Cambridge IGCSE: 0417/12 Information and Communication Technology
Cambridge IGCSE: 0417/12 Information and Communication Technology
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
[2]
ROM .................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
RAM ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).
State three advantages of using SSDs rather than HDDs in a laptop computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.
Using what-ifs
[4]
5 The World Wide Web (WWW) is often mistaken for the internet.
(a) Explain the differences between the WWW and the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
https://www.cambridgeinternational.org/IGCSE
https:// ...............................................................................................................................
...........................................................................................................................................
cambridgeinternational .....................................................................................................
...........................................................................................................................................
.org ...................................................................................................................................
...........................................................................................................................................
/IGCSE .............................................................................................................................
...........................................................................................................................................
[4]
6 Global Positioning Systems (GPS) are used for many different applications.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.
For this concert they are going to use an online booking system.
(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.
........................................................................................................................................... [1]
(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The introduction of computers into the work place has affected job patterns.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Employees working in an office use computers for prolonged periods of time.
Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
State two physical safety issues that might exist from the introduction of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.
Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.
Choose the most appropriate implication that matches the descriptions given below.
........................................................................................................................................... [1]
(b) Not giving information about the ICT solution to another company.
........................................................................................................................................... [1]
12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.
Cars are serviced every 10000 km, for example 10000 km, 20000 km.
The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.
(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.
Vehicle_licence_plate
Powered_by
Numeric:integer
Cost_of_service
Text
Date_of_service
[6]
Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.
(i) Vehicle_licence_plate
Description ............................................................................................................
................................................................................................................................
[2]
(ii) Cost_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(iii) Date_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.
Describe three other ways he could make appropriate use of the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) Arjun uses the internet to carry out research for his work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Describe two other ways the office system could identify the user securely.
1 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2
[2]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
(a) The network device that is used to transmit the data along an analogue telephone line is a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The network device that allows data to be directed to a specific computer on a LAN is a
........................................................................................................................................... [1]
(d) The internal network device that allows a computer to connect to a LAN is a
........................................................................................................................................... [1]
The paragraph below shows some of the formatting features that can be used.
(a) Write down four of the formatting features that have been used in the paragraph shown.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.
Summer
Steam Festival Summer
2022 Steam Festival
2022
A B
Describe the steps that have been used to transform logo A into logo B.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in your answer.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
...........................................................................................................................................
Example 2 .........................................................................................................................
...........................................................................................................................................
[3]
(c) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:
(a) Write down only the part of the URL which shows the file name of the teaching guide.
........................................................................................................................................... [1]
(b) Write down only the part of the URL which is the folder where the teaching guide is stored.
........................................................................................................................................... [1]
(c) Write down only the part of the URL which is the domain name.
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
=VLOOKUP(F2,A2:B9,2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Normal ..............................................................................................................................
...........................................................................................................................................
Abnormal ..........................................................................................................................
...........................................................................................................................................
Extreme ............................................................................................................................
...........................................................................................................................................
[3]
(c) Explain, using examples, the differences between a function and a formula.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(d) The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the ways that a user can recognise spam and methods to help prevent it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe two issues related to the security of data in the cloud.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
16 A company uses corporate house style within the headers and footers in its documents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2
Memory
Mouse Printer Spreadsheet
stick
[2]
2 Name an appropriate validation routine for each statement. Each answer must be different.
(a) The last digit in a code used to ensure the other digits have been entered correctly.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) This validation routine ensures data has been entered into a field.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 Identify two input devices which are used in computer control systems.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Computers can store data in the cloud rather than using storage devices in the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.
(a) Write down one example of each of the following types of test data. The answers must be
different in each case.
Normal ..............................................................................................................................
Abnormal ..........................................................................................................................
[2]
(b) When a ticket is produced for the new system it contains a QR code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
6 Eye strain is one of the health issues associated with using computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.
(a) Discuss the advantages and disadvantages to the customer of shopping for food online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.
Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.
Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Both the internet and the intranet are used for communication.
(i) Internet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Intranet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.
Original image
New image
(a) Explain the steps needed to change the original image to the new image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Explain the differences between a jpg and a png file type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The protection of personal data is important as many transactions are carried out online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.
Give four advantages of using mail merge instead of typing out the letter each time.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.
A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
[2]
2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.
Describe two advantages of using a memory stick rather than the cloud to store data.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain the differences between attached stylesheets and inline style attributes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.
