Computer p1
Computer p1
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (LK) 172696/2
© UCLES 2019 [Turn over
2
97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.
(a) Show what the binary register stores for each pair of the given digits.
97
5C
E1
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Example 1 .................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
[2]
He uses three different logic gates in his circuit. Each logic gate has a maximum of two inputs.
(a) “The only time the output will be 1 is when both inputs are 1.”
[2]
(b) “The only time the output will be 1 is when both inputs are 0.”
[2]
(c) “The only time the output will be 0 is when both inputs are 1.”
[2]
3 Five descriptions of different input or output devices are given in the table.
Complete the table by stating the name of each input or output device.
[5]
4 (a) Lola is concerned about the risks to her computer when using the Internet.
She wants to use some security methods to help protect her computer from the risks.
Identify a security method she could use for each of the following risks. Each security method
must be different.
Describe how each security method will help protect Lola’s computer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Hacking
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(iii) Spyware
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Lola is also concerned that the data she stores could be subject to accidental damage or
accidental loss.
(i) State three ways that the data Lola stores could be accidentally damaged or accidentally
lost.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give two methods that Lola could use to help keep her data safe from accidental damage
or accidental loss.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
(a) It currently requires employees to enter a username and a password to log-in to an account.
Each password must be 8 letters.
Improvement 1 ..........................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Improvement 2 ..........................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
The company can purchase a server with either solid state storage or magnetic storage. After
discussion, it decides to purchase a file server with magnetic storage.
Explain why the company chose magnetic storage rather than solid state storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Using the list given, complete Annie’s answer by inserting the correct six missing terms. Not all
terms will be used.
• Assembly
• Converter
• Denary
• Hexadecimal
• High-level language
• Low-level language
• Machine Code
• Source Code
• Syntax
• Translator
....................................................................... language.
[6]
8 An art gallery has a website that is used to display and sell art.
(a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
True False
Statement
(3) (3)
(c) The art gallery is concerned about computer ethics relating to its website.
Explain what is meant by computer ethics and why the art gallery is concerned about
computer ethics.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) 6
97
1 0 0 1 0 1 1 1
1 mark 1 mark
5C
0 1 0 1 1 1 0 0
1 mark 1 mark
E1
1 1 1 0 0 0 0 1
1 mark 1 mark
2(a) 1 mark for correct name, 1 mark for correct gate symbol 2
− AND
2(b) 1 mark for correct name, 1 mark for correct gate symbol 2
− NOR
2(c) 1 mark for correct name, 1 mark for correct gate symbol 2
− NAND
This is an input device that works by shining a light onto the surface of a document. The
light source is automatically moved across the document and the reflected light is captured 2D Scanner
by mirrors and lenses.
This is an input device where a laser or a light source is moved across an object. The
3D scanner
width, height and depth of the object are measured to allow a model to be created.
This is a large input device that is usually fixed to a wall. A user can calibrate the device to
Interactive
make sure the sensors align with a projected image. The user can use either their finger or
whiteboard
a special pen to make selections.
This is an output device that uses many small mirrors to reflect light towards a lens. This
Projector
will display an image.
This is an output device that creates an object by building layer upon layer of material. 3D printer
Passwords
• Making a password stronger // by example
• Changing it regularly
• Lock out after set number of attempts // stops brute force attacks // makes it more difficult to guess
Biometrics
• Data needed to enter is unique to individual
• « therefore very difficult to replicate
• Lock out after set number of attempts
5 Five from: 5
• A (compression) algorithm is used
• No data is removed in the process // original file can be restored
• Repeated words (are identified) // Patterns in the data (are identified)
• « and are indexed/put into a table // by example
• « and are replaced with their index // by example
• « and their positions are stored (in the table) // by example
• « and the number of times the word/pattern appears is stored (in the table) // by example
6(b) Four from (max 3 marks for benefits only, without an explanation): 4
• More read/write cycles (over its lifetime) // greater longevity «
• « likely to be a lot of read/write functions each day
• Read/write speed is sufficient «
• « even though it is slower than solid-state
• Cheaper per unit of data stored «
• « better value for the company to purchase
• « so the law company can afford to buy a server with greater storage capacity
• No requirement for portability «
• « as a server, it does not need to be moved
• Trusted technology «
• « it has been traditionally used for many years
6(c) • DVD 3
• CD
• Blu-ray
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (KS/CB) 172695/2
© UCLES 2019 [Turn over
2
(a) Identify three input devices that can be connected to a personal computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Identify three output devices that can be connected to a personal computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The computers in the finance company use both primary and secondary storage.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
3 Vanessa writes a paragraph as an answer to an examination question about the central processing
unit (CPU).
Use the list given to complete Vanessa’s answer by inserting the correct six missing terms.
Not all terms will be used.
• Components
• Data
• Decoded
• Executed
• Fetched
• Instructions
• RAM
• ROM
• Secondary storage
into the CPU where it is then ........................................................ . Once this has taken place the
4 (a) Marley wants to store a video he has created for his school project.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.
Calculate the total file size in megabytes (MB) for all Marley’s images.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) Marley prints the images for his project using an inkjet printer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
5 A music company wants to send a new music file to many radio stations. It will send the music file
the day before the release date so that the radio stations can store the file ready for release.
The music company does not want the radio stations to be able to open the music file until 09:00
on the release date.
Identify two security measures and describe how each measure can be used to make sure the
music file cannot be opened until the release date.
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
6 Priya creates a website to sell her old comic books and superhero figures.
(a) She uses HTML to create her website. The HTML she produces has both structure and
presentation.
Explain what is meant by HTML structure and presentation. Include an example of each.
Structure ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
True False
Statement
(✓) (✓)
Cookies can be used to track the items a customer has viewed on a website
[5]
To transmit the website data to the webserver she uses parallel duplex data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
............................................................................................................................................. [1]
(e) Priya is concerned about a denial of service attack (DoS) occurring on her webserver.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give one security device that can be used to help prevent a denial of service attack.
..................................................................................................................................... [1]
7 (a) An office has an automated lighting system. When movement is detected in the office the
lights are switched on. If movement is not detected for a period of 2 minutes the lights are
switched off. The system uses a sensor and a microprocessor.
Describe how the automated lighting system uses a sensor and a microprocessor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(a) Draw a logic circuit to match the given logic statement. Each logic gate used must have a
maximum of two inputs. Do not attempt to simplify the logic statement.
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 The contents of three binary registers have been transmitted from one computer to another. Even
parity has been used as an error detection method.
Complete the Parity bit for each register to show the given outcome.
Parity bit
Register A 0 1 0 0 1 0 1
Register B 1 0 0 0 0 0 1
Register C 1 0 0 0 0 1 1
[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
4(b)(i) 2 marks for any two correct stages of working, 1 mark for correct answer. 3
− 500 * 300 * 10 // 150 000 *10
− * 8 then ÷ 8 (anywhere in the process)
− 1 500 000 ÷ 1024 ÷ 1024 // 1 500 000 ÷ 1 048 576
− = 1.43 MB
− Ink is heated
− and expands/evaporates into a bubble
− Bubble is pushed through the nozzle on to the paper
− then the bubble collapses
5 − Password protection 4
− Password is released on the release date
− Encryption
− Encryption key is released on the release date
6(a) Structure 4
− This is the layout of the web page
− e.g. placing an image alongside some text // example of tag, such as <div>
Presentation
− This is the formatting/style of the web page
− e.g. the colour that is applied to some text // example of tag, such as <font-color>
True False
Statement
(9) (9)
Cookies can be used to store a customer’s credit card details 9
8(a) 1 mark per each correct logic gate, with correct input(s) 6
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
Parity bit
Register A 1 0 1 0 0 1 0 1
Register B 1 1 0 0 0 0 0 1
Register C 1 1 0 0 0 0 1 1
10 Four from: 4
− Electrical field/charge is spread across the screen
− Sensors are located around the screen // sensors are used to read the electric field
− When finger touches screen, the charge/ is transferred to the user
− as it is affected by the conductivity of another object
− Coordinates of touch determined/calculated/measured
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (RW/CB) 172694/3
© UCLES 2019 [Turn over
2
(a) She uses the hexadecimal colour code #D2E3F5 as the background colour for her website.
D2E
3F5
[6]
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The HTML Victoria writes has both structure and presentation.
Structure Presentation
Example
(✓) (✓)
The colour applied to a text heading on a web page
The font style applied to a paragraph of text on a web page
The placement of a paragraph of text on a web page
The size that an image is set to be displayed at on a web page
The placement of an image next to a paragraph of text on a web page
[5]
Victoria writes a paragraph of text to explain how the website will be displayed on a customer’s
computer.
Use the list given to complete Victoria’s paragraph by inserting the correct six missing terms.
Not all terms will be used.
• browser
• domain name
• firewall
• hexadecimal
• HTML
• https
• MAC address
• search engine
• Uniform Resource Locator (URL)
• web server
The user enters the website .................................................................. into the address bar.
where the files for the website are stored. The files are sent back to the
(e) When customers access Victoria’s website they will be given the message:
This website uses cookies. An explanation of their purpose can be found in our cookies policy.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain why Victoria would use cookies as part of her website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
True False
Statement
(✓) (✓)
(b) A computer uses the Von Neumann model and the stored program concept.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The Von Neumann model has several components that are used in the fetch‑execute
cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(i) A signal causes the operating system to stop and assess what to do next.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
3 A finance company is concerned that its employees are being distracted by using gaming websites
at work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The finance company is also worried about the security of the data stored on its servers.
The company has decided to encrypt the data to improve the security.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) The finance company realises that its computer systems have been hacked.
The company thinks that spyware was used to obtain a user’s password.
Explain how spyware could have been used to obtain the user’s password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
B X
(a) Redraw the logic circuit using only 4 logic gates. Each logic gate used must have a maximum
of two inputs.
