
 
language

It uses mnemonics 

It uses English-like

statements

It can be used to directly


manipulate hardware in the  
computer

It is portable 

Question Answer Marks

6(a) − Odd 4
− Even
− Even
− Odd

6(b) Any one from: 1


− There is a transposition of bits
− Bits still add up to correct parity

6(c)(i) − Data is sent one bit at a time 4


− Data is sent using a single wire
− Data is sent in both direction …
− … at the same time

6(c)(ii) Any one from: 1


− Data transmission can be slower (than parallel)
− Additional data may need to be sent

© UCLES 2021 Page 6 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(a) Any two from: 2


− Hardware failure
− Software failure
− Power failure/surge
− Fire
− Flood
− Natural disaster

7(b) Any two from: 2


− Use verification methods before deleting files
− Keep data in a fireproof box
− Do not drink liquids near a computer
− Use surge protection // UPS
− Correct shutdown procedures
− Access rights
− Back data up

Question Answer Marks

8(a) − AND 3
− NOR
− XOR

8(b) − Row 1 4
− Row 4
− Row 7
− Row 8

Question Answer Marks

9(a) One mark per each correct sensor 3

Task Sensor

Check if a vehicle is too high Infrared/light

Count the vehicles entering the car Magnetic field // pressure


park

Check if a vehicle is parked in a Pressure // magnetic field //


parking space infrared/light

© UCLES 2021 Page 7 of 8


0478/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

9(b) Six from: 6


− Sensor sends data to microprocessor
− Data is converted from analogue to digital (using ADC)
− Data is compared to stored value …
− … If data is greater than stored value microprocessor sends signal to
turn red light on and the green light off
− … If data is less than stored value microprocessor sends signal to turn
green light on the red light off
− … If data still within range, no action taken/existing light remains on
− Lights turned on/off using actuator
− Process is continuous

Question Answer Marks

10(a) One mark per each correct row 6


ALU CU RAM
Statement
() () ()

Stores data and instructions before


they enter the central processing unit 
(CPU)

Contains a register called the



accumulator

Manages the transmission of data and



instructions to the correct components

Contained within the CPU  

Uses the data bus to send data into or


() 
out of the CPU

Carries out calculations on data 

10(b) Any two from: 2


− MAR
− MDR // MBR
− PC
− CIR // IR

© UCLES 2021 Page 8 of 8


Cambridge IGCSE™
* 0 0 6 3 3 2 5 4 1 2 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LEG/AR) 202712/4
© UCLES 2021 [Turn over
2

1 Binary is a number system that is used by computers.

(a) Tick (3) one box to show whether binary is a base-2, base-10 or base-16 number system.

Tick (3)

Base-2

Base-10

Base-16
[1]

(b) Hexadecimal and denary are number systems that can be used by programmers.

Convert these four hexadecimal values into denary values.

09 ...........................................

10 ...........................................

28 ...........................................

A1 ...........................................

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/11/O/N/21


3

2 Magda has a mobile telephone.

She uses the touch screen on her telephone to send emails to her customers. The touch screen
breaks, stopping Magda from using it to type her emails.

(a) Identify one other input device that would be built into the mobile telephone that Magda could
use to send an email to her customers.

............................................................................................................................................. [1]

(b) The touch screen operates by using the conductive properties of the object that is used to
touch the screen.

State whether the touch screen is a resistive, capacitive or infra-red touch screen.

............................................................................................................................................. [1]

(c) Magda is listening to music on her mobile telephone when she receives a telephone call. A
signal is sent within the telephone to stop the music and output that a call has been received.

Give the name of this type of signal.

............................................................................................................................................. [1]

© UCLES 2021 0478/11/O/N/21 [Turn over


4

3 Five statements are given about the error-checking methods checksum, check digit and parity
check.

(a) Tick (3) to show whether each statement applies to checksum, check digit or parity check.
Some statements may apply to more than one error-checking method.

Check Parity
Statement Checksum digit check
(3) (3) (3)
uses an additional bit to create an odd or even number
of 1s

checks for errors on data entry

compares two calculated values to see if an error has


occurred

will not detect transposition errors

sends additional values when data is transmitted from a


computer to another
[5]

(b) Identify one other error-checking method.

............................................................................................................................................. [1]

4 Georgia is a wedding photographer. She wants to store 10 photographs on a USB flash memory
drive for a customer. Each photograph is 100 pixels wide and 50 pixels high.

The photographs are 8-bit colour photographs.

(a) Calculate the total file size, in kilobytes (kB), of all the photographs. For this calculation, you
may use the unit of measurement of 1024 or 1000.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer .................................................................... kB
[3]
© UCLES 2021 0478/11/O/N/21
5

(b) Georgia compresses photographs to store them on the USB flash memory drive. It is
important that the compression does not affect the quality of the photographs in any way.

State which type of compression is the most suitable. Justify your choice.

Compression type .....................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Georgia uses a digital camera. The digital camera takes a photograph that is then converted
into a digital image.

Complete the paragraph about the operation of a digital camera, using the most appropriate
terms from the list. Not all terms in the list need to be used.

• analogue-to-digital
• binary
• charge-coupled
• digital-to-analogue
• lens
• light
• mirror
• pixel
• reflection
• sensor
• storage

When Georgia pushes the button to take a photograph, an aperture opens at the front of

the camera to allow ............................................................... to stream in through

the ............................................................... . This is captured by a sensor called a

............................................................... device. The ...............................................................

converter then converts each ............................................................... into a digital value.


[5]

© UCLES 2021 0478/11/O/N/21 [Turn over


6

5 Tamaz stores confidential data on his computer.

He uses the Internet regularly and is concerned about his data being viewed by unauthorised
people. He currently has one software method to stop his data being viewed, which is a password.

He wants to add other software methods to stop his data being viewed by unauthorised people.

(a) State two other software methods that Tamaz could use to stop his data being viewed by
unauthorised people.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Tamaz’s computer has an operating system. Two functions of the operating system are file
management and memory management.

State two other functions of the operating system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

6 Six statements are given about the role of components in the Central Processing Unit (CPU).

(a) Tick (3) to show whether each statement applies to the Memory Address Register (MAR),
Memory Data Register (MDR) or Program Counter (PC).

Some statements may apply to more than one component.

MAR MDR PC
Statement
(3) (3) (3)

it is a register in the CPU

it holds the address of the next instruction to be processed

it holds the address of the data that is about to be fetched


from memory

it holds the data that has been fetched from memory

it receives signals from the control unit

it uses the address bus to send an address to another


component
[6]

(b) Identify the component in the CPU that carries out calculations.

............................................................................................................................................. [1]

© UCLES 2021 0478/11/O/N/21


7

7 (a) Tick (3) one box to identify if an internal Solid State Drive (SSD) is an example of primary,
secondary or off-line storage. Justify your choice.

Tick (3)

Primary

Secondary

Off-line

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) Describe the operation of an SSD and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0478/11/O/N/21 [Turn over


8

8 Victoria develops a computer game to sell on a gaming website. She writes her program using
English-like statements.

(a) State which type of programming language Victoria is using.

............................................................................................................................................. [1]

(b) Victoria uses two different types of translator when creating the program for the computer
game.

State which translator is the most suitable for the given tasks.

Give the benefits of using that translator for the task.

You must choose a different translator for each task.

(i) To translate the code during development of the game.

Translator ..........................................................

Benefits .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) To translate the final program and upload to the website for distribution, without the
source code.

Translator ..........................................................

Benefits .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2021 0478/11/O/N/21


9

9 A washing machine uses sensors and a microprocessor to control the washing cycle of clothes.

(a) A sensor is used in each of the given tasks.

Identify one suitable sensor that would be used for each task.

Each sensor given must be different.

Task Sensor

checking the water is 30 °C

checking the water acidity level after detergent is added

checking the weight of the clothes to make sure that the machine is
not overloaded
[3]

(b) Describe how the sensor and the microprocessor are used to make sure the water remains
at 30 °C.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0478/11/O/N/21 [Turn over


10

10 Consider the following logic statement:

X = (((A OR B) OR (NOT (B XOR C))) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

(b) State the name of a logic gate that does not appear in the logic statement and draw the
symbol for the logic gate.