Reason .............................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
8 When using computers people can suffer from Repetitive Strain Injury (RSI).
(a) Describe the term RSI. Include in your answer the causes of RSI.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Martin will need to use software to create different types of content before including them in
the presentation.
Name two types of software that he might use and for each one, write down what he would
use it for.
Software 1 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
Software 2 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.
(a) Name three sensors that could be used to measure the pollution in the river.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.
(a) For each of the following physical safety issues describe two ways of helping to prevent them.
(i) Fire
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(ii) Electrocution
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(b) Describe three eSafety measures which should be taken when playing games on the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 (a) Explain the need for copyright legislation when data is published on the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe methods that software producers use to prevent software copyright being broken.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.
(i) Describe four other constraints that may affect the use of email.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
3 ............................................................................................................................
................................................................................................................................
4 ............................................................................................................................
................................................................................................................................
[4]
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.
Length ...............................................................................................................................
Type ..................................................................................................................................
[3]
(c) Name the most appropriate field from the table that could be used as a primary key in the
database.
........................................................................................................................................... [1]
15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.
When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.
(a) Describe four checks that the bank’s computer will make on the customer’s bank account.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the processing carried out by the theatre’s computer when making a booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The first line of a paragraph that appears as the last line of the previous page is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
3 Circle two features of multimedia presentations which would not be found in a word processed
document.
[2]
4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.
(a) Write down the component within the expert system that matches the definition given.
................................................................................................................................
................................................................................................................................ [1]
(ii) This component carries out the reasoning of the expert system.
................................................................................................................................
................................................................................................................................ [1]
(iii) This component allows the person to interact with the system.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.
(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.
Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)
[4]
The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.
(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
6 A web page can contain images saved as png or gif file types.
png ....................................................................................................................................
...........................................................................................................................................
gif ......................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).
(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.
Presence ..........................................................................................................................
Lookup ..............................................................................................................................
Range ...............................................................................................................................
Length ...............................................................................................................................
[4]
(b) Write down the most appropriate field name from the table that could be used as a primary
key field.
........................................................................................................................................... [1]
Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.
(c) Describe the benefits and drawbacks of using the digital versions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.
(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give two other examples of biometric methods that could be used in this scenario.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Describe the constraints that you need to consider when writing and sending an email.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.
Optical ..............................................................................................................................
...........................................................................................................................................
Magnetic ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three differences between optical and magnetic backing storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Explain two ways she could search for information on the World Wide Web (WWW).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the differences between the internet and the World Wide Web (WWW).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.
(a) Name and describe the other two web development layers.
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(b) Explain why tables can be used to structure elements within a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
14 Explain why page, section and column breaks are used in documents.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.
(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe what is meant by the term encryption and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Tick (✓) the most appropriate working pattern to match the following statements.
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from this list of word processing
terms.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The indentation of a paragraph where all the lines except the first are indented is called
........................................................................................................................................... [1]
(d) The last line of a paragraph that appears as the first line of the next page is called a
........................................................................................................................................... [1]
2 Database, presentation, spreadsheet and word processing software are used by a medical centre.
Tick (✓) the most appropriate piece of software to carry out the tasks shown.
[4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Workers in an office log onto the office computer network using a password.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.
(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.
...........................................................................................................................................
Benefit ..............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[3]
6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.
(a) Describe the benefits and drawbacks of storing membership details on a computer database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The secretary collects data from the members on paper-based forms.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
5 ........................................................................................................................................
...........................................................................................................................................
[5]
8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.
Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
As our use of the cloud increases, new ways of accessing it safely need to be developed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 High street banks now offer customers access to internet banking when they are in the physical
bank.
Discuss the advantages and disadvantages to the bank of using internet banking in this way.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.
(a) Explain why an email group is used when contacting the villagers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.
(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Write down two features of a GUI and for each give a reason why they are needed.
Feature 1 ..................................................................................................................................
Reason 1 ..................................................................................................................................
..................................................................................................................................................
Feature 2 ..................................................................................................................................
Reason 2 ..................................................................................................................................
..................................................................................................................................................
[4]
Describe how the use of computers has affected the work of employees and their working patterns.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
rtf ......................................................................................................................................
...........................................................................................................................................
pdf .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
(a) A margin between the main content of the page and the fold of a book is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) Feature of word processing that causes text to flow around an image is called
........................................................................................................................................... [1]
(d) When text is aligned along both the left and right margins this is called
........................................................................................................................................... [1]
2 Smartphones and smartwatches can be used in everyday life. A smartwatch is a wearable computer
in the form of a wrist-watch.