B X
[4]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
5 The three binary numbers in the registers given have been transmitted from one computer to
another.
One binary number has been transmitted incorrectly. This can be identified by the use of a Parity
bit.
Identify the binary number that has been transmitted incorrectly. Explain how you identified the
incorrect binary number.
Parity bit
Register A 1 0 1 1 1 0 0 1
Register B 1 1 1 0 0 1 1 1
Register C 1 0 0 1 1 0 1 1
The binary number that has been transmitted incorrectly is in Register ............................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
Visitors to the museum can use the information point to plan their visit to the museum.
The information point allows visitors to access the information using a resistive touch screen.
Visitors can either listen to the information or read it on the screen. They can also select to output
a paper copy of the information they require.
(a) Describe how the resistive touch screen registers the visitor’s touch.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The information point has a screen to allow visitors to read information.
Identify two other output devices that are present in the information point.
(c) The information point uses both primary and secondary storage.
Primary .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Secondary ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019 0478/13/M/J/19
12
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) 6
1 1 0 1 0 0 1 0 1 1 1 0
0 0 1 1 1 1 1 1 0 1 0 1
Structure Presentation
Example
(9) (9)
− URL
− https
− Domain name
− Web server
− Browser
− HTML
True False
Statement
(9) (9)
2(c)(i) − Interrupt 1
− Provides an interface
− Loads / opens / installs / closes software
− Manages the hardware // manages peripherals // spooling
− Manages the transfer of programs into and out of memory
− Divides processing time // processor management
− Manages file handling
− Manages error handling // interrupt handling
− Manages security software
− Manages utility software
− Manages user accounts
− Multitasking
− Multiprogramming // time slicing
− Batch processing
− The user could have been sent an email with an attachment / link containing the spyware
− The user could have clicked a link on an untrusted website
− When the attachment / link was clicked the spyware was downloaded onto the user’s computer
− The spyware recorded all the key logs from the user’s keyboard
− The recorded key logs were sent back to the creator of the spyware
− The key logs were analysed
− A common pattern / word in the key logs could have allowed a password to be identified
4(a) 1 mark for each correct logic gate, with correct inputs: 4
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 1
1 1 1 0
5 − B 4
Three from:
− Speaker
− Headphones
− Printer
Primary
− Memory that is directly accessed by the CPU
− An example is RAM / ROM
− RAM stores programs and data that are currently in use and ROM stores boot-up instructions
− RAM is volatile and ROM is non volatile
Secondary
− Storage that is not directly accessed by the CPU
− An example is HDD / SSD
− Stores data / files that can be accessed at a later stage
− Non volatile
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (SC/SG) 163095/2
© UCLES 2019 [Turn over
2
Draw lines to connect each printer to a correct statement. More than one line may be used to
connect to each printer or statement.
Printer Statement
Inkjet printer
Laser printer
[2]
(b) Andrew wants to print a single page A4 leaflet. He wants to print 10 000 copies.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 An electronic guessing game compares denary integer values input by a user with pre-stored
values. The pre-stored values are held in 10-bit binary format.
Binary Denary
0001001110
0110110111
1000000001
[3]
(b) When planning the game, the designer decided to use hexadecimal notation to represent the
binary values.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [3]
3 A company has several offices. It uses the Internet to transfer data between offices. The company
also makes payments to staff and suppliers using online banking.
The company are concerned about spyware and other security aspects of using the Internet.
(a) Explain what is meant by spyware and how it is used to obtain data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
© UCLES 2019 0478/11/O/N/19 [Turn over
4
(b) The company uses a web page to log on to the online bank.
Identify one method that could be used by the online bank to reduce the impact of spyware
when logging on.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The company has installed a firewall as part of its data security.
Describe how a firewall can help protect against unauthorised access to data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) State two other methods the company could use to help prevent unauthorised access to
data.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
[2]
(a) State one input device that could be used for the information point.
............................................................................................................................................. [1]
State one other output device that could be used for the information point.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(d) The zoo decides to introduce Quick Response codes in different places in the zoo. These
provide further information about the animals.
Describe how customers obtain the information from the Quick Response codes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
5 Sonia shares files with her friends. The method of data transmission she uses is half-duplex serial
transmission.
(a) Describe how data is transmitted using half-duplex serial data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The system uses parity bits to check for errors during data transmission.
Byte ...........................................................
Explain how you identified the byte that was transmitted incorrectly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
6 Ishan is a member of a software community that develops computer games. He has programmed
a new feature for one of the community’s existing games.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Ishan shares the program with community members over the Internet, using Secure Socket
Layer (SSL).
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) The program files for the games are compressed before they are published on the Internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
..................................................................................................................................... [1]
7 A factory manufactures plastic pipes. It uses logic circuits to control the manufacturing process.
Input A
Output
Input B
0 0
0 1
1 0
1 1
[1]
0 0 0
0 1 1
1 0 1
1 1 0
State the single logic gate that produces the given output.
............................................................................................................................................. [1]
(c) Plastic pipes of various sizes are manufactured by heating the plastic and using pressure.
The manufacturing system uses sensors to measure the pressure (P), temperature (T) and
speed (S) of production.
The system will sound an alarm (X) when certain conditions are detected.
Temperature is > 200 degrees Celsius and the pressure is <= 5 bar
or
Speed is > 1 metre per second and Temperature is <= 200 degrees Celsius
T X
[5]
© UCLES 2019 0478/11/O/N/19
11
(d) Give two benefits of using sensors to monitor the manufacture of plastic pipes.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 HTML can be used to create the structure and the presentation of web pages.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Use the list given to complete Gloria’s answer by inserting the correct four missing terms. Not
all terms will be used.
• browser
• cookies
• Hypertext Markup Language (HTML)
• hypertext transfer protocol (http)
• hypertext transfer protocol secure (https)
• Internet Protocol address (IP address)
• Media Access Control address (MAC address)
• web server
The user enters the URL of the website. The ............................................................... uses
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range
may be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) 2
Printer Statement
Inkjet printer
1(b) • Laser 1
Binary Denary
0001001110 78
0110110111 439
1000000001 513
2(c) One mark for each correct hexadecimal value in correct order 3
2 B 5
3(b) One mark for identified method, one mark for how it prevents spyware: 2
Three from:
• Added up / counted the 1s / 0s
• Even parity used // 3 bytes are even
• Byte 2 uses odd parity // 1 byte is odd
6(d)(ii) • Lossless 1
7(a) 1
Input A Input B Output
0 0 0
0 1 1
1 0 1
1 1 1
7(c) One mark for each correct logic gate with correct inputs 5
8 Six from: 6
• PC holds address of the instruction
• The address held in PC is sent to MAR «
• « using address bus
• MAR goes to location in memory where instruction is stored
• Instruction sent to MDR «
• « using data bus
• Instruction sent to CIR
• Control unit sends signals to manage the process «
• « using the control bus
9(b) One mark for each correct term in the correct order: 4
• browser
• IP address
• web server
• HTML
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (SC/TP) 201739/3
© UCLES 2019 [Turn over
2
Four statements about computer memory sizes are given in the table.
True False
Statement
(✓) (✓)
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]
2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).
Identify four other components that are used in the Von Neumann model for a computer system.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
3 The data from a sensor must be converted from analogue to digital to be processed by a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
0 0 1 1 0 1 0 0
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The contents of the register shifted one place to the right would give the result:
0 0 0 1 1 0 1 0
The contents of the register shown at the start of question 4 are shifted two places to the left.
Show the contents of the register after this shift has taken place.
[1]
(c) State the effect this shift has on the denary value in part (a).
...................................................................................................................................................
............................................................................................................................................. [1]
The file is too large to attach to an email so Audrey decides to compress the file.
She uses lossy compression to reduce the size of the sound file.
(a) Describe how lossy compression reduces the size of the sound file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Nico asks Audrey why she used lossy compression rather than lossless.
(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Explain two advantages of using serial transmission rather than parallel transmission.
Advantage 1 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Advantage 2 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 0478/12/O/N/19
5
Resistive Capacitive
Statement
(✓) (✓)
This touch screen has multi-touch capabilities
This touch screen cannot be used whilst wearing gloves
This touch screen is made up of two layers with a small
space in between
This touch screen uses the electrical properties of the
human body
This touch screen is normally cheaper to manufacture
This touch screen has a quicker response time
[6]
7 Gerald uses a keyboard to enter a website address into the address bar of his browser.
(a) Describe how Gerald’s key presses on his keyboard are processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
X
B
............................................................................................................................................. [3]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.
True False
Statement
(✓) (✓)
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmission automatically detects any
errors in data
[5]
(b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends multiple
bits at the same time.
............................................................................................................................................. [1]
(c) Maisey purchases a new printer and connects it to her computer using the USB port.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(a) Companies use error detection methods to make sure that data is accurate.
Explain what is meant by a check digit and how it is used to detect errors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Companies can use a range of security methods to keep their data secure.
Identify two security methods that a company can use to keep their data secure and explain
how each method can keep the data secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
11 Robert has a mobile device that uses RAM, ROM and an SSD.
(a) State what the RAM, ROM and SSD are used for.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
SSD ..........................................................................................................................................
...................................................................................................................................................
[3]
(b) Give two reasons why an SSD, rather than a HDD, is used in the mobile device.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific
content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking
principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope
of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question
as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be
limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade
descriptors in mind.