Name of logic gate ................................... Logic gate symbol:

[2]

© UCLES 2021 0478/11/O/N/21


11

(c) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

11 The table contains descriptions relating to web pages and the Internet.

Complete the table with the correct terms for the given descriptions.

Term Description

the language used to create a web page

the type of software application used to display a web page

an address given to a computer, by a network, to allow the


computer to be uniquely identified
a text file sent by a web server to collect data about a user’s
browsing habits

the company that provides a connection to the Internet

[5]

© UCLES 2021 0478/11/O/N/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/11/O/N/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/11


Paper 1 October/November 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 8 printed pages.

© UCLES 2021 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1(a) − Base-2 1

1(b) − 9 4
− 16
− 40
− 161

Question Answer Marks

2(a) − Microphone 1

2(b) − capacitive 1

2(c) − interrupt 1

Question Answer Marks

3(a) One mark per each correct row. 5

Statement Checksum Check Parity


() digit check
() ()

uses an additional bit to create an 


odd or even number of 1s

checks for errors on data entry 

compares two calculated values to  


see if an error has occurred

will not detect transposition errors 

sends additional values when data is  ()


transmitted from one computer to
another

3(b) − ARQ 1

© UCLES 2021 Page 3 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(a) Two marks for any two correct workings and one mark for the correct 3
answer.

Working:
− 100 × 50 = 5000 bits
− 5000 × 8 = 40,000 bits
− 40,000 / 8 = 5,000 bytes
− 5,000 × 10 = 50,000 bytes
− 50,000 / 1024

Answer:
48.83 kB // 49 kB

NOTE: Alternative correct methods of working can be credited. Answer can


be given to any number of dp.

4(b) One mark per correct method, two marks per justification. 3

− Lossless

− Lossy would remove data permanently // lossless would not remove any
data permanently // File could be restored to original …
− … that could affect the quality (lossy) // … to maintain the quality
(lossless)

4(c) − Light 5
− Lens
− Charge-coupled
− Analogue-to-digital
− Pixel

Question Answer Marks

5(a) Any two from: 2


− Encryption
− Biometric device
− Firewall
− Anti-spyware
− Two-factor authentication // two-step verification

5(b) Any two from: 2


− Interrupt / error-handling
− Peripheral management
− Providing user interface
− Platform for running applications // installing / removing software
− Manages security // access rights/levels // user account management
− Managing time slicing // multitasking

© UCLES 2021 Page 4 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

6(a) One mark per each correct row. 6

Statement MAR MDR PC


() () ()

it is a register in the CPU   

it holds the address of the next instruction to () 


be processed

it holds the address of the data that is about  ()


to be fetched from memory

it holds the data that has been fetched from 


memory

it receives signals from the control unit   

it uses the address bus to send an address  


to another component

6(b) − Arithmetic Logic Unit // ALU 1

Question Answer Marks

7(a) One mark per correct storage, two marks for justification. 3

− Secondary

− It is non-volatile storage
− It is not directly accessed by the CPU

7(b) Any four from: 4


− Uses flash memory
− Data is flashed onto (silicon) chips
− Uses NAND/NOR technology // Can use flip-flops
− Uses transistors/control gates/floating gates …
− … to control the flow of electrons
− It is a type of EEPROM technology
− When data is stored the transistor is converted from 1 to 0 / 0 to 1
− Writes (and reads) sequentially

© UCLES 2021 Page 5 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(a) − High-level 1

8(b)(i) One mark for the correct translator, two marks for the benefit(s). 3

− Interpreter
− Easier to debug
− … as errors are immediately reported when detected

− Compiler
− All errors are reported in a single report
− … meaning they can all be fixed at the same time
− No need to recompile code every time a test is run

8(b)(ii) One mark for the correct translator, two marks for the benefits. 3

− Compiler
− Creates an executable file
− … so, translator is no longer needed to run it
− Source code cannot be stolen // can be provided without the source code

Question Answer Marks

9(a) One mark per each correct sensor. 3

Task Sensor

checking the water is 30 °C Temperature

checking the water acidity level after detergent is pH


added

checking the weight of the clothes to make sure that Pressure


the machine is not overloaded

9(b) Six from: 6

− Sensor sends data to microprocessor


− Data is converted from analogue to digital (using ADC)
− Data is compared to stored value (of 30)

If data is below 30 then a microprocessor sends signal is sent to a heater


to heat the water up/add hot water
− if data is above 30 then a microprocessor sends signal is sent to turn
the heater off to allow the water to cool down/add cold water
− Actuator used to turn headset on/off // Actuator used to add water
− If data is 30 then no action is taken
− It is a continuous process

© UCLES 2021 Page 6 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

10(a) One mark per each correct logic gate with the correct input(s). 5

10(b) One mark per logic gate name and one mark per correct drawing. 2

− NAND

− NOR

© UCLES 2021 Page 7 of 8


0478/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

10(c) 4
A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 0

1 1 1 1

4 marks per 8 correct outputs


3 marks per 6/7 correct outputs
2 marks per 4/5 correct outputs
1 mark per 2/3 correct outputs

Question Answer Marks

11 One mark per each correct term. 5

Terms Description

HTML the language used to create a web page

Browser the type of software application used to display a


web page

IP address an address given to a computer, by a network, to


allow the computer to be uniquely identified

Cookie a text file sent by a web server to collect data about


a user’s browsing habits

Internet Service the company that provides a connection to the


Provider // ISP Internet

© UCLES 2021 Page 8 of 8


Cambridge IGCSE™
* 9 3 8 8 8 6 9 5 2 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS/FC) 202713/4
© UCLES 2021 [Turn over
2

1 (a) Denary is a number system that is used by programmers.

Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.

Tick
(✓)

Base-2

Base-10

Base-16
[1]

(b) Hexadecimal values can be used to represent denary values.

Convert these four hexadecimal values into denary values.

05 ......................................................

20 ......................................................

1A ......................................................

AB ......................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


3

(c) Hexadecimal values can also be converted to binary values.

Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.

(i) Hexadecimal value 25

Tick
(✓)

00011001

00100101

10100001
[1]

(ii) Hexadecimal value 1B

Tick
(✓)

00011011

10110001

00011010
[1]

(d) (i) Give one way that hexadecimal is used in website development.

..................................................................................................................................... [1]

(ii) Give one way that hexadecimal is used in low-level programming.

..................................................................................................................................... [1]

2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.

(a) One output device that is used in the ticket machine is a display screen.

Identify one other output device that is used in the ticket machine system.

............................................................................................................................................. [1]

(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.

Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


4

3 (a) Six statements are given about methods of data transmission.

Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.

Serial Parallel Parallel Serial


Statement simplex simplex half-duplex duplex
(✓) (✓) (✓) (✓)

bits are transmitted along a single wire

data is transmitted in both directions

it is only suitable for distances less


than 5 metres
bits from the same byte are
transmitted one after the other
data may not arrive in the correct
sequence
data is transmitted in both directions,
but only one direction at a time
[6]

(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.

Give three benefits of using a USB connection for this purpose.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0478/12/O/N/21


5

4 The paragraph explains the operation of different touch screen technologies.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive

In ............................................................................ touch screen technology, an electrostatic field

is present on the surface of the touch screen. The ............................................................................

properties of a user cause a ............................................................................ in the field. The

............................................................................ of the user’s touch can be calculated.

In ............................................................................ touch screen technology, a user pushes the

top layer of the screen and makes it connect with the bottom layer to complete a

............................................................................ .

This type of touch screen is cheaper to ............................................................................ .


[7]

© UCLES 2021 0478/12/O/N/21 [Turn over


6

5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.

Sammi does not connect the laptop to any networks.

(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.

One method he uses to prevent others viewing the data is encryption.

Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Sammi creates videos for the finance company website that give customers advice about
their finances.

He uses lossy compression to reduce the file size of the videos for the website.

(i) Give three ways that lossy compression can reduce the file size of the videos.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give one drawback of using lossy compression to reduce the file size of the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/12/O/N/21


7

(c) Sammi could have used lossless compression to compress the videos for the website.

(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.