(a) Apart from accessing the internet, give three other uses of a smartphone.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 According to research carried out on passwords the top three most used passwords are 12345,
qwerty and sunshine.
Describe, using other examples, the difference between a weak password and a strong password.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
4 A teacher is setting up a database which she will use to record her student’s exam marks.
(a) The teacher is planning to test the mark range using different types of test data. The range of
marks that the teacher can award is 0 to 100.
(i) Write down one example of extreme test data that the teacher can use to check the
range.
................................................................................................................................ [1]
(ii) Extreme test data is one type of test data. The teacher uses two other pieces of test
data.
Write down the type of test data for each of the examples.
TEN .......................................................................................................................
55 ..........................................................................................................................
[2]
Write down the field name which is the most appropriate for the data type, based on the data
shown in the table. Your answers must be different in each case.
Boolean ............................................................................................................................
Alphanumeric ....................................................................................................................
[4]
5 A student is carrying out a scientific experiment to measure the temperature of a liquid as it cools
down. The student uses a sensor connected to a computer to read the temperature.
(a) Give three advantages of using computers and sensors rather than the student taking the
temperature readings herself.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe how the readings taken by the sensor are displayed on a graph using the computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Explain the differences between measurement systems and control systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
6 There have been major issues regarding the accuracy of facial recognition systems for identifying
suspects by the police.
Tawara Airport has installed biometric security including facial recognition systems to help the
police recognise known criminals entering and leaving the country. Previously video was taken of
all passengers and then checked manually.
(a) Discuss the effectiveness of using facial recognition systems rather than the manual video
system to increase security in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
Evaluate how you would use eSafety strategies in your own use of instant messaging.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
8 Discuss the moral implications which need to be considered when creating an ICT solution.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
9 Use of smartphones to access the internet has increased by over 200% in the past five years.
Compare the use of smartphones to access the internet with the use of desktop computers to
access the internet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 A group of students in a school are planning to publicise a school concert. They can either produce
a web page which will be sent to the company that runs the school website or create a multimedia
presentation and show this to students and visitors.
(a) Give two types of content which could be used in a multimedia presentation that cannot be
used in a printed leaflet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Describe the advantages and disadvantages of using a multimedia presentation rather than
a web page on the school website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The students need to test their multimedia presentation before it can be used.
(c) Name two output devices they can use and for each one, write down a reason for its use.
Reason .............................................................................................................................
...........................................................................................................................................
Reason .............................................................................................................................
...........................................................................................................................................
[4]
11 A receptionist in a medical centre is going to send out emails to patients about medical results. The
receptionist will use the data from patients’ medical and personal records and mail merge these.
One of the disadvantages of this system is that the receptionist will have access to personal data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
Due to data protection laws, personal data should be kept confidential and secure.
(b) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
12 Many students prefer to store data on external storage devices like pen drives or portable hard disk
drives.
Describe four advantages of using a pen drive rather than a portable hard disk drive.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
13 Hyperlinks, bookmarks and anchors are software tools used in web pages and web browsers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
14 A research student is undertaking a study of endangered animals in the Amazon rainforest. She
is using a drone to replace surveys carried out on foot. A drone is a remote-controlled flying vehicle.
Describe the benefits and drawbacks of using a drone to monitor the animals in the rainforest.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2023_1.10
© UCLES 2023 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
A Buzzer
B Laser printer
C Touch screen
D Webcam
[1]
3 State three items that should be included in the technical documentation of a computer system.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
Give four precautions that young people should take when using social media.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
5 The number of people using online shopping has increased. This has led to an increase in the
number of journeys for the delivery drivers.
Describe how an expert system can be used to produce the best route for the delivery of items.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
State two devices found in the home which could be connected via Bluetooth.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
8 Many devices in the home can connect to the internet. These are called smart devices.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
9 A web page can contain three web development layers. One of these is the content layer.
...........................................................................................................................................
........................................................................................................................................... [1]
(b) Identify the other two web development layers and give a use for each.
1 ........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
[3]
(a) Describe the possible effects on his computer system if he opens the file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain how the student could prevent the computer from being infected by viruses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Some files containing viruses have to be quarantined as they cannot be deleted.
(i) State the type of files that may have to be quarantined rather than deleted.