2 Four from: 4
• Arithmetic and logic unit (ALU)
• Memory address register (MAR)
• Memory data register (MDR) // Memory buffer register (MBR)
• Accumulator (ACC)
• Immediate Access Store (IAS)
• Main memory // RAM
• Program counter (PC)
• Current instruction register (CIR)
• Address bus
• Data bus
• Control bus
• Input device
• Output device
• Secondary storage device
4(a) • 52 1
4(b) 1
1 1 0 1 0 0 0 0
4(c) • It is multiplied by 4 1
Resistive Capacitive
Statement
(9) (9)
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
True False
Statement
(9) (9)
Duplex data transmission can be either serial or
9
parallel
Duplex data transmission is when data is transmitted
9
both ways, but only one way at a time
Duplex data transmission is always used to connect a
9
device to a computer
Duplex data transmission is when data is transmitted
9
both ways at the same time
Duplex data transmission automatically detects any
9
errors in data
• It is a high-speed connection «
• « so data will be transmitted quicker
• It is backwards compatible «
• « so no additional technology is needed
• Encryption «
• « Data will be scrambled
• « Key is required to decrypt the data
• « If data is stolen it will be meaningless
• Antispyware «
• « will remove any spyware from system
• « will prevent data being relayed to a third party
11(a) RAM 3
• To store the data / instructions / parts of OS that are currently in use
ROM
• To store the firmware / bootup instructions / BIOS
SSD
• To store files / software // by example
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (PQ/TP) 173648/2
© UCLES 2019 [Turn over
2
1 A library has a system that allows customers to check out the books that they want to borrow.
Each book has a barcode that can be used to identify the book.
(a) (i) Identify two input devices that may be used in the library’s system.
(ii) Identify two storage devices that may be used in the library’s system.
(iii) Identify two output devices that may be used in the library’s system.
(b) The data stored by the library is archived at the end of each day. The archive is held on a
server in the library office.
The data is encrypted with an 8-bit key. As some of the data is confidential, the library wants
to make the encryption more secure.
(i) State how the library could make the encryption more secure.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) The term used to describe data before it is encrypted is plain text.
..................................................................................................................................... [1]
(iii) The library’s archive system uses an error detection and correction system that combines
a parity check with an automatic repeat request (ARQ).
Describe how this system uses the parity check and ARQ.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
(c) The library has a website that customers can use to search for a book.
(i) The website has a background colour with the hexadecimal colour code #F92A10
F92
A10
[6]
(ii) Videos on the library website show customers which books the library will soon have
in stock.
Identify and describe a method the library could use to reduce the file size of a video as
much as possible.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(d) The library often holds events that introduce new authors.
At the events, the library has a Liquid Crystal Display (LCD) screen that displays data,
including an image and information about the author.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
True False
Statement
(3) (3)
High-level languages need to be translated into machine code to run on a
computer
High-level languages are written using mnemonic codes
High-level languages are specific to the computer’s hardware
High-level languages are portable languages
[4]
(b) Tick (3) to show which of the following is an example of a high-level language program.
Tick
Example program
(3)
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
print("Correct")
else:
print("Incorrect")
[1]
3 Blair writes a paragraph about data transmission in her Computer Science examination.
Use the list given to complete Blair’s paragraph by inserting the correct five missing terms. Not all
terms will be used. Terms can be used more than once.
• duplex
• half-duplex
• parallel
• serial
• simplex
multiple bits of data are sent all at once. If a user wants to transmit data over a long distance, with
should be used. If data needs to be transmitted in one direction only, for example from a computer
user has a large amount of data to transmit and this needs to be done as quickly as possible
4 A factory that manufactures cleaning products has a system that monitors conditions throughout
the manufacturing process.
(a) The system will sound an alarm (X) when certain conditions are detected.
or
Draw a logic circuit to represent the alarm system in the factory. Each logic gate must have a
maximum of two inputs.
T X
[4]
(b) Complete the truth table for the given logic problem.
Working space
A T P X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) A sensor and a microprocessor are used to monitor the pH of the cleaning products. The
system records each reading that is taken. If the reading is greater than 7 a warning message
is displayed on a monitor.
Explain how the sensor and microprocessor are used in the system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
5 The contents of three binary registers have been transmitted from one computer to another. Odd
parity has been used as an error detection method.
Write the appropriate Parity bit for each register to show the given outcome.
Parity
bit
Register A 0 1 0 0 0 1 1
Register B 0 0 0 0 1 1 1
Register C 0 0 0 0 0 1 1
[3]
6 Jesse is taking his Computer Science examination. He answers five questions about ethics.
“This type of software can be copied and shared without the permission of the owner.”
............................................................................................................................................. [1]
“With this type of software, the owner still retains the copyright for the software, but he gives
away copies of it for free.”
............................................................................................................................................. [1]
“This type of software is often a trial version of the full software. To use the full version the
user normally needs to pay a fee.”
............................................................................................................................................. [1]
“This is when a person copies another person’s computer program and tries to claim it as his
own.”
............................................................................................................................................. [1]
“This is the legal protection that a person can obtain, to provide protection against his work
being stolen.”
............................................................................................................................................. [1]
7 The Von Neumann model for a computer system has several components that are used in the
fetch-execute cycle.
(i) Describe what is meant by main memory and how it is used in the Von Neumann model
for a computer system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) State two other components in the Von Neumann model for a computer system.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
True False
Statement
(3) (3)
Interrupts can be hardware based or software based
Interrupts are handled by the operating system
Interrupts allow a computer to multitask
Interrupts work out which program to give priority to
Interrupts are vital to a computer and it cannot function without them
[5]
Explain two ways that the malware could have been introduced to the company’s network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific
content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking
principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope
of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question
as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be
limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade
descriptors in mind.
1(b)(i) • Increase the length of the key // make key 12-bit, etc. 1
1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0
1 0 1 0 0 0 0 1 0 0 0 0
True False
Statement
(9) (9)
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
9
print("Correct")
else:
print("Incorrect")
4(a) One mark for each correct logic gate with correct input(s) 4
A T P Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
Parity
bit
Register A 0 0 1 0 0 0 1 1
Register B 0 0 0 0 0 1 1 1
Register C 0 0 0 0 0 0 1 1
6(b) • Freeware 1
6(c) • Shareware 1
6(e) • Copyright 1
True False
Statement
(9) (9)
8 Four from: 4
• A hacker could have hacked the network «
• « and downloaded the malware onto the network
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/SW) 189019/3
© UCLES 2020 [Turn over
2
1 A Von Neumann model for a computer system has a central processing unit (CPU) that makes
use of registers.
Register 1 .................................................................................................................................
Register 2 .................................................................................................................................
Register 3 .................................................................................................................................
[3]
Stage 1 ..............................................................................................................................
Stage 2 ..............................................................................................................................
[2]
(ii) Identify the component of the CPU that is responsible for decoding instructions.
..................................................................................................................................... [1]
2 Both an interpreter and a compiler can be used when writing a program in a high-level language.
(a) Explain why a programmer would make use of both an interpreter and a compiler.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three reasons why a programmer would choose to write a program in a high-level
language, instead of a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
...................................................................................................................................................
[3]
3 A company collects and stores data about its customers. The data is stored on a server in the
company’s office.
The data is encrypted using symmetric encryption before it is sent to the cloud storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three other methods that can be used to secure the data in the office.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
Method 3 ...................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2020 0478/12/M/J/20 [Turn over
4
4 (a) Identify the name and draw the single logic gate that can replace the given logic circuits.
(i)
A
X
B
[2]
(ii)
A
X
B
[2]
(b) Complete the truth table for the given logic statement:
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Meena buys products for her business using the Internet.
The Transport Layer Security (TLS) protocol is used for transferring data when she buys
products.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
..................................................................................................................................... [1]
(iii) Identify another protocol that can be used to transfer data securely.
..................................................................................................................................... [1]
The browser uses a small file to store the details of the products she views. This allows the
website to display advertisements for other products she may like.
............................................................................................................................................. [1]
Tick (3) to show if the statement applies to Capacitive or Resistive touch screen technology.
Capacitive Resistive
Statement
(3) (3)
Cheaper to manufacture
[6]
7 (a) Give the denary value of each of the three 12-bit binary values.
(i) 000000001100
..................................................................................................................................... [1]
(ii) 000011000110
..................................................................................................................................... [1]
(iii) 010011000001
..................................................................................................................................... [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
000011101001
............................................................................................................................................. [3]
8 Leonard has a new laser printer to print letters for his business.
Leonard connects his printer to his computer using the USB port.
(a) Give three benefits of using the USB port to connect the printer to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(b) State two benefits and one drawback of Leonard using a laser printer, instead of an inkjet
printer, to print the letters.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[3]
(i) Give two examples of when a printer would generate an interrupt signal.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
Identify the software in the computer that will receive and manage all interrupt signals.
..................................................................................................................................... [1]
Tick (3) to show if the statement applies to hard disk drive (HDD) storage or
solid state drive (SSD) storage.
HDD SSD
Statement
(3) (3)
It is non-volatile storage
[6]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
10 Uma is concerned about risks that she may encounter when using the Internet.
Two of the risks she is concerned about are phishing and pharming.
(a) Give one similarity and two differences between phishing and pharming.
Similarity ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) Identify two other risks that Uma could encounter when using the Internet.
Risk 1 ........................................................................................................................................
Risk 2 ........................................................................................................................................
[2]
(i) Uma tells her friend that a firewall can only be software-based.
Correct
Incorrect
[1]
(ii) Describe how the firewall helps to keep Uma’s data secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(b)(i) − Fetch 2
− Execute
4(a)(i) − NAND 2
4(a)(ii) − NOR 2
4(b) 4
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
4 marks for 8 correct outputs
3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs
5(c) − Cookies 1
6 6
Capacitive Resistive
Statement
() ()
Cheaper to manufacture
7(a)(iii) − 1217 1
7(b) One mark per each correct hex value in correct order 3
− 0E9
9(a) 6
HDD SSD
Statement
() ()
It is non-volatile storage
10(b) − Virus 2
− Malware
10(c)(i) − Incorrect 1
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (JC/CT) 186484/3
© UCLES 2020 [Turn over
2
(a) The first three hexadecimal values he reads are 15, 102 and A9.