Disadvantage 1 .................................................................................................................

...........................................................................................................................................

Disadvantage 2 .................................................................................................................

...........................................................................................................................................
[2]

6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.

(a) Give one similarity between a compiler and an interpreter.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between a compiler and an interpreter.

Difference 1 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Identify one other type of translator.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


8

7 Five statements are given about devices.

Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.

3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning

scans the shape and appearance of an object

uses reflected light from a laser to convert


a black-and-white pattern into binary
can often be built into an Electronic Point Of Sale
(EPOS) terminal, for example, a supermarket checkout

it is an example of an input device


[5]

8 An electronic game has three square mats that are coloured red, green and blue.

The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.

The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.

Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


9

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [7]

9 Padma opens an application on her computer.

An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.

(a) Give three other examples of when an interrupt signal could be generated.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) State what would happen if interrupt signals were not used in a computer.

...................................................................................................................................................

............................................................................................................................................. [1]

10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.

(a) Explain how the SSL protocol secures the data for transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.

............................................................................................................................................. [1]

(c) Give two ways that a user can identify if a website uses secure data transmission.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2021 0478/12/O/N/21 [Turn over
10

11 Consider the following logic statement:

X = (((A AND B) OR (NOT (B OR C))) NAND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2021 0478/12/O/N/21


11

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) Identify two logic gates that are not included in the given logic statement.

Logic gate 1 ...............................................................................................................................

Logic gate 2 ..............................................................................................................................


[2]

© UCLES 2021 0478/12/O/N/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/O/N/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/12


Paper 1 October/November 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2021 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2021 Page 2 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2021 Page 3 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

1(a) − Base-10 1

1(b) − 5 4
− 32
− 26
− 171

1(c)(i) − 00100101 1

1(c)(ii) − 00011011 1

1(d)(i) Any one from: 1


− To represent HTML colour codes
− In error messages

1(d)(ii) Any one from: 1


− Assembly code/language
− Memory address locations
− In error messages
− Memory dump

© UCLES 2021 Page 4 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

2(a) Any one from: 1


− Printer
− Speaker
− Light/LED
− Actuator

2(b) Any one from: 1


− Touchscreen
− Trackpad / touchpad
− Microphone
− QR code reader
− Barcode reader
− Magnetic strip reader
− RFID reader

© UCLES 2021 Page 5 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

3(a) One mark per each correct row. 6

Parallel Parallel Serial


Serial
Statement simplex half-duplex duplex
simplex ()
() () ()

bits are transmitted along a single wire  

data is transmitted in both directions  

it is only suitable for distances less than 5  


metres

Bits from the same byte are transmitted one  


after the other

data may not arrive in the correct sequence  

data is transmitted in both directions, but 


only one direction at a time

3(b) Any three from: 3


− Can charge/power the mobile device (at the same time)
− (Uses serial transmission so) data less likely to be skewed / corrupted
− Universal / industry standard / connection
− Cable can only be plugged in one way // Cannot be inserted incorrectly
− Fast transmission speed
− Backward compatible
− Supports different transmission speeds
− Automatically detects device // Automatically downloads drivers

© UCLES 2021 Page 6 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

4 One mark per each correct term in the correct order. 7


− Capacitive
− Conductive // Capacitive
− Change
− Coordinates
− Resistive
− Circuit
− Manufacture

Question Answer Marks

5(a) Any three from: 3


− Password
− Add a biometric device to the laptop // set biometric password
− Use two-step verification // Use two factor authentication
− Physically lock the laptop away in a secure cupboard // Taking laptop with him at all times

5(b)(i) Any three from: 3


− A compression algorithm is used
− The resolution could be reduced
− Colour depth could be reduced // bits per pixel reduced
− Sounds not heard by human ear could be removed // Perceptual music shaping can be used
− Repeating frames could be removed

5(b)(ii) Any one from: 1


− Quality may be reduced
− Data is lost // original file cannot be reconstructed

5(c)(i) Any one from: 1


− Maintains quality // quality better than lossy
− Original file is retained // Data is not permanently lost
− A significant reduction in file size is not required

© UCLES 2021 Page 7 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

5(c)(ii) Any two from: 2


− Takes more time to transmit file // Takes more time to upload to web server // Takes more time to download to
customer // Web page will load slower
− Takes up more storage space
− Data usage would be increased
− Uses more bandwidth

Question Answer Marks

6(a) Any one from: 1


− They both translate high-level language into machine code / low-level language
− They both check for errors
− They both report errors

6(b) Four from (Max 2 per translator): 4


− An interpreter translates and executes the code line by line
− … whereas a compiler translates and executes the whole code all in one go

− An interpreter stops translating and reports an error as it finds one


− … whereas a compiler produces an error report at the end of translation

− An interpreter does not produce an executable file


− … but a compiler does produce an executable file

− An interpreter will execute the code until it finds an error


− … whereas a compiler will not execute any code if there are errors present

− An interpreter allows correction of errors in real-time


− … whereas a compiler needs to retranslate the code each time after errors are found and corrected

6(c) − Assembler 1

© UCLES 2021 Page 8 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

7 One mark per each correct row. 5

3D scanner Barcode QR code


Statement
() reader () reader ()

uses position and alignment markers for orientation when scanning 

scans the shape and appearance of an object 

uses reflected light from a laser to convert a  ()


black-and-white pattern into binary

can often be built into an Electronic Point Of Sale (EPOS) terminal, for  ()
example, a supermarket checkout

it is an example of an input device   

Question Answer Marks

8 Seven from: 7
− Timer is started
− Pressure sensor (within each mat)
− Sensor sends data to microprocessor
− Analogue data is converted to digital (using ADC)
− Microprocessor compares data to stored value(s)
− If data matches / in/out range microprocessor stops timer
− If data matches / in/out range microprocessor checks if data has come from correct colour mat sensor
− If data matches / in/out range microprocessor checks to see if timer is stopped at less than 1 second
− If data matches / in/out range microprocessor increments counter if timer is less than 1 second and colour/mat is
correct
− If correct colour/mat is hit, timer is reset and the whole process is repeated
− If data has not come from the correct colour mat sensor the game ends

© UCLES 2021 Page 9 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

9(a) Any three from: e.g. 3


− A suitable description of any error that might occur
− A peripheral is connected/disconnected
− A key on a keyboard is pressed
− A mouse button click
− A phone/video call is received
− A buffer requires more data
− A printer has a paper jam
− A printer runs out of paper
− A printer runs out of ink
− When switching from one application to another

NOTE: If three suitable different errors are described, this can be awarded three marks.

9(b) Any one from: 1


− The computer would only start a new task when it had finished processing the current task // by example
− Computer will not be able to multitask
− Errors may not be dealt with
− Computer would become impossible to use

Question Answer Marks

10(a) − Enables an encrypted link (between the browser and the web server) // It encrypts the data 2
− … based on the authentication of an (SSL) certificate // and will only send it if the certificate is authentic

10(b) − Transport Layer Security // TLS 1

10(c) Any two from: 2


− URL begins with HTTPS
− Padlock symbol is locked
− Check the certificate is valid

© UCLES 2021 Page 10 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

11(a) One mark per each correct logic gate with correct input(s) 5

B X

© UCLES 2021 Page 11 of 12


0478/12 Cambridge IGCSE – Mark Scheme October/November 2021
PUBLISHED
Question Answer Marks

11(b) 4 marks for 8 correct outputs 4


3 marks for 6/7 correct outputs
2 marks for 4/5 correct outputs
1 mark for 2/3 correct outputs

A B C Working space X

0 0 0 1

0 0 1 1

0 1 0 1

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0

11(c) − NOR 2
− XOR / EOR

© UCLES 2021 Page 12 of 12


Cambridge IGCSE™
* 1 6 1 7 9 3 6 7 6 4 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (PQ/FC) 202714/5
© UCLES 2021 [Turn over
2

1 (a) Xia has three files stored on her computer.

Tick (3) one box to show which is the largest file size.

Tick
File size
(✔)
999 kB

1 MB

850 000 bytes


[1]

(b) Denise has three files stored on her computer.

Tick (3) one box to show which is the smallest file size.