................................................................................................................................ [1]
(ii) Explain how the software detects and quarantines the file.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
12 A tennis coach is creating a presentation to explain to teenagers the basics of playing tennis.
(a) Describe the design features that must be included to make the presentation appeal to the
teenagers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) The designer needs to be aware of copyright legislation when creating the presentation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Give two advantages of watching the movie by streaming rather than from a Blu-ray disc.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
14 Compare RAM and ROM. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
15 Tawara Stores is a small company that does not make much profit. The managing director is
deciding whether to implement a new IT system using direct changeover or parallel running.
Describe the advantages and disadvantages of using direct changeover compared with parallel
running in this scenario.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
16 A school car park is controlled by a barrier. When teachers enter the car park their number plate
is read and the barrier is raised automatically.
camera
microphone
keypad
speaker
pressure
sensor
motor
Fig. 16.1
(a) Visitors can use the keypad as an input device to enter a code which allows the barrier to be
raised.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Automated Number Plate Recognition (ANPR) is used to read and check the number plate of
the vehicle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Method 1 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
................................................................................................................................
................................................................................................................................ [1]
................................................................................................................................
................................................................................................................................ [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2023_1.12
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the ISBN.
A character check
B format check
C length check
D range check
[1]
(a) An internal hardware component that connects a computer to a Local Area Network.
........................................................................................................................................... [1]
(b) An external device that retains a computer’s data even after the computer is turned off.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 A group of students are producing a class newsletter which they will email to parents of
students in the class. They are deciding whether to use a laptop computer or a smartphone
to type the newsletter.
(a) Discuss the advantages and disadvantages of using a laptop computer rather than a
smartphone for this purpose.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The students have decided to use a smartphone. Data for the newsletter will be input,
stored and output by the smartphone.
(i) Identify two devices that are part of the smartphone that could be used to input
the data for the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(ii) Identify two devices that are part of the smartphone that could be used to output
data from the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(iii) Identify two appropriate devices that could be used to store data for the
newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(c) The newsletter is to be saved as a PDF and sent as an email attachment to parents.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) Describe the features that the students must include to make the newsletter appeal to
the parents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Compare an intranet with an extranet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
5 Identify two appropriate IT-related causes for each of the health issues. Your answers
must be different in each case.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe the steps involved in automatic stock control when an item is sold at a POS
terminal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 A teacher is creating a spreadsheet as an electronic mark book. Part of the electronic mark
book displays how well a student did on a piece of work. When a student completes a piece
of work the teacher will enter the mark into the electronic mark book and a message will be
displayed.
=IF(A1>=60,"Merit",IF(A1>50,"Pass","Not Pass"))
The formula will need to be tested. The teacher will do this by entering test data into cell A1.
(a) Explain the steps that need to be taken to test the formula. Include in your answer any
test data used and the reasons why these were chosen.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
State the changes he needs to make to the formula to ensure ‘Pass’ is displayed.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) When the electronic mark book is complete it needs to be tested with live data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
9 The manager of an organisation is planning a meeting of its directors. The manager plans
to use audio-conferencing for the meeting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Identify the hardware and software required to join the audio-conference.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 A school secretary is composing an email. She will send the email to a teacher and will
copy the headteacher into the message. She can either copy the headteacher in as cc or
bcc.
Compose
To:
cc:
bcc:
Subject:
cc ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
bcc ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) A teacher is considering setting up either a forum or a blog for his class to help his
students with their studies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
12 A web page has an attached stylesheet in the head section and also has an inline style
attribute in the body section.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2023_1.9
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate data type for the ISBN.
A Numeric: integer
B Text
C Boolean
D Date
[1]
........................................................................................................................................... [1]
(b) A printed circuit board containing the CPU and other components of a computer.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(d) A printed circuit board that is installed in a computer so that the computer can be connected
to a network.
........................................................................................................................................... [1]
3 A headteacher is setting up a newsletter to send to parents of pupils at a school. She has some
photographs saved on storage devices that she needs to place in the newsletter.
State two communication methods which the headteacher could use to upload the photographs
onto the school network.
1 ...............................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
5 State the safety issue that is most likely to occur for each of these causes.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
6 A student has set up a password for his laptop computer. The password he has chosen is
Px2zY!Cg3?bd
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The student could have protected his laptop computer by using two-factor authentication. This
could have combined his password with a biometric method.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
7 A systems analyst has been asked to carry out an analysis of a company’s current computer system.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) The systems analyst is working with a team to create some new software. The software
documentation will be stored on the cloud.