15 ..............................................................................................................................................
102 ............................................................................................................................................
A9 .............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Pradeep has two 8-bit binary values that he needs to convert to hexadecimal values for his
project.
Give the hexadecimal values for the two 8-bit binary values.
01010000 ..................................................................................................................................
00111101 ..................................................................................................................................
[4]
Tick (✓) to show if each hardware device is an Input, Output or Storage device.
Using the list given, complete the paragraph. Not all terms in the list need to be used.
• actuators
• binary
• black
• input
• microprocessors
• output
• sensors
• storage
• white
and the light is reflected back. The ............................................... bars in the barcode reflect
............................................... are used to capture the amount of reflected light and the
3 Thomas has an online business that sells homemade furniture. He has a web server that hosts his
website for his business.
(a) Describe the role of a web browser in requesting and displaying the web pages for the
website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Thomas is worried about a denial of service (DoS) attack on his web server.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the table giving the missing Term for each definition.
Term Definition
The checkout is linked to a stock control system. The system monitors stock levels and
automatically keeps them above a minimum level.
Explain how the stock control system automatically keeps the stock levels above a minimum
level.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The software for the stock control system is stored on a central computer. The computer uses
random access memory (RAM), read only memory (ROM) and a hard disk drive (HDD).
The computer is a Von Neumann model computer system with a central processing
unit (CPU).
(i) State the purpose of the RAM, ROM and HDD in the central computer.
RAM ..................................................................................................................................
...........................................................................................................................................
ROM ..................................................................................................................................
...........................................................................................................................................
HDD ..................................................................................................................................
...........................................................................................................................................
[3]
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
Component 3 .....................................................................................................................
Component 4 .....................................................................................................................
[4]
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
7 Edie uses a firewall to help prevent her children from accessing websites that she does not want
them to see.
(a) Describe how the firewall helps prevent her children from accessing these websites.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Edie is concerned that her children may download a virus when accessing websites.
State what is meant by a virus and explain what could happen if a virus was downloaded.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(i) Give two ways that her children can identify if a website is secure.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Tick (✓) to show whether the statement applies to a 3D printer, an Inkjet printer or a Laser printer.
3D Inkjet Laser
Statement
(✓) (✓) (✓)
Uses a moving print head
Uses liquid ink
Produces output using materials such as plastic and resin
Uses piezoelectric or thermal technology
Uses a rotating drum to transfer the image to the paper
Uses layer upon layer of material to create the output
[6]
9 Four 7-bit binary values are being transmitted from one computer to another. An odd parity check
is being used to check for errors in the binary values.
Write the correct Parity bit for each 7-bit binary value to make sure it meets odd parity.
..................... 0000011
..................... 1000000
..................... 0111111
..................... 1010101
[4]
10 Clive has a laptop computer that he uses for his business. He enters a username and password to
log in to his laptop.
Clive is worried about spyware being used to find out his username and password.
(a) Describe how spyware could be used to find out Clive’s username and password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The threat of spyware makes Clive concerned about typing a password to log in to his laptop.
Give an example of how Clive could log in securely without typing a password.
............................................................................................................................................. [1]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) − 21 3
− 258
− 169
2(a) 6
Input Output Storage
Hardware device
() () ()
Sensor
Headphones
Microphone
Actuator
2(b) − Input 5
− Black
− White
− Sensors
− Binary
5(b) − It has RAM to store the data / programs / by example currently in use 3
− It has ROM to permanently store the boot up instructions
− It has HDD to store the stock database / software / OS / by example
6(a) 4
A
B X
6(b) 4
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
8 6
3D Inkjet Laser
Statement
() () ()
9 − 1 4
− 0
− 1
− 1
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 186555/3
© UCLES 2020 [Turn over
2
Keyboard
Sensor
3D cutter
2D scanner
Microphone
(a) Complete the table to show the 12-bit binary values and the Denary values for each
Hexadecimal ticket number.
028
1A9
20C
[6]
Working space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(b) Each ticket also has a QR code. The QR code is scanned at the entrance to the venue.
A person can only enter the venue with a valid QR code that allows entry.
When a person enters, a count is incremented to show how many people have entered the
venue.
Explain how the system scans the QR code, checks if a person can enter and counts how
many people have entered.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
3 Transport Layer Security (TLS) protocol is used to secure the transmission of data over the
Internet.
Layer 1 ......................................................................................................................................
Layer 2 ......................................................................................................................................
[2]
(b) The following paragraph explains how data is sent securely using the TLS protocol.
Use the terms to complete the paragraph. Not all terms may need to be used.
• authentic
• binary
• browser
• certificate
• internet service provider
• signal
• web page
• web server
• website
(c) Identify one other protocol that can be used to secure data transmission over the Internet.
............................................................................................................................................. [1]
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) The logic statement given has four different logic gates.
Identify two other logic gates and complete a truth table for each.
...................................... 0 0
0 1
1 0
1 1
...................................... 0 0
0 1
1 0
1 1
[4]
(a) He is using HTML to create the website. HTML can be separated into structure and
presentation.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
(b) Luke is concerned that his web server may be hacked or subjected to a denial of service
(DoS) attack.
State two security methods that Luke could use to help protect the web server from hacking
or a DoS attack.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
[2]
6 A Von Neumann model for a computer system contains several integrated circuits (IC).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one benefit of using parallel, rather than serial, data transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(i) Identify the bus that carries signals around the CPU to control the components.
..................................................................................................................................... [1]
(ii) Identify the register built into the arithmetic logic unit (ALU).
..................................................................................................................................... [1]
(iii) Four statements about a Von Neumann model for a computer system are shown.
True False
Statement
(3) (3)
Data and instructions can be fetched into the CPU at the same time
[4]
7 Nina is recording some music tracks that she has written. She is researching whether she should
record them in MIDI or MP3 format.
MIDI ..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
MP3 ..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
8 Matthew is buying a new television with a display that uses LED technology.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(c) Identify one other technology that could have been used for the display.
............................................................................................................................................. [1]
9 Victoria is entering data into a computer system. The data will be transmitted to cloud storage.
(a) An even parity check is used to check for errors in the binary values after transmission.
For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met.
1100010 ......................
1001011 ......................
0100010 ......................
0010111 ......................
[4]
(b) Identify two other error checking methods that could be used to check the binary values are
correct after transmission.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
[2]
(c) A check digit is used to check whether data is correct when entered into the system.
Describe how a check digit can be used to make sure the data entered is correct.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Keyboard
Sensor
3D Cutter
2D Scanner
Microphone
3(a) − Handshake 2
− Record
3(b) 5
− Web server
− Certificate
− Authentic
− Browser
− Signal
4(a) 4
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 1
1 1 1 1
4(c) One mark for the correct gate and one mark for the correct truth table 4
− AND
A B X
0 0 0
0 1 0
1 0 0
1 1 1
− XOR
A B X
0 0 0
0 1 1
1 0 1
1 1 0
5(a)(i) − Two valid examples of Structure e.g. where text is placed, margins of page 2
5(a)(ii) − Two valid examples of Presentation e.g. font size, font colour 2
5(b) − Firewall 2
− Proxy server
6(b)(iii) 4
True False
Statement
() ()
Data and instructions can be fetched into the CPU at the same time
MIDI
− Musical Instrument Digital Interface (file)
− Stores a set of commands/instructions (for how the sound should be played)
− Does not store the actual sounds
− Data in the file has been recorded using digital instruments // produced by synthesizer
− Specifies pitch of the note // specifies the note to be played
− Specifies when each note plays and stops playing // Specifies key on/off
− Specifies duration of the note
− Specifies volume of the note
− Specifies the tempo
− Specifies the type of instrument
− Individual notes can be edited
MP3
− MP3 is a format for digital audio
− MP3 is an actual recording of the sound
− MP3 is a (lossy) compression format
− Recorded using a microphone
NOTE: Use of liquid crystals with LED technology can also be awarded
8(c) − LCD 1
9(a) − 1 4
− 0
− 0
− 0
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(b)(i) − Presentation 1
43 0 1 0 0 0 0 1 1
B7 1 0 1 1 0 1 1 1
F0 1 1 1 1 0 0 0 0
1(c)(i) − Input 1
NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.
Even Odd
8-bit binary value
() ()
11111111
01100110
01111011
10000000
NOTE: Three different types of human error can be awarded e.g. accidental deletion, not saving data, incorrect shutdown
procedure
Blu-ray CD DVD
Statement
() () ()
4(a) One mark for each correct logic gate with correct input: 4
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
True False
Statement
() ()
It is a front-lit display
5(b) One mark for each correct term in the correct place: 5
− Control
− Unique
− Identify
− Protocol
− Dynamic
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 186556/2
© UCLES 2020 [Turn over
2
1 Tina is creating a website for charity events. She uses HTML to create the website.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.
..................................................................................................................................... [1]
(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.
Give the 8-bit binary values for each part of the hexadecimal code.
43
B7
F0
[6]
(c) Tina uses a microphone to record a welcome message for her website.
..................................................................................................................................... [1]
(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.
Identify which type of compression she should use and describe how this would compress
the file for the website.
Description
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two benefits of compressing the file for the website.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity
events. This makes sure that their personal data is transmitted securely.
(i) Identify the two layers that are present in the TLS protocol.
Layer 1 ..............................................................................................................................
Layer 2 ..............................................................................................................................
[2]
(ii) Explain how data is sent securely using the TLS protocol.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
(i) Identify three security threats to her web server that Tina might be concerned about.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Tina installs a proxy server to help protect her website from security threats.
Describe how the proxy server will help protect the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
(✓) (✓)
11111111
01100110
01111011
10000000
[4]
Describe how a checksum can be used to check that the data has been transmitted correctly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(a) (i) Identify three ways that the data could be accidentally damaged.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Blu-ray CD DVD
Statement
(✓) (✓) (✓)
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
True False
Statement
(✓) (✓)
It is a front-lit display
[5]
(b) Tammy connects the computer to her home network. The computer has a MAC address and
an IP address.