Tick
File size
(✔)
4000 MB

2 GB

2 500 000 kB
[1]

© UCLES 2021 0478/13/O/N/21


3

2 A sports stadium has an electronic counter that counts each person that enters the stadium.

The count is stored as binary in a 16-bit register.

A denary value of the count is displayed on a screen at the entrance.

(a) The screen currently displays:

0 0 7 1

Give the binary value that is stored in the register to display the count shown.

Binary value: .............................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) More people enter the sports stadium and the screen now displays:

0 2 5 7

Give the binary value that is stored in the register to display the count shown.

Binary value: .............................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/O/N/21 [Turn over


4

(c) After everyone has entered the stadium, the register stores the binary value:

0000001000000100
Show what the screen will display when this binary value is stored.

Display:

[1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Sensors are used at the entrance to count the number of people entering the stadium.

(i) Identify two sensors that could be used to count the number of people entering the
stadium.

Sensor 1 ............................................................................................................................

Sensor 2 ............................................................................................................................
[2]

(ii) Tick (3) one box to show if a sensor is an example of an input device, storage device or
output device.

Tick
Device
(✔)
input

storage

output
[1]

© UCLES 2021 0478/13/O/N/21


5

3 Five statements are given about error-checking methods.

(a) Tick (3) to show whether each statement applies to Automatic Repeat reQuest (ARQ), check
digit or checksum. Some statements may apply to more than one error-checking method.

ARQ Check digit Checksum


Statement
(✔) (✔) (✔)

checks for errors on data entry

uses a process of acknowledgement and


timeout
compares two calculated values to see if an
error has occurred
may resend data until it is confirmed as
received
checks for errors in data after transmission
from a computer to another
[5]

(b) Identify one other error-checking method.

............................................................................................................................................. [1]

© UCLES 2021 0478/13/O/N/21 [Turn over


6

4 Frederick prints a document that he has typed.

The printer begins to print the document, but then a message is displayed on Frederick’s computer
to say that the paper has jammed.

(a) Describe the role of an interrupt in generating a message on the computer that the paper has
jammed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Give two other examples of when an interrupt signal could be generated.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The type of data transmission between the computer and the printer is serial half-duplex data
transmission.

(i) Describe how data is transmitted using serial half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/13/O/N/21


7

(ii) Explain why the data transmission needs to be half-duplex rather than simplex.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

5 In a Von Neumann model for a computer system, a Central Processing Unit (CPU) contains a
number of different components.

The table contains the name of a component or a description of their role in the fetch-execute
cycle.

Complete the table with the missing component names and descriptions.

Component name Description

............................................................................................................
Memory Address
Register (MAR) ............................................................................................................

............................................................................................................

............................................................................................................
Program Counter (PC)
............................................................................................................

............................................................................................................

This is a register that is built into the arithmetic logic unit. It


......................................
temporarily holds the result of a calculation.

This is a register that holds data or an instruction that has been


......................................
fetched from memory.

............................................................................................................
Control Unit (CU)
............................................................................................................

............................................................................................................

...................................... This carries addresses around the CPU.

[6]

© UCLES 2021 0478/13/O/N/21 [Turn over


8

6 The paragraph describes an MP3 file, MP4 file and a MIDI file.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• can
• cannot
• compressed
• image
• microphone
• MIDI
• MP3
• MP4
• notes
• pixels
• speaker
• should
• uncompressed

................................................................. files are a multimedia format that stores video and audio.

................................................................. files are only used as a digital recording of sound; they

are created using a ................................................................. and recording software. The data in

the file is ................................................................. .

................................................................. files contain instructions on how to create the

sound. They are created using digital instruments. The file stores individual

................................................................., each one ................................................................. be

changed in this type of file.


[7]

© UCLES 2021 0478/13/O/N/21


9

7 Julius creates a computer application that calculates how many years it will take to pay for a
house.

(a) Julius uploads his application to his website for people to download. Before he uploads the
application, he translates the code using a compiler.

Explain why Julius uses a compiler, rather than an interpreter, to do this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Julius also creates videos to explain how to use the application that he has created. He
reduces the file size of the videos using lossless compression.

(i) Describe how lossless compression reduces the file size of the video.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) State why Julius uses lossless compression, rather than lossy compression.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/13/O/N/21 [Turn over


10

(c) Julius wants to distribute his application to a wider audience. He is considering distributing it
as freeware or free software.

(i) Describe freeware and free software.

Freeware ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Free software ....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Julius also considers distributing a trial version of the application.

Identify the type of software he could use to distribute his application as a trial version.

..................................................................................................................................... [1]

(d) Julius makes sure that all data transmission to and from his website is secure.

One way a user can check if his website uses secure data transmission is to check its
certificate.

Give two other ways that a user can identify if his website uses secure data transmission.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/O/N/21


11

8 Consider the following logic statement:

X = (((A OR B) AND (NOT(B XOR C))) OR NOT C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B
X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2021 0478/13/O/N/21 [Turn over


12

9 A parity check is used to check for errors after transmission on the four given binary values.

All four values are transmitted and received correctly.

Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd or
even in the type of parity column.

Binary value Type of parity

10011001

01111110

11100000

00111001

[4]

10 (a) A denial of service (DoS) attack is a type of Internet security risk.

State the purpose of a denial of service attack.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Phishing and pharming are also types of Internet security risk. They have the same purpose.

State the purpose of phishing and pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Identify three other types of Internet security risk.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/13/O/N/21


Cambridge IGCSE™

COMPUTER SCIENCE 0478/13


Paper 1 October/November 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 8 printed pages.

© UCLES 2021 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1(a) One mark for the correct tick 1

File Size Tick


()

999 kB

1 MB 

850 000 bytes

1(b) One mark for the correct tick 1

File Size Tick


()

4000 MB

2 GB 

2 500 000 kB

Question Answer Marks

2(a) One mark for correct binary value, one mark for leading zeros 2

00000000 01000111

2(b) One mark for leading zeros, one mark for correct binary value 2

00000001 00000001

2(c) − 0516 1

2(d)(i) − Pressure sensor 2


− Motion sensor

2(d)(ii) One mark for the correct tick 1

Device Tick
()

input 

storage

output

© UCLES 2021 Page 3 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

3(a) One mark per each row 5

Statement ARQ Check digit Checksum


() () ()

checks for errors on data entry 

uses a process of acknowledgement 


and timeout

compares two calculated values to  


see if an error has occurred

may resend data until it is confirmed 


as received

checks for errors in data after 


transmission from a computer to
another

3(b) − Parity check 1

Question Answer Marks

4(a) Any four from: 4


− Printer generates interrupt
− Interrupt is given a priority
− Interrupt is queued
− Interrupt stops CPU from processing current task
− CPU will service interrupt // Interrupt handler services interrupt …
− … generating an output message to state there is a paper jam

4(b) Any two from: 2


− A suitable description of any error that might occur
− A peripheral is connected/disconnected
− A key on a keyboard is pressed
− A mouse button click
− A phone/video call is received
− A buffer requires more data
− A printer runs out of paper
− A printer runs out of ink
− Opening an application
− When switching from one application to another

NOTE: If two suitable different errors are described, this can be awarded two
marks

© UCLES 2021 Page 4 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(c)(i) Four from: 4


− Bits sent one at a time
− … down a single wire
− Data sent in both directions …
− … but only one direction at a time

4(c)(ii) Any two from: 2


− Simplex only sends data in one direction
− … so, printer may not be able to tell computer an error has occurred, and
computer may not be able to send printer the document to be printed

NOTE: Award any valid contextual answer for MP2

Question Answer Marks

5 One mark per correct term or description. 6

Component name Description

Memory Address (A register that) holds the address of the


Register (MAR) data/instruction that needs to be
fetched/processed // holds the address of where
the data needs to be stored.

Program Counter (PC) (A register that) holds the address of the next /
current instruction to be processed.

accumulator // ACC This is a register that is built into the arithmetic


logic unit. It temporary holds the result of a
calculation.

memory data register // This is a register that holds data or an instruction


MDR that has been fetched from memory.

Control Unit (CU) Sends control signals to control the flow of data
through the CPU // manages the execution of
instructions in the CPU

address bus This carries addresses around the CPU.