Describe how the team can use the cloud to share the documentation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Members of the team can use video-conferencing to join business meetings from different
locations around the world.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 (a) Compare Optical Mark Readers (OMRs) with Optical Character Readers (OCRs). Your answer
must include similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
9 (a) Absolute and relative file paths are used in the content layer when creating a web page.
(i) Explain the differences between an absolute file path and a relative file path.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Explain why absolute file paths should not be used for hyperlinks to locally-saved web
pages.
................................................................................................................................
................................................................................................................................ [1]
Compare an anchor with a hyperlink. Your answer must include similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Some people use dialogue-based user interfaces to operate their car audio system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the benefits and drawbacks of using a dialogue-based user interface in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
11 Portable hard drives can be Solid State Drives (SSDs) or Hard Disk Drives (HDDs).
Explain why the SSD may be better to use than the HDD.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
12 Many media companies now provide media streaming for users to watch their television programmes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Give one reason for using each of the file formats. Each of your reasons must be different.
gif ......................................................................................................................................
...........................................................................................................................................
jpg .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) The file size of an image can be reduced by changing the file format of the image.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
14 Identify the most appropriate method for reducing data entry errors from the descriptions given.
(a) Manually checking the data without reference to the original copy.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) Preventing errors when data is copied from one medium to another.
........................................................................................................................................... [1]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2023_1.13
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the bar code.
A check digit
B format check
C range check
D spell check
[1]
........................................................................................................................................... [1]
(b) an internal component that provides the input and output of audio signals
........................................................................................................................................... [1]
(c) an internal component that is composed of the main memory, the control unit and the arithmetic
logic unit.
........................................................................................................................................... [1]
3 A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and
a scanner to use to convert the hard-copy photographs into a digital format.
Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
5 State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
6 A company requires its employees to regularly change their login passwords for the company’s
computer systems. Passwords must be strong and cannot be reused.
(a) Explain three problems that may occur when the employees change their passwords regularly.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
7 A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.
=IF(AND(A10>1,A10<32),"OK","error")
(a) Identify two items of extreme test data the student should use and give the reason why this
data was chosen.
Reason .............................................................................................................................
...........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
9 (a) The products in a warehouse contain either a bar code or a Radio Frequency Identification
(RFID) tag.
Compare bar code readers and RFID readers. Your answer must include similarities and
differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
........................................................................................................................................... [1]
11 Some gaming systems use gesture based user interfaces to operate a game.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the drawbacks of using gesture based user interfaces in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing movies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Hard disks and Blu-ray discs are examples of backing storage.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
1 ............................................................................................................................
2 ............................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Data is collected by different types of sensor and then input to the computer model to be
processed.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Give two methods that could be used to prevent software copyright legislation being broken.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2023_1.10
© UCLES 2023 [Turn over
2
1 Peter needs to create a validation check for product numbers. Three examples of product numbers
he needs to check are:
977135120127916
976143148163921
845132120651166
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
2 A student has created a document with images for her geography project.
(a) The layout of page one is portrait orientation. The student needs to set page two as landscape
orientation. Before she can set the landscape orientation she needs to insert a break.
........................................................................................................................................... [1]
State two file formats she could have used for the images.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
3 A teacher is setting up a school shop. The teacher is setting up a spreadsheet to keep the accounts
of the shop.
(a) Fig. 3.1 shows a box containing 50 Choco Bars to sell in the shop. The information on the box
will be entered into the spreadsheet.
Choco Bars
B
Contains:
D Special Price 50
Only
$1.20 Sell by: C
1/4/2025
Fig. 3.1
State the most appropriate display format in the spreadsheet for each piece of data shown on
the box. Your answer must be different in each case.
A .......................................................................................................................................
B .......................................................................................................................................
C .......................................................................................................................................
D .......................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) The teacher has created a formula in the spreadsheet that calculates the cost of purchasing
a number of different items.
• subtracts the discount per item from the price of the item to find the cost of the item
• then multiplies the cost of the item by the quantity.
A B C D E F
1 Product Price of item Discount per item Quantity Total
2 Choco Bar $1.20 $0.20 15 –$1.80
=B2-C2*D2
When this formula is entered into cell E2 the result is not what she expected. The result should
be $15.00
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(a) Explain how a user ID and a password are used to increase the security of data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The company plans to improve the security of its computer system by using biometric methods.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[4]
5 A student needs to purchase a new computer for use on his university course.
The laptop computers available to him are one that contains a solid-state drive (SSD) or one that
only stores data on the internet, using the cloud.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
6 A computer model can be used to design and test a bridge before it is built.
Discuss the benefits and drawbacks of using a computer model before building a bridge.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
(a) The pilots at Rockit Aircraft are trained using extended reality.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Some of the components used in the manufacture of aircraft are produced using a 3D printer.