Complete the paragraph using the list of terms given. Not all terms need to be used.
• compiled
• computer
• control
• dynamic
• identify
• packet
• principal
• protocol
• similar
• unique
…………………………………………… .
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 186557/2
© UCLES 2020 [Turn over
2
Headphones
2D cutter
LCD projector
Microphone
[5]
2 Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model
for a computer system.
(a) Identify the component within the CPU that controls the flow of data.
............................................................................................................................................. [1]
(b) Identify the component within the CPU where calculations are carried out.
............................................................................................................................................. [1]
(c) Identify the component within the CPU that stores the address of the next instruction to be
processed.
............................................................................................................................................. [1]
(d) Identify the register within the CPU that holds an instruction that has been fetched from
memory.
............................................................................................................................................. [1]
(e) Identify the register within the CPU that holds data that has been fetched from memory.
............................................................................................................................................. [1]
Tick (3) to show if each denary to 8-bit binary conversion is Correct or Incorrect.
Correct Incorrect
Denary Binary Conversion
(3) (3)
145 10010001
179 10110101
11 00010011
100 01100010
[4]
1 1 0 0 0 1 0 0 0 0 0 0
............................................................................................................................................. [3]
4 Eugene has a web server that stores his online shopping website.
(a) Describe how the webpages are requested and displayed on the customer’s computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Threat 1 ....................................................................................................................................
Threat 2 ....................................................................................................................................
Threat 3 ....................................................................................................................................
[3]
(a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission.
Parallel
Serial
Description
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.
Protocol 1 .................................................................................................................................
Protocol 2 .................................................................................................................................
[2]
Complete the paragraph using the list of given terms. Not all terms may need to be used.
• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed
7 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick (3) to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
(3) (3)
10000001
10000010
00101001
00101000
[4]
(b) A parity check may not always detect errors that have occurred in data transmission.
State why a parity check may not detect data transmission errors.
............................................................................................................................................. [1]
(c) Give one other error checking method that could be used to check for errors in data
transmission.
............................................................................................................................................. [1]
8 Edith is buying a new computer monitor that displays images using LCD technology.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
9 Elle uses both CDs and DVDs to store her school projects.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
............................................................................................................................................. [1]
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
11 A theme park has a game where a player tries to run from the start to the finish without getting wet.
The system for the game uses sensors and a microprocessor to spray water at a player as they
run past each sensor.
Describe how the sensors and the microprocessor are used in this system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
12 Warner says that he has a very good Internet Service Provider (ISP) that provides several services.
True False
Statement
(3) (3)
Provides access to the Internet for customers
Stores the content for all web pages available on the Internet
[5]
13 Phishing and pharming are two security issues a user should be aware of when using the Internet.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Headphones
2D cutter
LCD projector
Microphone
145 10010001
179 10110101
11 00010011
100 01100010
3(b) One mark for each correct conversion in the correct order: 3
− C
− 4
− 0
5(a) One mark for correct tick, two marks for description 3
− Serial
If parallel given, no mark for parallel, but follow through for correct description of parallel:
6 − Key // Algorithm 5
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm
Even Odd
8-bit binary value
() ()
10000001
10000010
00101001
00101000
10(a) One mark for each correct logic gate with the correct input: 4
Working space
A B C X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
11 Six from: 6
− Suitable sensor used e.g. motion sensor/pressure sensor
− (Analogue) data is converted to digital (using ADC)
− Sensor sends data to microprocessor
− Data compared to stored data …
− … if value outside range/within range water is sprayed
− … signal sent to actuator to spray water
− … if value within range/outside range no action taken
− Continuous loop
True False
Statement
() ()
Stores the content for all web pages available on the Internet
13(b) − Phishing involves use of an email whereas pharming involves installing malicious code 2
− Phishing involves clicking a link or an attachment whereas pharming creates a redirection
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK/SG) 202678/4
© UCLES 2021 [Turn over
2
1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:
198.167.214.0
(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.
167
214
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.
...........................................................................................................................................
..................................................................................................................................... [1]
Difference 1 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a
USB flash memory drive.
(a) Identify three devices Julia can use to input personal data into her computer.
Device 1 ....................................................................................................................................
Device 2 ....................................................................................................................................
Device 3 ....................................................................................................................................
[3]
(b) Six statements are shown about HDDs, SSDs and USB flash memory drives.
Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.
USB flash
memory
Statement
HDD SSD drive
(✓) (✓) (✓)
it is non-volatile
(c) Julia uses a USB connection to transfer data onto her USB flash memory drive.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
3 A firewall can be used to help keep the data secure that is stored on a computer.
(a) The given paragraph describes how the firewall operates to help keep the data secure.
Complete the paragraph using the most appropriate terms from the given list. Not all of the
terms on the list need to be used.
• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage
the traffic based on this. It can help prevent ............................................ and malicious
(b) Identify three other methods that could be used to keep the data secure.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
Method 3 ...................................................................................................................................
[3]
Phishing ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Pharming ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
5 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).
A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:
Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
B X
[6]
(b) Consider the completed truth table for the given logic statement.
1 0 0 0 0
2 0 0 1 1
3 0 1 0 0
4 0 1 1 1
5 1 0 0 0
6 1 0 1 1
7 1 1 0 0
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row ........................
Row ........................
Row ........................
Row ........................
[4]
7 A music company has a website that allows users to stream music. The music is stored in sound
files.
(i) Describe how the sound files are compressed using lossless compression.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) State one reason why the music company would compress the sound files using
lossless, rather than lossy, compression.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give one benefit, to the user, of the music company compressing the sound files.
...........................................................................................................................................
..................................................................................................................................... [1]
(iv) Give one drawback of the music company using lossless, rather than lossy, compression
for the sound files.
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Describe how the web pages for the website are requested and displayed on a user’s
computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) The web server that hosts the website suffers a denial of service (DoS) attack.
Explain why this will prevent users from accessing the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
8 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.
01100100
10010001
00000011
10110010
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(i) Describe how data is sent using parallel half-duplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.
1 0 1 0 0 1 1 1
1 1 0 1 0 1 1 0
USB flash
memory
Statement
HDD SSD drive
() () ()
it is non-volatile
2(c)(ii) − Serial 1
3(a) One mark per each correct term in the correct order. 6
− Software
− Network
− Criteria
− Accept // reject
− Reject // accept
− Hacking
Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user
Pharming
− Malicious code/malware is downloaded/installed // software downloaded
without users' knowledge
− … that re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user
5 Eight from: 8
− Sensor send data/readings/signal to microprocessor
− Data is converted from analogue to digital (using ADC)
− Microprocessor compares/checks data to stored values/range of values
…
− … If data is greater than 30 / above the range microprocessor sends
signal to open window and to turn heater off
− … If data is below 25 the microprocessor sends signal to turn on heater
and to close window
− … If data is between 25 and 30 / within the range no action taken
− Actuator is used to operate heater/window
− Whole process is continuous
6(a) One mark per each correct logic gate, with correct input: 6
6(b) − Row 1 4
− Row 3
− Row 4
− Row 5
8(a) − Odd 4
− Odd
− Even
− Even
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
2
(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.
49
123
200
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 1 ....................................................................................................................................
...................................................................................................................................................
Benefit 2 ....................................................................................................................................
...................................................................................................................................................
[2]
(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.
Justification ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) Describe the operation of USB flash memory and how it stores data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
B X
[6]
(b) Consider the completed truth table for the given logic statement.
2 0 0 1 1
3 0 1 0 1
4 0 1 1 0
5 1 0 0 1
6 1 0 1 0
7 1 1 0 1
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row .......................
Row .......................
Row .......................
Row .......................
[4]
4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.
Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.
Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard
is self-replicating
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.
Sensors and a microprocessor are used to control the security light system.
(a) Identify two sensors that would be used in the security light system.
Sensor 1 ...................................................................................................................................
Sensor 2 ...................................................................................................................................
[2]
(b) Describe how the sensors and the microprocessor control the security light system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
6 Cookies can be used to store a user’s personal data and online browsing habits.
(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.
Describe how cookies can be used to store and automatically enter a user’s payment details.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Explain why Jolene separates the HTML into structure and presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
8 A keyboard is a type of input device that can be used to enter data into a computer.
Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.
• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch
A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a
............................................. map to find the ............................................. value for the key that
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.
49 31 00110001
123 7B 01111011
200 C8 11001000
2(b)(iii) One for type of storage, two for matching justification from: 3
− Magnetic // HDD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and magnetic is high
capacity
− Magnetic is cheaper to buy for storage per unit than solid state
− Magnetic is capable of more of read/write requests over time // has more
longevity // SSD has more limited number of read/write requests (before
it is no longer usable)
− No requirement for it to be portable, so moving parts does not matter
− Solid-state // SSD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and solid-state is high
capacity
− Solid-state is more energy efficient
− Solid-state runs cooler so will not overheat
− Solid state has faster read/write speeds to handle volume of traffic
3(a) One mark for each correct logic gate with correct input. 6
is self-replicating
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/SG) 202681/5
© UCLES 2021 [Turn over
2
1 Greta has a computer that she uses for schoolwork and leisure.
(a) The computer has the Media Access Control (MAC) address:
00:A0:C9:14:C8:29
(i) Tick (3) to show whether the MAC address is initially assigned to the computer by the
network, the manufacturer or the user.
Tick (3)
Network
Manufacturer
User
[1]
14 ......................................................................................................................................
A0 ......................................................................................................................................
C9 ......................................................................................................................................
[3]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
29 ......................................................................................................................................
C8 ......................................................................................................................................