Question Answer Marks

6 One mark per correct term in the correct order. 7


− MP4
− MP3
− Microphone
− Compressed
− MIDI
− Notes
− Can

© UCLES 2021 Page 5 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

7(a) Any four from: 4


− Creates an executable file
− … so, would not release source code
− … so, the source code cannot be stolen/edited.
− … so, would not need to be translated every time // so, translator is not
required
− … making it machine independent

7(b)(i) Any three from: 3


− Compression algorithm used
− …, e.g. RLE
− Repeating frames/pixels are identified
− … and are collated/indexed
− No data is permanently removed
− It just records the changes between frames/pixels

7(b)(ii) Any one from: 1


− Maintains quality // quality better than lossy
− Original file is retained // Data is not permanently lost
− A significant reduction in file size is not required

7(c)(i) Any four from : (MAX 3 per software licence) 4

Freeware:
− User does not have access to the source code
− Has copyright
− User does not have the right to edit the software
− Normally distributed for free // no cost

Free software:
− User has access to the source code
− Still has copyright // Is copyleft
− User has the right to edit and share the software
− Normally has a fee // cost to buy

7(c)(ii) − Distribute as shareware 1

7(d) Any two from: 2


− URL begins with HTTPS
− Padlock symbol is locked

© UCLES 2021 Page 6 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(a) One mark per each correct logic gate with correct inputs 6
.

8(b) 4 marks for 8 correct outputs 4


3 marks for 6/7 correct outputs
2 marks for 4/5 correct outputs
1 mark for 2/3 correct outputs

A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 1

1 0 1 0

1 1 0 1

1 1 1 1

Question Answer Marks

9 − Even 4
− Even
− Odd
− Even

© UCLES 2021 Page 7 of 8


0478/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

10(a) − To disrupt the operation of a web server/network 1

10(b) − To obtain a user’s personal data 1

10(c) Any three from: 3


− Hacking // Cracking
− Virus
− Spyware
− Malware

© UCLES 2021 Page 8 of 8


Cambridge IGCSE™
* 7 2 3 3 0 0 5 5 8 3 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (PQ) 303750/3
© UCLES 2022 [Turn over
2

1 Jack has an MP3 file stored on his computer.

(a) (i) Tick (3) to show which type of data is stored in an MP3 file.

Tick (3)

Video

Sound

Image
[1]

(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.

Tick (3)

Lossy compressed file

Lossless compressed file

Not a compressed file


[1]

2 A computer is designed using the Von Neumann model for a computer system.

The computer has a central processing unit (CPU).

(a) Data is fetched from primary storage into the CPU to be processed.

(i) State the name of the primary storage from where data is fetched.

..................................................................................................................................... [1]

(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.

State the names of the second and third stages in the cycle.

Second stage ....................................................................................................................

Third stage ........................................................................................................................


[2]

(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.

Component 1 .....................................................................................................................

Component 2 .....................................................................................................................
[2]

© UCLES 2022 0478/11/M/J/22


3

3 Three types of storage media are magnetic, optical and solid state.

(a) One example of solid‑state storage is a Solid State Drive (SSD).

Identify one other example of solid‑state storage.

............................................................................................................................................. [1]

(b) Optical storage uses a laser to store and read data from a disk.

Explain how the laser is used to store and read data from the disk.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) A business is creating a new mobile device that has an SSD as secondary storage.

(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.

Reason 1 ...........................................................................................................................

...........................................................................................................................................

Reason 2 ...........................................................................................................................

...........................................................................................................................................

Reason 3 ...........................................................................................................................

...........................................................................................................................................
[3]

(ii) Identify two examples of software that can be stored on the SSD.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

© UCLES 2022 0478/11/M/J/22 [Turn over


4

4 All data needs to be converted to binary data so that it can be processed by a computer.

(a) Explain why a computer can only process binary data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.

Give the 8‑bit binary value for each denary value.

64 ..............................................................................................................................................

101 ............................................................................................................................................

242 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) The hexadecimal values 42 and CE are converted to binary.

Give the binary value for each hexadecimal value.

42 ..............................................................................................................................................

CE .............................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2022 0478/11/M/J/22


5

5 An image is stored on a computer. The image is 16‑bit colour and is 100 pixels high and
150 pixels wide.

Calculate the file size of the image in bytes. Show all your working.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Answer ................................................ bytes


[3]

6 A compiler and an interpreter are two different types of translator.

(a) One similarity between a compiler and an interpreter is that they both translate high‑level
language into machine code.

(i) Give one other similarity between a compiler and an interpreter.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain two differences between a compiler and an interpreter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2022 0478/11/M/J/22 [Turn over


6

7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).

(a) State what is meant by a biometric password.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two reasons why a biometric password is more secure than a PIN.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

(c) Adele has a software‑based firewall installed on her mobile device.

The firewall gathers data about the traffic coming into and going out of her mobile device.

Explain how the firewall uses the gathered data to keep the mobile device more secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) Adele also encrypts the data on her mobile device to keep it more secure.

State how encryption will keep the data more secure.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2022 0478/11/M/J/22


7

BLANK PAGE

© UCLES 2022 0478/11/M/J/22 [Turn over


8

8 Consider the following logic statement:

X = (((A AND NOT B) OR (NOT (B NOR C))) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[6]

© UCLES 2022 0478/11/M/J/22


9

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2022 0478/11/M/J/22 [Turn over


10

9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).

Five statements are given about the Internet terms.

Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.

Browser IP address URL


Statement
(3) (3) (3)

it contains the domain name

it is a type of software

it converts Hypertext Markup Language (HTML)


to display web pages

it is a type of address

it stores cookies

[5]

10 Many devices have a Media Access Control (MAC) address.

Give three features of a MAC address.

Feature 1 ..........................................................................................................................................

..........................................................................................................................................................

Feature 2 ..........................................................................................................................................

..........................................................................................................................................................

Feature 3 ..........................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2022 0478/11/M/J/22


11

11 (a) The paragraph describes the process of printing a document using an inkjet printer.

Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.

• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner

Data is sent from the computer to the printer. The data is held in a print

........................................................................ that is temporary storage until the data is

processed to be printed.

Inkjet printers operate by having a print head that moves

........................................................................ side to side across the page. These

spray ........................................................................ ink droplets onto the page. These ink

droplets can be created using piezoelectric or ........................................................................

technology.

If the paper jams in the printing process, the printing stops and an

........................................................................ is sent to the computer.


[5]

(b) A printer is one example of an output device.

Give three other examples of output devices.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]

(c) Give three examples of input devices.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]
© UCLES 2022 0478/11/M/J/22 [Turn over
12

12 Computer ethics are a concern for any users of the Internet.

Identify and describe three ethical issues that could be a concern when using the Internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/11/M/J/22


Cambridge IGCSE™

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2022 [Turn over


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.

© UCLES 2022 Page 3 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1(a)(i)  Sound 1

1(a)(ii)  Lossy compressed file 1

Question Answer Marks

2(a)(i)  Random access memory // RAM 1

2(a)(ii) One mark for each correct stage 2

Second stage
 Decode

Third stage
 Execute

2(a)(iii) Any two from: 2


 Memory address register // MAR
 Memory data register //MDR
 Program counter // PC
 Control unit // CU
 Address bus
 Data bus
 Control bus

© UCLES 2022 Page 4 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

3(a) Any one from e.g.: 1


 SD card
 USB flash memory drive
 Random access memory // RAM

3(b) Any three from: 3

 Laser is shone at the disk


 An (arm/head) moves the laser across the surface of the disk
 The laser burns pits onto the surface of the disk
 The laser is used to read the pits and lands on the surface of the disk
 The reflected light from the laser shining on the disk is captured (by a sensor)

3(c)(i) Any three from: 3

 It is small in size // compact // lightweight // portable


 It has low power consumption
 It runs quietly
 It runs at a cool temperature
 It is robust when dropped // durable
 Fast access/read/write speed
 High capacity
 Not affected by magnets

3(c)(ii)  Operating system 2


 Application software // by example
 Utility software // by example

© UCLES 2022 Page 5 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(a)  Computer consist of transistors / logic circuits/gates … 2


 … that can only store/process data in two states / high-low / on-off / 1 and 0

4(b)  01000000 3
 01100101
 11110010

4(c)  0100 (1 mark) 0010 (1 mark) 4


 1100 (1 mark) 1110 (1 mark)

Question Answer Marks

5 Two marks for two correct stages of working, one mark for correct final answer 3

 100  150
 15 000  16 // 15 000  2
 240 000 / 8

 30 000 bytes

© UCLES 2022 Page 6 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(a)(i)  They both report/check for errors 1

6(a)(ii) Four from (MAX 2 per translator): 4

 An interpreter translates the code line by line (and executes each line immediately)
 … whereas a compiler translates the whole code at the same time (before executing it)

 A compiler produces an executable file


 … but an interpreter does not

 An interpreter is required to run the code each time if used


 … whereas a compiler is not

 An interpreter stops and reports an error as it is encountered


 … whereas a compiler creates a report of all errors at the end of translation

 An interpreter will run code up to the point it finds an error


 … whereas a compiler will not run the code at all if an error is found

Question Answer Marks

7(a) Any one from: 1


 Uses biological data
 It uses characteristics/features that belong to a human

7(b) Any two from: 2


 A biometric password cannot be guessed
 It is very difficult to fake a biometric password
 A biometric password cannot be recorded by a keylogger/spyware
 A perpetrator cannot shoulder surf to see a biometric password

© UCLES 2022 Page 7 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(c) Any three from: 3

 The traffic/data is compared to set criteria/rules/whitelist/blacklist


 If the traffic/data does/does not meet the criteria/rules/whitelist/blacklist it will be rejected/blocked …
 … and an alert can be sent to warn Adele
 … this can help prevent hackers/malicious software (gaining access to the data)

7(d)  It makes the data meaningless 1

Question Answer Marks

8(a) One mark for each correct logic gate with correct input(s) 6

© UCLES 2022 Page 8 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8(b) Four marks for 8 correct outputs 4


Three marks for 6/7 correct outputs
Two marks for 4/5 correct outputs
One mark for 2/3 correct outputs

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 0

1 1 1 1

© UCLES 2022 Page 9 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(a) One mark for each correct row: 5

Statement Browser IP address URL


() () ()

it contains the domain name 

it is a type of software 

it converts Hypertext Markup 


Language (HTML) to display web pages

it is a type of address  

it stores cookies 

Question Answer Marks

10 Any three from: 3

 It is a unique address
 It is assigned by the manufacturer
 It can be used to identify a device
 It contains the manufacturer ID/code/number
 It contains the serial code/number
 It is written in hexadecimal
 It has 6 bytes/48 bits/6 pairs of digits
 Does not (usually) change // static

© UCLES 2022 Page 10 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11(a) One mark for each of the correct terms, in the correct place 5
 buffer
 nozzles
 liquid
 thermal bubble
 interrupt

11(b) Any three from e.g.: 3

 Monitor // screen
 Speaker
 Headphones
 Light // LED
 (2D/3D) cutter
 DLP // LCD projector
 Actuator

11(c) Any two from e.g.: 3

 Keyboard
 Mouse // trackerball
 Microphone
 (2D/3D) scanner
 Barcode reader
 QR code reader
 Digital camera // webcam
 Interactive whiteboard
 Touchscreen
 Sensor

© UCLES 2022 Page 11 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12 One mark for identification of an issue and one mark for a description e.g.: 6

 Plagiarism
– The copying of other people’s work without their permission
– Claiming someone else’s work as your own

 Hacking
– Unauthorised access to a computer/data

 Malware
– Malicious software designed to damage a computer system or stored data

 Spyware
– Keylogger used to record keypresses and sends them to third party

 Ransomware
– Holding hostage a user’s data, often for a release fee

 Intellectual property theft


– Stealing other people work

 Breaching copyright
– Breaking the law by copying someone’s work

 Piracy
– Using piracy websites to gain content for free that should have been paid for

 Privacy
– A person’s data could be leaked

 Phishing
– Sending an email to lure users to a fake site to obtain their personal details

© UCLES 2022 Page 12 of 13


0478/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12  Pharming
– Downloading of malicious code to redirect user to fake website to obtain their personal details

 Data protection
– A person’s data is not used according to the law

 Cyber bullying
– Using the internet to bully people

 Inappropriate materials
– Materials that could cause harm/offense to people e.g. minors

 Fake news
– News stories that could be very misleading or harmful

 Software cracking
– Changing code to e.g. bypass a licence for software

 Addiction
– Aspects of the internet e.g. social media can cause this

 Environmental effects
– Increased use of the internet increases the use of electrical power

© UCLES 2022 Page 13 of 13


Cambridge IGCSE™
* 4 9 1 4 2 9 0 2 3 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (RW) 303775/2
© UCLES 2022 [Turn over
2

1 (a) Denary values are converted to binary values to be processed by a computer.

Draw one line from each denary value to the correctly converted 8‑bit binary value.

Denary 8-bit binary

00100001

41
10100110

00101001

174

10000110

10101110
86

01010110

[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Binary values can also be converted to denary values.

Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Denary value ..........................................................


[2]

© UCLES 2022 0478/12/M/J/22


3

2 Hexadecimal is used for Hypertext Markup Language (HTML) colour codes.

An HTML colour code is:


#2F15D6
Each pair of digits is stored as binary in an 8‑bit register.

(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.

2F

15

D6

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.

Give two other examples of where hexadecimal can be used in Computer Science.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................
[2]

© UCLES 2022 0478/12/M/J/22 [Turn over


4

(c) Websites can be created using HTML structure and presentation.

State what is meant by HTML structure and presentation.

Give an example of each in your answer.

Structure ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(d) Explain why presentation is often separated from structure when creating a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/12/M/J/22


5

3 Joelle is a student who uses the Internet.

(a) The table contains five terms or definitions that relate to the Internet.

Complete the table by writing each missing term or definition.

Term Definition

........................................................................................

browser ........................................................................................

........................................................................................

this is the company that provides a user with a


...................................................
connection to the Internet

this is a protocol that is used to send data for web


...................................................
pages across the Internet

........................................................................................

Uniform Resource Locator (URL) ........................................................................................

........................................................................................

........................................................................................

cookie ........................................................................................

........................................................................................

[5]

© UCLES 2022 0478/12/M/J/22 [Turn over


6

(b) Joelle uses a firewall to keep her data safe when she uses the Internet.

Tick (3) to show which statement about firewalls is true.

Tick (3)

Firewalls can only be hardware‑based

Firewalls can only be software‑based

Firewalls can be hardware‑based or software‑based


[1]

(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.

Explain how the firewall is used to limit the websites that Joelle can access.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/12/M/J/22


7

4 Jason is a programmer who writes computer programs in a high‑level language.

(a) Describe what is meant by a high‑level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.

(i) Explain one drawback to a user if the program is distributed as freeware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain one benefit to a user if the program is distributed as free software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/12/M/J/22 [Turn over


8

5 Consider the following logic statement:

X = ((A OR B) AND (NOT (B XOR C)) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2022 0478/12/M/J/22


9

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

6 Millions of emails are sent between users on a daily basis.

(a) Identify two online security attacks that can be carried out using email.

Describe how email is used to enable the attack.

Online security attack 1 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Online security attack 2 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


10

(b) Online security attacks can maliciously damage data.

One security method to keep data safe from online attacks is a firewall.

Identify two other security methods that keep data safe from online attacks.

Security method 1 .....................................................................................................................

Security method 2 .....................................................................................................................


[2]

(c) Data can also be damaged accidentally.

One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.

Complete the table by giving three other examples of how data can be damaged accidentally.

Give a method of prevention for each example.

Example Method of prevention

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

[6]

© UCLES 2022 0478/12/M/J/22


11

7 Cassie stores data for her business every day. She stores the data using optical data storage.

(a) Identify three examples of optical data storage.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]

(b) Six statements are given about the operation of three different types of storage.

Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.

Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)

this storage has no moving parts

this storage uses a laser to read and write data

this storage uses a read/write head

this storage burns pits onto a reflective surface

this storage uses NAND and NOR technology

this storage stores data in tracks and sectors

[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


12

8 Sam develops a software application. He distributes a version of the software as shareware.

(a) Describe what is meant by shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify three ethical issues that may need to be considered when developing and distributing
software.

Ethical issue 1 ..........................................................................................................................

Ethical issue 2 ..........................................................................................................................

Ethical issue 3 ..........................................................................................................................


[3]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/M/J/22


Cambridge IGCSE™

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2022 [Turn over


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.

© UCLES 2022 Page 3 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1(a) One mark for each correct line 3

Denary 8-bit binary

00100001

41 10100110

00101001

174

10000110

86 10101110

01010110

1(b) One mark for correct working, one mark for correct answer 2

Working e.g.
 256  64  16  4  2  1

Answer:
 343

© UCLES 2022 Page 4 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

2(a) Two marks each correct conversion (one mark for the first four bits, one mark for the second four bits) 6

0 0 1 0 1 1 1 1
2F

0 0 0 1 0 1 0 1
15

1 1 0 1 0 1 1 0
D6

2(b) Any two from: 2


 IP address
 Error messages/codes
 Assembly language // low-level language
 URL // web address
 Memory dumps
 Locations in memory

2(c) One mark for a description, one mark for a correct example 4

Structure
 Layout of the web page
 e.g. Where text is placed

Presentation
 Formatting of the web page
 e.g. the colour of the font

© UCLES 2022 Page 5 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

2(d) Two from: 2

 The formatting of the page can be changed/edited without needing to alter the structure
 … so, they can make regular updates without needing to check the structure

 The formatting document can be used again for a different website …


 If further content and web pages are added to the website, the necessary formatting can be easily applied …
 … so, this can save time when developing/updating a website
 Allows use of CSS to standardise formatting
 … so, CSS only needs to be created once (to be applied to each webpage)

© UCLES 2022 Page 6 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

3(a) One mark for the correct term or definition 5

Term Definition

browser Software/application that allows users to view web


pages / render HTML

Internet Service this is the company that provides a user with a


provider // ISP connection to the Internet

HTTP // HTTPS this is a protocol that is used to send data for web
pages across the Internet

Uniform Resource a text-based version of a web address


Locator (URL)

cookie a text file (stored by web browser) that contains data


about a user’s browsing habits/details/preferences

3(b)  Hardware or software based 1

3(c) Four from: 4

 (The parent can) set criteria for the websites she is allowed to visit
 … such as a whitelist/blacklist of websites
 The firewall will examine the data/traffic incoming and outgoing from her computer
 If data is sent from a website that is not allowed, it will be blocked

© UCLES 2022 Page 7 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(a) Any three from: 3

 It uses English-like statements


 It needs to be converted to machine code (to be processed by a computer)
 … using a translator
 It is portable
 One line of code can perform multiple commands

4(b)(i) Two from: 2

 The user is not allowed to access the source code …


 … so, they cannot tailor the software to their needs
 … so, they cannot fix any bugs in it
 The software is still covered by copyright
 The user must get the owner’s permission to do anything beyond using it

4(b)(ii) Two from: 2

 The user can access the source code …


 … so, they can tailor the software to their needs
 … so, they can fix any bugs in it
 … so, the source code could be studied for educational purposes
 The user can redistribute the software/program …
 … but this must be done under the same terms as the original software

© UCLES 2022 Page 8 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5(a) One mark for each correct logic gate with correct input(s) 5

5(b) Four marks for 8 correct outputs 4


Three marks for 6/7 correct outputs
Two marks for 4/5 correct outputs
One mark for 2/3 correct outputs

A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 0

1 1 0 0

1 1 1 1

© UCLES 2022 Page 9 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(a) One mark for identifying the attack, two marks for the description 6

 Phishing
 Email is sent to user to encourage them to click link
 … that takes user to fake website

Pharming
 Email is sent to user to encourage them to click link/download attachment
 … that triggers download of malicious code that will redirect user to fake website

Virus/malware
 Email is sent to user to encourage them to click link/download attachment
 … that triggers download of virus/malware

Denial of service // DoS


 A very large number of emails are sent to a server/network at the same time
 … crashing the server/network

6(b) Any two from: 2

 Encryption
 Password
 Two-step / Two-factor authentication/verification
 Biometric device
 Anti-malware // Anti-virus
 Proxy-server

© UCLES 2022 Page 10 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(c) One mark for identifying an issue, one mark for suggesting a suitable prevention 6

 Power surge/loss (damages hardware)


 Use a UPS

 Water can be spilled on the device


 Don’t have water near the device
 Keep device in a waterproof box when not is use

 Fire can destroy device


 Use electrics safety
 Keep device in a fireproof box when not is use

 Data is accidentally deleted


 Add verification method for data deletion
 Set access levels for data to limit who can delete the data

 Incorrect use of storage device


 Making sure device is ejected before removing

 Physical damage to hardware // hardware failure


 Correct care and maintenance of hardware

 Software failure
 Making sure it is always up to date // enable automatic updates

© UCLES 2022 Page 11 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(a) Three from: 3

 CD
 DVD
 Blu-ray

7(b) One mark for each correct row 6

Type of storage

Statement Magnetic Optical Solid


() () state
()

this storage has no moving parts 

this storage uses a laser to read and write data 

this storage uses a read/write head  

this storage burns pits onto a reflective surface 

this storage uses NAND and NOR technology 

this storage stores data in tracks and sectors  ()

© UCLES 2022 Page 12 of 13


0478/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8(a) Any four from: 4

 Trial version of software


 … for a limited time / number of uses
 … with limited features
 … free of charge
 If full version is required need to pay fee / sign up // When trial over user is asked to pay / sign up
 Protected by copyright
 Type of software licence

8(b) Any three from: 3

e.g.
 Copyright
 Plagiarism
 Production/distribution of malware
 Intellectual property theft
 Privacy of data
 Age appropriation
 Offensive materials
 Environmental impact of distribution media e.g. CDs
 Accessibility of software
 Security of software
 Following guidelines of professional bodies e.g. ACM/IEEE/BCS

© UCLES 2022 Page 13 of 13


Cambridge IGCSE™
* 3 5 3 6 2 6 2 7 9 2 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CJ) 303905/4
© UCLES 2022 [Turn over
2

1 (a) The table lists five devices.

Tick (3) to show if each device is an example of an input device, an output device or a
storage device.

Input Output Storage


Device
(3) (3) (3)

keyboard

microphone

headphones

hard disk drive (HDD)

actuator
[5]

(b) There are three different types of storage device. One type is magnetic.

State the other two types of storage device.

Type 1 .......................................................................................................................................

Type 2 .......................................................................................................................................
[2]

© UCLES 2022 0478/13/M/J/22


3

2 An aeroplane has a small display screen above each seat, to display the seat number.

(a) The seat number is a hexadecimal value. A 12-bit binary register is used to store the data to
display each seat number.

Three seat numbers, 05A, 18C and 29F, are allocated to passengers.

Give the 12-bit binary value that would be stored for each hexadecimal seat number.

05A ...........................................................................................................................................

18C ...........................................................................................................................................

29F ...........................................................................................................................................
[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) The display screen used above each seat is a Light-Emitting Diode (LED) display screen.

Give two reasons why an LED display screen has been used.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

(c) Two of the registers store the values 010000001101 and 000001111110

Give the hexadecimal seat number that would be displayed on the screen for each of these
binary values.

010000001101 ....................................................................................

000001111110 ....................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2022 0478/13/M/J/22 [Turn over


4

3 AND, OR and XOR are three examples of logic gates.

(a) Four statements are given about these logic gates.

Tick (3) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.

AND OR XOR
Statement
(3) (3) (3)

if both inputs are 0, the output is 0

if both inputs are different, the output is 1

if both inputs are 1, the output is 1

if both inputs are the same, the output is always 0

[4]

(b) NOT, AND, OR and XOR are all examples of logic gates.

State the name of two other logic gates and complete a truth table for each.