[2]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) Greta stores data on several off-line storage devices, including an external hard disk drive
(HDD), a USB flash memory drive and a compact disc (CD).
CD .....................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
2 Jolene displays videos on her website. She uses lossy compression to reduce the file size of the
videos.
(a) Describe how lossy compression reduces the file size of the videos.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) State two reasons why Jolene would use lossy rather than lossless compression for the
videos.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
3 An optical mouse is a type of input device that can be used to input data into a computer system.
(a) Complete the paragraph about the operation of an optical mouse, using the most appropriate
terms from the given list. Not all terms need to be used.
• Ball
• Battery
• LCD
• LED
• Lens
• Magnifies
• Matrix
• Microswitch
• Photoelectric
• Photographic
• Reduces
• USB
An optical mouse shines an ............................................ from the bottom of the mouse onto a
surface. Light bounces straight back from the surface into a ............................................ cell.
(b) Identify two other input devices that can be used to enter data into a computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
4 Spencer finds out that his online music account has been accessed by an unauthorised person.
He believes his personal details for the account were obtained using phishing.
(a) Explain how the personal details could have been obtained using phishing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Give two other Internet security risks that could have been used to obtain the personal
details.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (3) to show whether each statement applies to high-level language, assembly language or
machine code. Some statements may apply to more than one type of programming language.
it uses mnemonics
it is portable
[6]
6 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.
01111100
10010000
10011001
00101001
[4]
(b) The 8-bit binary value 10110001 is transmitted and received as 10110010
A parity check does not identify any errors in the binary value received.
State why the parity check does not identify any errors.
...................................................................................................................................................
............................................................................................................................................. [1]
(i) Describe how data is sent using serial duplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) State one drawback of using serial data transmission, rather than parallel data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
7 Marco uses his computer for work. The data he uses on a daily basis is valuable to his business.
Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly
removing external storage devices, is one way that the data can be accidentally damaged.
(a) Identify two other ways that data can be accidentally damaged.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Removing storage devices correctly from the computer can help prevent data being
accidentally damaged.
Give two other ways that accidental damage to data can be prevented.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
X
B
(a) Two NOT gates are used in the given logic circuit.
Identify three other logic gates that are used in the given logic circuit.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Consider the completed truth table for the given logic circuit.
2 0 0 1 1
3 0 1 0 0
4 0 1 1 0
5 1 0 0 1
6 1 0 1 1
7 1 1 0 0
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row .......................
Row .......................
Row .......................
Row .......................
[4]
9 An underground car park has a system that checks the height of vehicles. A vehicle can be no
higher than 1.8 metres to enter the car park.
The system also counts the number of vehicles that have entered the car park, so that it can
display how many parking spaces are still available.
Each parking space has a red and a green light above it. If a car is parked in the parking space
only the red light is on, otherwise only the green light is on.
(a) Complete the table to identify a suitable sensor for each part of the system.
Task Sensor
[3]
(b) Describe how the sensor and the microprocessor are used to display the red or green light
above the parking space.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
10 Several components are involved in processing an instruction in a Von Neumann model for a
computer system.
Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random
access memory (RAM).
Tick (3) to show if each statement applies to the ALU, CU or the RAM. Some statements may
apply to more than one component.
ALU CU RAM
Statement
(3) (3) (3)
stores data and instructions before they enter the central
processing unit (CPU)
uses the data bus to send data into or out of the CPU
[6]
(b) The accumulator is a register that is part of the Von Neumann model.
Give two other registers that are part of the Von Neumann model.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.
1(a)(i) − manufacturer 1
− 00010100
− 10100000
− 11001001
− 41
− 200
1(b)(i) − Magnetic 3
− Solid state
− Optical
3(a) One mark per each correct term, in the correct place. 6
− LED
− Photoelectric
− Lens
− Magnifies
− Microswitch
− USB
It requires a translator to be
processed by a computer
It is an example of low-level
language
It uses mnemonics
It uses English-like
statements
It is portable
6(a) − Odd 4
− Even
− Even
− Odd
8(a) − AND 3
− NOR
− XOR
8(b) − Row 1 4
− Row 4
− Row 7
− Row 8
Task Sensor
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LEG/AR) 202712/4
© UCLES 2021 [Turn over
2
(a) Tick (3) one box to show whether binary is a base-2, base-10 or base-16 number system.
Tick (3)
Base-2
Base-10
Base-16
[1]
(b) Hexadecimal and denary are number systems that can be used by programmers.
09 ...........................................
10 ...........................................
28 ...........................................
A1 ...........................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
She uses the touch screen on her telephone to send emails to her customers. The touch screen
breaks, stopping Magda from using it to type her emails.
(a) Identify one other input device that would be built into the mobile telephone that Magda could
use to send an email to her customers.
............................................................................................................................................. [1]
(b) The touch screen operates by using the conductive properties of the object that is used to
touch the screen.
State whether the touch screen is a resistive, capacitive or infra-red touch screen.
............................................................................................................................................. [1]
(c) Magda is listening to music on her mobile telephone when she receives a telephone call. A
signal is sent within the telephone to stop the music and output that a call has been received.
............................................................................................................................................. [1]
3 Five statements are given about the error-checking methods checksum, check digit and parity
check.
(a) Tick (3) to show whether each statement applies to checksum, check digit or parity check.
Some statements may apply to more than one error-checking method.
Check Parity
Statement Checksum digit check
(3) (3) (3)
uses an additional bit to create an odd or even number
of 1s
............................................................................................................................................. [1]
4 Georgia is a wedding photographer. She wants to store 10 photographs on a USB flash memory
drive for a customer. Each photograph is 100 pixels wide and 50 pixels high.
(a) Calculate the total file size, in kilobytes (kB), of all the photographs. For this calculation, you
may use the unit of measurement of 1024 or 1000.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer .................................................................... kB
[3]
© UCLES 2021 0478/11/O/N/21
5
(b) Georgia compresses photographs to store them on the USB flash memory drive. It is
important that the compression does not affect the quality of the photographs in any way.
State which type of compression is the most suitable. Justify your choice.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) Georgia uses a digital camera. The digital camera takes a photograph that is then converted
into a digital image.
Complete the paragraph about the operation of a digital camera, using the most appropriate
terms from the list. Not all terms in the list need to be used.
• analogue-to-digital
• binary
• charge-coupled
• digital-to-analogue
• lens
• light
• mirror
• pixel
• reflection
• sensor
• storage
When Georgia pushes the button to take a photograph, an aperture opens at the front of
He uses the Internet regularly and is concerned about his data being viewed by unauthorised
people. He currently has one software method to stop his data being viewed, which is a password.
He wants to add other software methods to stop his data being viewed by unauthorised people.
(a) State two other software methods that Tamaz could use to stop his data being viewed by
unauthorised people.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Tamaz’s computer has an operating system. Two functions of the operating system are file
management and memory management.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
6 Six statements are given about the role of components in the Central Processing Unit (CPU).
(a) Tick (3) to show whether each statement applies to the Memory Address Register (MAR),
Memory Data Register (MDR) or Program Counter (PC).
MAR MDR PC
Statement
(3) (3) (3)
(b) Identify the component in the CPU that carries out calculations.
............................................................................................................................................. [1]
7 (a) Tick (3) one box to identify if an internal Solid State Drive (SSD) is an example of primary,
secondary or off-line storage. Justify your choice.
Tick (3)
Primary
Secondary
Off-line
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
8 Victoria develops a computer game to sell on a gaming website. She writes her program using
English-like statements.
............................................................................................................................................. [1]
(b) Victoria uses two different types of translator when creating the program for the computer
game.
State which translator is the most suitable for the given tasks.
Translator ..........................................................
Benefits .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) To translate the final program and upload to the website for distribution, without the
source code.
Translator ..........................................................
Benefits .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
9 A washing machine uses sensors and a microprocessor to control the washing cycle of clothes.
Identify one suitable sensor that would be used for each task.
Task Sensor
checking the weight of the clothes to make sure that the machine is
not overloaded
[3]
(b) Describe how the sensor and the microprocessor are used to make sure the water remains
at 30 °C.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) State the name of a logic gate that does not appear in the logic statement and draw the
symbol for the logic gate.
[2]
(c) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
11 The table contains descriptions relating to web pages and the Internet.
Complete the table with the correct terms for the given descriptions.
Term Description
[5]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) − Base-2 1
1(b) − 9 4
− 16
− 40
− 161
2(a) − Microphone 1
2(b) − capacitive 1
2(c) − interrupt 1
3(b) − ARQ 1
4(a) Two marks for any two correct workings and one mark for the correct 3
answer.
Working:
− 100 × 50 = 5000 bits
− 5000 × 8 = 40,000 bits
− 40,000 / 8 = 5,000 bytes
− 5,000 × 10 = 50,000 bytes
− 50,000 / 1024
Answer:
48.83 kB // 49 kB
4(b) One mark per correct method, two marks per justification. 3
− Lossless
− Lossy would remove data permanently // lossless would not remove any
data permanently // File could be restored to original …
− … that could affect the quality (lossy) // … to maintain the quality
(lossless)
4(c) − Light 5
− Lens
− Charge-coupled
− Analogue-to-digital
− Pixel
7(a) One mark per correct storage, two marks for justification. 3
− Secondary
− It is non-volatile storage
− It is not directly accessed by the CPU
8(a) − High-level 1
8(b)(i) One mark for the correct translator, two marks for the benefit(s). 3
− Interpreter
− Easier to debug
− … as errors are immediately reported when detected
− Compiler
− All errors are reported in a single report
− … meaning they can all be fixed at the same time
− No need to recompile code every time a test is run
8(b)(ii) One mark for the correct translator, two marks for the benefits. 3
− Compiler
− Creates an executable file
− … so, translator is no longer needed to run it
− Source code cannot be stolen // can be provided without the source code
Task Sensor
10(a) One mark per each correct logic gate with the correct input(s). 5
10(b) One mark per logic gate name and one mark per correct drawing. 2
− NAND
− NOR
10(c) 4
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 1
Terms Description
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS/FC) 202713/4
© UCLES 2021 [Turn over
2
Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.
Tick
(✓)
Base-2
Base-10
Base-16
[1]
05 ......................................................
20 ......................................................
1A ......................................................
AB ......................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.
Tick
(✓)
00011001
00100101
10100001
[1]
Tick
(✓)
00011011
10110001
00011010
[1]
(d) (i) Give one way that hexadecimal is used in website development.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.
(a) One output device that is used in the ticket machine is a display screen.
Identify one other output device that is used in the ticket machine system.
............................................................................................................................................. [1]
(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.
Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.
(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive
top layer of the screen and makes it connect with the bottom layer to complete a
............................................................................ .
5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.
(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.
Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Sammi creates videos for the finance company website that give customers advice about
their finances.
He uses lossy compression to reduce the file size of the videos for the website.
(i) Give three ways that lossy compression can reduce the file size of the videos.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give one drawback of using lossy compression to reduce the file size of the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Sammi could have used lossless compression to compress the videos for the website.
(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.
Disadvantage 1 .................................................................................................................
...........................................................................................................................................
Disadvantage 2 .................................................................................................................
...........................................................................................................................................
[2]
6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.
3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning
8 An electronic game has three square mats that are coloured red, green and blue.
The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.
The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.
Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.
(a) Give three other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) State what would happen if interrupt signals were not used in a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.
(a) Explain how the SSL protocol secures the data for transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.
............................................................................................................................................. [1]
(c) Give two ways that a user can identify if a website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2021 0478/12/O/N/21 [Turn over
10
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Identify two logic gates that are not included in the given logic statement.
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) − Base-10 1
1(b) − 5 4
− 32
− 26
− 171
1(c)(i) − 00100101 1
1(c)(ii) − 00011011 1
6(c) − Assembler 1
can often be built into an Electronic Point Of Sale (EPOS) terminal, for ()
example, a supermarket checkout
8 Seven from: 7
− Timer is started
− Pressure sensor (within each mat)
− Sensor sends data to microprocessor
− Analogue data is converted to digital (using ADC)
− Microprocessor compares data to stored value(s)
− If data matches / in/out range microprocessor stops timer
− If data matches / in/out range microprocessor checks if data has come from correct colour mat sensor
− If data matches / in/out range microprocessor checks to see if timer is stopped at less than 1 second
− If data matches / in/out range microprocessor increments counter if timer is less than 1 second and colour/mat is
correct
− If correct colour/mat is hit, timer is reset and the whole process is repeated
− If data has not come from the correct colour mat sensor the game ends
NOTE: If three suitable different errors are described, this can be awarded three marks.
10(a) − Enables an encrypted link (between the browser and the web server) // It encrypts the data 2
− … based on the authentication of an (SSL) certificate // and will only send it if the certificate is authentic
11(a) One mark per each correct logic gate with correct input(s) 5
B X
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
11(c) − NOR 2
− XOR / EOR
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ/FC) 202714/5
© UCLES 2021 [Turn over
2
Tick (3) one box to show which is the largest file size.
Tick
File size
(✔)
999 kB
1 MB
Tick (3) one box to show which is the smallest file size.
Tick
File size
(✔)
4000 MB
2 GB
2 500 000 kB
[1]
2 A sports stadium has an electronic counter that counts each person that enters the stadium.
0 0 7 1
Give the binary value that is stored in the register to display the count shown.
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) More people enter the sports stadium and the screen now displays:
0 2 5 7
Give the binary value that is stored in the register to display the count shown.
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) After everyone has entered the stadium, the register stores the binary value:
0000001000000100
Show what the screen will display when this binary value is stored.
Display:
[1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) Sensors are used at the entrance to count the number of people entering the stadium.
(i) Identify two sensors that could be used to count the number of people entering the
stadium.
Sensor 1 ............................................................................................................................
Sensor 2 ............................................................................................................................
[2]
(ii) Tick (3) one box to show if a sensor is an example of an input device, storage device or
output device.
Tick
Device
(✔)
input
storage
output
[1]
(a) Tick (3) to show whether each statement applies to Automatic Repeat reQuest (ARQ), check
digit or checksum. Some statements may apply to more than one error-checking method.
............................................................................................................................................. [1]
The printer begins to print the document, but then a message is displayed on Frederick’s computer
to say that the paper has jammed.
(a) Describe the role of an interrupt in generating a message on the computer that the paper has
jammed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give two other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) The type of data transmission between the computer and the printer is serial half-duplex data
transmission.
(i) Describe how data is transmitted using serial half-duplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Explain why the data transmission needs to be half-duplex rather than simplex.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
5 In a Von Neumann model for a computer system, a Central Processing Unit (CPU) contains a
number of different components.
The table contains the name of a component or a description of their role in the fetch-execute
cycle.
Complete the table with the missing component names and descriptions.
............................................................................................................
Memory Address
Register (MAR) ............................................................................................................
............................................................................................................
............................................................................................................
Program Counter (PC)
............................................................................................................
............................................................................................................
............................................................................................................
Control Unit (CU)
............................................................................................................
............................................................................................................
[6]
6 The paragraph describes an MP3 file, MP4 file and a MIDI file.
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• can
• cannot
• compressed
• image
• microphone
• MIDI
• MP3
• MP4
• notes
• pixels
• speaker
• should
• uncompressed
................................................................. files are a multimedia format that stores video and audio.
sound. They are created using digital instruments. The file stores individual
7 Julius creates a computer application that calculates how many years it will take to pay for a
house.
(a) Julius uploads his application to his website for people to download. Before he uploads the
application, he translates the code using a compiler.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Julius also creates videos to explain how to use the application that he has created. He
reduces the file size of the videos using lossless compression.
(i) Describe how lossless compression reduces the file size of the video.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) State why Julius uses lossless compression, rather than lossy compression.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Julius wants to distribute his application to a wider audience. He is considering distributing it
as freeware or free software.
Freeware ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Identify the type of software he could use to distribute his application as a trial version.
..................................................................................................................................... [1]
(d) Julius makes sure that all data transmission to and from his website is secure.
One way a user can check if his website uses secure data transmission is to check its
certificate.
Give two other ways that a user can identify if his website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B
X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 A parity check is used to check for errors after transmission on the four given binary values.
Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd or
even in the type of parity column.
10011001
01111110
11100000
00111001
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Phishing and pharming are also types of Internet security risk. They have the same purpose.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
999 kB
1 MB
4000 MB
2 GB
2 500 000 kB
2(a) One mark for correct binary value, one mark for leading zeros 2
00000000 01000111
2(b) One mark for leading zeros, one mark for correct binary value 2
00000001 00000001
2(c) − 0516 1
Device Tick
()
input
storage
output
NOTE: If two suitable different errors are described, this can be awarded two
marks
Program Counter (PC) (A register that) holds the address of the next /
current instruction to be processed.
Control Unit (CU) Sends control signals to control the flow of data
through the CPU // manages the execution of
instructions in the CPU
Freeware:
− User does not have access to the source code
− Has copyright
− User does not have the right to edit the software
− Normally distributed for free // no cost
Free software:
− User has access to the source code
− Still has copyright // Is copyleft
− User has the right to edit and share the software
− Normally has a fee // cost to buy
8(a) One mark per each correct logic gate with correct inputs 6
.
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 0
1 1 0 1
1 1 1 1
9 − Even 4
− Even
− Odd
− Even
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 303750/3
© UCLES 2022 [Turn over
2
(a) (i) Tick (3) to show which type of data is stored in an MP3 file.
Tick (3)
Video
Sound
Image
[1]
(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
2 A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
..................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
[2]
3 Three types of storage media are magnetic, optical and solid state.
............................................................................................................................................. [1]
(b) Optical storage uses a laser to store and read data from a disk.
Explain how the laser is used to store and read data from the disk.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A business is creating a new mobile device that has an SSD as secondary storage.
(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.
Reason 1 ...........................................................................................................................
...........................................................................................................................................
Reason 2 ...........................................................................................................................
...........................................................................................................................................
Reason 3 ...........................................................................................................................
...........................................................................................................................................
[3]
(ii) Identify two examples of software that can be stored on the SSD.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
4 All data needs to be converted to binary data so that it can be processed by a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.
64 ..............................................................................................................................................
101 ............................................................................................................................................
242 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
42 ..............................................................................................................................................
CE .............................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 An image is stored on a computer. The image is 16‑bit colour and is 100 pixels high and
150 pixels wide.
Calculate the file size of the image in bytes. Show all your working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(a) One similarity between a compiler and an interpreter is that they both translate high‑level
language into machine code.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two reasons why a biometric password is more secure than a PIN.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Adele also encrypts the data on her mobile device to keep it more secure.
...................................................................................................................................................
............................................................................................................................................. [1]
BLANK PAGE
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).
Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
[5]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
[3]
11 (a) The paragraph describes the process of printing a document using an inkjet printer.
Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.
• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner
Data is sent from the computer to the printer. The data is held in a print
processed to be printed.
technology.