Logic gate 1 ............................................................ Truth table:

A B Output

0 0

0 1

1 0

1 1

Logic gate 2 ............................................................ Truth table:

A B Output

0 0

0 1

1 0

1 1
[4]

© UCLES 2022 0478/13/M/J/22


5

4 Freddie types a Uniform Resource Locator (URL) into the address bar of his browser.

(a) A URL is a text-based version of a website address. It is made up of several different parts.

State the names of three different parts of a URL.

Part 1 ........................................................................................................................................

Part 2 ........................................................................................................................................

Part 3 ........................................................................................................................................
[3]

(b) Explain how the URL is converted into an Internet Protocol (IP) address for the website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) A protocol is used to securely transmit the data for the website to the browser.

(i) State the name of this protocol.

..................................................................................................................................... [1]

(ii) Identify how this protocol changes the data to transmit the data securely.

..................................................................................................................................... [1]

© UCLES 2022 0478/13/M/J/22 [Turn over


6

5 Harriet has a computer that is based on a Von Neumann model for a computer system.

The computer has a central processing unit (CPU).

(a) Explain the purpose of the CPU.

Identify the three stages of the cycle performed by the CPU in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) The memory address register (MAR) is one component built into the CPU.

(i) Identify four other components that are built into the CPU.

Component 1 .....................................................................................................................

Component 2 .....................................................................................................................

Component 3 .....................................................................................................................

Component 4 .....................................................................................................................
[4]

(ii) Describe the purpose of the MAR in the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/13/M/J/22


7

(c) Harriet’s computer has both primary and secondary storage.

(i) Explain what is meant by primary storage.

Give three examples of what is stored in primary storage in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [7]

(ii) The secondary storage in Harriet’s computer is damaged, so it is removed for repair.
This means the computer will no longer work.

Explain why the secondary storage is needed for the computer to work.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/13/M/J/22 [Turn over


8

6 Frida has a JPEG file stored on her computer.

(a) Tick (3) to show which type of data is stored in a JPEG file.

Tick (3)

Video

Sound

Image

[1]

(b) Compression can be used to reduce the size of a file.

Tick (3) to show whether the JPEG file is a lossy compressed file or a lossless compressed
file or not a compressed file.

Tick (3)

Lossy compressed file

Lossless compressed file

Not a compressed file

[1]

(c) Frida scans a text document into her computer so that she can store a digital version. She
uses a 2D scanner to do this.

Describe how the text document is scanned by the 2D scanner to create the digital version.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/13/M/J/22


9

(d) Frida compresses the document for storage.

The compression algorithm she uses recognises repeating patterns in the data and indexes
these patterns. No data is permanently removed.

Identify the type of compression Frida has used.

............................................................................................................................................. [1]

© UCLES 2022 0478/13/M/J/22 [Turn over


10

7 Umar is a manager in an office. The data that he uses on a daily basis is stored on a file server
close to his computer.

Data is sent from his computer to the file server using parallel simplex data transmission.

(a) Describe how the data is sent using parallel simplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) The file server is moved to another building that is 1 km away.

Explain why the parallel simplex data transmission method that Umar uses is no longer
suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Checksum and Automatic Repeat reQuest (ARQ) are both used when transmitting the data
from a computer to the file server.

Explain why checksum and ARQ are both used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 0478/13/M/J/22


11

8 The paragraph provides information about translators.

Complete the paragraph using the most appropriate terms from the list. Not all terms in the list
need to be used.

• all at once
• assembler
• assembly language
• binary
• commenting
• compiling
• debugging
• executable file
• high-level language
• interpreted
• is not required
• is required
• line by line
• low-level language

A compiler and an interpreter translate ...................................................................... into machine

code. An interpreter does this by translating and executing the code

...................................................................... and a compiler does this by translating and executing

the code ...................................................................... .

One benefit of a compiler is that it creates an ...................................................................... , which

means that a translator ...................................................................... each time to run the file.

...................................................................... is easier to do with an interpreter because it stops

translating and reports an error at the place where it occurs in the code.
[6]

© UCLES 2022 0478/13/M/J/22


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/13/M/J/22


Cambridge IGCSE™

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2022 [Turn over


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED

Please note the following further points:

The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.

If a word is underlined, this exact word must be present.

A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.

Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.

© UCLES 2022 Page 4 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

1(a) One mark for each correct row 5

Device Input Output Storage


() () ()

keyboard 

microphone 

headphones 

hard disk drive (HDD) 

actuator 

1(b)  Optical 2
 Solid state

Question Answer Marks

2(a) Per each binary conversion, one mark for 2 correct character conversions, two marks for three correct character 6
conversions

 0000 0101 1010


 0001 1000 1100
 0010 1001 1111

© UCLES 2022 Page 5 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

2(b) Any two from: 2

 It has a bright screen/colours


 It does not consume much power
 It runs at a cool temperature
 Longevity
 Can operate in cold conditions
 Can be small/compact/thin

2(c) Per each hex conversion, one mark for 2 correct character conversions, two marks for three correct character conversions 4

 40D
 07E

© UCLES 2022 Page 6 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

3(a) One mark for each correct row 4

Statement AND OR XOR


() () ()

if both inputs are 0, the output is 0   

if both inputs are different, the output is 1  

if both inputs are 1, the output is 1  

if both inputs are the same, the output is always 0 

© UCLES 2022 Page 7 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

3(b) One mark for the correct name and one mark for the correct truth table 4

 NOR

A B Output

0 0 1

0 1 0

1 0 0

1 1 0
 NAND

A B Output

0 0 1

0 1 1

1 0 1

1 1 0

Question Answer Marks

4(a) Three from: 3

 Protocol
 Domain name / Web server name
 Filename / web page name / folder name

© UCLES 2022 Page 8 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(b)  It is sent to a DNS … 2


 which looks up the corresponding/matching IP address

4(c)(i)  HTTPS 1

4(c)(ii) Any one from: 1

 It encrypts it
 It applies encryption algorithm
 It applies an encryption key

Question Answer Marks

5(a) Any two from: 5

 It processes data
 It processes/executes instructions
 It carries out calculations
 It carries out logical operations

Any three from:

 Fetch
 Decode
 Execute

© UCLES 2022 Page 9 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5(b)(i) Any four from: 4

 Memory data register / MDR


 Control unit / CU
 Arithmetic logic unit / ALU
 Program counter / PC
 Current instruction register / Instruction register / CIR / IR
 Accumulator / ACC
 Address bus
 Data bus
 Control bus

5(b)(ii) Any two from: 2

 To temporarily store
 … the address of the next data/instructions required
 … the address of the location in memory where data is to be stored
 Stores the address that is to be collected by the address bus

© UCLES 2022 Page 10 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5(c)(i) Any four from: 7

 It is RAM …
 … which is volatile storage
 It is ROM …
 … which is non-volatile storage
 It is directly accessible by the CPU

Any three from:

 BIOS
 Start-up instructions
 Programs that are currently in use
 Data that is currently in use
 Parts of OS currently in use

5(c)(ii) Any two from: 2

 Data can be permanently stored


 … meaning that (application) software can be loaded/retrieved
 … meaning that operating system can be loaded/retrieved
 … meaning that user data/files can be accessed/retrieved

© UCLES 2022 Page 11 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(a)  Image 1

6(b)  Lossy compressed file 1

6(c) Any four from: 4

 A light is shone onto the surface of the document


 The light is moved across/down/under the document
 The reflected light is captured (using mirrors and lenses)
 The reflections are converted to binary

6(d)  Lossless compression 1

© UCLES 2022 Page 12 of 13


0478/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(a)  Data is sent multiple bits at a time 3


 … down multiple wires
 Data is sent in one direction only

7(b) Any two from: 2

 Parallel is not suitable for long distances // only suitable for short distances
 … the data could become skewed
 Parallel cables are not manufactured above approx. 5m

7(c) Any three from (MAX 2 for ARQ): 3

 Checksum used to detect errors (during transmission)


 … using a calculated value
 ARQ checks if data is received
 … uses acknowledgement and timeout
 … requests data be sent again if (checksum) detects error / not received

Question Answer Marks

8 One mark per each correct term in the correct place 6

 high-level language
 line by line
 all at once
 executable file
 is not required
 debugging

© UCLES 2022 Page 13 of 13

You might also like