If the paper jams in the printing process, the printing stops and an
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
© UCLES 2022 0478/11/M/J/22 [Turn over
12
Identify and describe three ethical issues that could be a concern when using the Internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
1(a)(i) Sound 1
Second stage
Decode
Third stage
Execute
4(b) 01000000 3
01100101
11110010
5 Two marks for two correct stages of working, one mark for correct final answer 3
100 150
15 000 16 // 15 000 2
240 000 / 8
30 000 bytes
An interpreter translates the code line by line (and executes each line immediately)
… whereas a compiler translates the whole code at the same time (before executing it)
8(a) One mark for each correct logic gate with correct input(s) 6
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 1
it is a type of software
it is a type of address
it stores cookies
It is a unique address
It is assigned by the manufacturer
It can be used to identify a device
It contains the manufacturer ID/code/number
It contains the serial code/number
It is written in hexadecimal
It has 6 bytes/48 bits/6 pairs of digits
Does not (usually) change // static
11(a) One mark for each of the correct terms, in the correct place 5
buffer
nozzles
liquid
thermal bubble
interrupt
Monitor // screen
Speaker
Headphones
Light // LED
(2D/3D) cutter
DLP // LCD projector
Actuator
Keyboard
Mouse // trackerball
Microphone
(2D/3D) scanner
Barcode reader
QR code reader
Digital camera // webcam
Interactive whiteboard
Touchscreen
Sensor
12 One mark for identification of an issue and one mark for a description e.g.: 6
Plagiarism
– The copying of other people’s work without their permission
– Claiming someone else’s work as your own
Hacking
– Unauthorised access to a computer/data
Malware
– Malicious software designed to damage a computer system or stored data
Spyware
– Keylogger used to record keypresses and sends them to third party
Ransomware
– Holding hostage a user’s data, often for a release fee
Breaching copyright
– Breaking the law by copying someone’s work
Piracy
– Using piracy websites to gain content for free that should have been paid for
Privacy
– A person’s data could be leaked
Phishing
– Sending an email to lure users to a fake site to obtain their personal details
12 Pharming
– Downloading of malicious code to redirect user to fake website to obtain their personal details
Data protection
– A person’s data is not used according to the law
Cyber bullying
– Using the internet to bully people
Inappropriate materials
– Materials that could cause harm/offense to people e.g. minors
Fake news
– News stories that could be very misleading or harmful
Software cracking
– Changing code to e.g. bypass a licence for software
Addiction
– Aspects of the internet e.g. social media can cause this
Environmental effects
– Increased use of the internet increases the use of electrical power
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (RW) 303775/2
© UCLES 2022 [Turn over
2
Draw one line from each denary value to the correctly converted 8‑bit binary value.
00100001
41
10100110
00101001
174
10000110
10101110
86
01010110
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.
2F
15
D6
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer Science.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
Structure ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Explain why presentation is often separated from structure when creating a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) The table contains five terms or definitions that relate to the Internet.
Term Definition
........................................................................................
browser ........................................................................................
........................................................................................
........................................................................................
........................................................................................
........................................................................................
cookie ........................................................................................
........................................................................................
[5]
(b) Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick (3)
(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain one benefit to a user if the program is distributed as free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) Identify two online security attacks that can be carried out using email.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
[6]
7 Cassie stores data for her business every day. She stores the data using optical data storage.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
(b) Six statements are given about the operation of three different types of storage.
Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.
Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify three ethical issues that may need to be considered when developing and distributing
software.
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
00100001
41 10100110
00101001
174
10000110
86 10101110
01010110
1(b) One mark for correct working, one mark for correct answer 2
Working e.g.
256 64 16 4 2 1
Answer:
343
2(a) Two marks each correct conversion (one mark for the first four bits, one mark for the second four bits) 6
0 0 1 0 1 1 1 1
2F
0 0 0 1 0 1 0 1
15
1 1 0 1 0 1 1 0
D6
2(c) One mark for a description, one mark for a correct example 4
Structure
Layout of the web page
e.g. Where text is placed
Presentation
Formatting of the web page
e.g. the colour of the font
The formatting of the page can be changed/edited without needing to alter the structure
… so, they can make regular updates without needing to check the structure
Term Definition
HTTP // HTTPS this is a protocol that is used to send data for web
pages across the Internet
(The parent can) set criteria for the websites she is allowed to visit
… such as a whitelist/blacklist of websites
The firewall will examine the data/traffic incoming and outgoing from her computer
If data is sent from a website that is not allowed, it will be blocked
5(a) One mark for each correct logic gate with correct input(s) 5
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
6(a) One mark for identifying the attack, two marks for the description 6
Phishing
Email is sent to user to encourage them to click link
… that takes user to fake website
Pharming
Email is sent to user to encourage them to click link/download attachment
… that triggers download of malicious code that will redirect user to fake website
Virus/malware
Email is sent to user to encourage them to click link/download attachment
… that triggers download of virus/malware
Encryption
Password
Two-step / Two-factor authentication/verification
Biometric device
Anti-malware // Anti-virus
Proxy-server
6(c) One mark for identifying an issue, one mark for suggesting a suitable prevention 6
Software failure
Making sure it is always up to date // enable automatic updates
CD
DVD
Blu-ray
Type of storage
e.g.
Copyright
Plagiarism
Production/distribution of malware
Intellectual property theft
Privacy of data
Age appropriation
Offensive materials
Environmental impact of distribution media e.g. CDs
Accessibility of software
Security of software
Following guidelines of professional bodies e.g. ACM/IEEE/BCS
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 303905/4
© UCLES 2022 [Turn over
2
Tick (3) to show if each device is an example of an input device, an output device or a
storage device.
keyboard
microphone
headphones
actuator
[5]
(b) There are three different types of storage device. One type is magnetic.
Type 1 .......................................................................................................................................
Type 2 .......................................................................................................................................
[2]
2 An aeroplane has a small display screen above each seat, to display the seat number.
(a) The seat number is a hexadecimal value. A 12-bit binary register is used to store the data to
display each seat number.
Three seat numbers, 05A, 18C and 29F, are allocated to passengers.
Give the 12-bit binary value that would be stored for each hexadecimal seat number.
05A ...........................................................................................................................................
18C ...........................................................................................................................................
29F ...........................................................................................................................................
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) The display screen used above each seat is a Light-Emitting Diode (LED) display screen.
Give two reasons why an LED display screen has been used.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
(c) Two of the registers store the values 010000001101 and 000001111110
Give the hexadecimal seat number that would be displayed on the screen for each of these
binary values.
010000001101 ....................................................................................
000001111110 ....................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (3) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.
AND OR XOR
Statement
(3) (3) (3)
[4]
(b) NOT, AND, OR and XOR are all examples of logic gates.
State the name of two other logic gates and complete a truth table for each.
A B Output
0 0
0 1
1 0
1 1
A B Output
0 0
0 1
1 0
1 1
[4]
4 Freddie types a Uniform Resource Locator (URL) into the address bar of his browser.
(a) A URL is a text-based version of a website address. It is made up of several different parts.
Part 1 ........................................................................................................................................
Part 2 ........................................................................................................................................
Part 3 ........................................................................................................................................
[3]
(b) Explain how the URL is converted into an Internet Protocol (IP) address for the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) A protocol is used to securely transmit the data for the website to the browser.
..................................................................................................................................... [1]
(ii) Identify how this protocol changes the data to transmit the data securely.
..................................................................................................................................... [1]
5 Harriet has a computer that is based on a Von Neumann model for a computer system.
Identify the three stages of the cycle performed by the CPU in your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) The memory address register (MAR) is one component built into the CPU.
(i) Identify four other components that are built into the CPU.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
Component 3 .....................................................................................................................
Component 4 .....................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [7]
(ii) The secondary storage in Harriet’s computer is damaged, so it is removed for repair.
This means the computer will no longer work.
Explain why the secondary storage is needed for the computer to work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(a) Tick (3) to show which type of data is stored in a JPEG file.
Tick (3)
Video
Sound
Image
[1]
Tick (3) to show whether the JPEG file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
[1]
(c) Frida scans a text document into her computer so that she can store a digital version. She
uses a 2D scanner to do this.
Describe how the text document is scanned by the 2D scanner to create the digital version.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
The compression algorithm she uses recognises repeating patterns in the data and indexes
these patterns. No data is permanently removed.
............................................................................................................................................. [1]
7 Umar is a manager in an office. The data that he uses on a daily basis is stored on a file server
close to his computer.
Data is sent from his computer to the file server using parallel simplex data transmission.
(a) Describe how the data is sent using parallel simplex data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Explain why the parallel simplex data transmission method that Umar uses is no longer
suitable.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Checksum and Automatic Repeat reQuest (ARQ) are both used when transmitting the data
from a computer to the file server.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the paragraph using the most appropriate terms from the list. Not all terms in the list
need to be used.
• all at once
• assembler
• assembly language
• binary
• commenting
• compiling
• debugging
• executable file
• high-level language
• interpreted
• is not required
• is required
• line by line
• low-level language
translating and reports an error at the place where it occurs in the code.
[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
keyboard
microphone
headphones
actuator
1(b) Optical 2
Solid state
2(a) Per each binary conversion, one mark for 2 correct character conversions, two marks for three correct character 6
conversions
2(c) Per each hex conversion, one mark for 2 correct character conversions, two marks for three correct character conversions 4
40D
07E
3(b) One mark for the correct name and one mark for the correct truth table 4
NOR
A B Output
0 0 1
0 1 0
1 0 0
1 1 0
NAND
A B Output
0 0 1
0 1 1
1 0 1
1 1 0
Protocol
Domain name / Web server name
Filename / web page name / folder name
4(c)(i) HTTPS 1
It encrypts it
It applies encryption algorithm
It applies an encryption key
It processes data
It processes/executes instructions
It carries out calculations
It carries out logical operations
Fetch
Decode
Execute
To temporarily store
… the address of the next data/instructions required
… the address of the location in memory where data is to be stored
Stores the address that is to be collected by the address bus
It is RAM …
… which is volatile storage
It is ROM …
… which is non-volatile storage
It is directly accessible by the CPU
BIOS
Start-up instructions
Programs that are currently in use
Data that is currently in use
Parts of OS currently in use
6(a) Image 1
Parallel is not suitable for long distances // only suitable for short distances
… the data could become skewed
Parallel cables are not manufactured above approx. 5m
high-level language
line by line
all at once
executable file
is not required
debugging