Analyse the use of a 3D printer to make the components rather than making the components
by hand.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 Many devices in the home can be connected to the internet so they can be controlled remotely.
These devices are called smart devices. A house contains a smart security system.
(a) Describe the benefits and drawbacks of using a smart security system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Identify two sensors that could be used with the smart security system.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Part of the smart security system involves an automatic gate for vehicles approaching the
house. There is a CCTV camera at the gate and the smart security system has software for
recognising each vehicle’s number plate.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) Describe three problems that could occur when the ANPR system reads a vehicle number
plate.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
9 The secretary of Tawara University has created web pages for former students. The former students
are adults.
(a) State the design features of the web pages that would meet the needs of this target audience.
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The web pages conform to the university’s corporate house style.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
10 A school has employed a systems analyst to help update its computerised examination system.
(a) The systems analyst researches the current system to see what will be required in the
new system.
State the methods of researching the current system that are described:
(i) talking to the network manager and examinations officer about the current system
................................................................................................................................ [1]
................................................................................................................................ [1]
................................................................................................................................ [1]
(b) After completing the analysis, the new system needs to be designed. One item that needs to
be designed is a file structure.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_11_2023_1.13
© UCLES 2023 [Turn over
2
1 A newsagent has created a database with fields to store details of each newspaper and magazine
he sells. Part of the database is shown.
(a) Tick (✓) the field name that would be the most appropriate primary key for the database.
A Product_number
B Name_of_publication
C Selling_price
D Frequency
E Publisher
[1]
(b) The newsagent has added a field called Bar_code to store the bar code number of the product.
Explain why a presence check is not a suitable validation check for the Bar_code field.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) The newsagent could use a relational database rather than a flat file database.
Describe the advantages of using a relational database rather than a flat file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) From the data shown in the part of the database, identify the most appropriate data type
for the:
(i) Selling_price
................................................................................................................................ [1]
(ii) Name_of_publication
................................................................................................................................ [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The item of hardware that converts data from a sensor so a microprocessor can read it is
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 A group of students are carrying out a study of the quality of river water for a project. They can
either use a tablet computer or a smartphone to monitor and record their findings.
(a) Discuss the advantages and disadvantages of using a tablet computer rather than a smartphone
for this project.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Identify two devices that could be used by the students to enter data.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
4 A headteacher is considering setting up a card system for students to buy food in the school canteen.
The headteacher is trying to decide whether to install a system that uses magnetic stripe card
readers or one that uses chip and PIN card readers.
Compare the use of magnetic stripe card readers with the use of chip and PIN card readers. Your
answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(a) Describe two disadvantages of saving the list of players as a PDF file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
The cricket club has a junior team for 6−8-year-old players. The secretary has produced an
ePublication to attract new members to the junior team.
(b) State two features of an ePublication that could not appear on a paper poster.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Describe the features that could be used to make the ePublication attractive to a younger
audience.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
7 An employee in a company has used QWERTY123 as his login password for some time.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Complete the sentences using the most appropriate data protection method from the list.
Your answers must be different in each case.
................................................................................................................................ [1]
................................................................................................................................ [1]
................................................................................................................................ [1]
(iv) A hardware device that filters the information coming through the Internet connection
into a LAN is
................................................................................................................................ [1]
(c) An employee in the company uses his company password for other accounts.
...........................................................................................................................................
........................................................................................................................................... [1]
Describe, with examples, how using these devices can affect the health and fitness of their users.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 Rowena’s laptop computer contains a small capacity Solid State Drive (SSD) of 32Gb and
a large capacity Hard Disk Drive (HDD) of 1024Gb.
(a) State, giving a reason for your choice, a use for the SSD and a use for the HDD in the
laptop computer. Your answers must be different in each case.
(i) SSD
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) HDD
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
10 A teacher has set up a database for a class library. The data about the books in the class library
will be entered by the teacher.
(a) The data can be verified by double data entry or visual verification.
Compare double data entry with visual verification. Your answer must include similarities and
differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) When data is entered into a date field it is validated. An example of the data that could be
entered is 01/04/2023
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
11 Many Automatic Teller Machines (ATM) allow customers to print out mini statements of their bank
accounts.
Describe the inputs and processing involved in printing out a mini statement.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
12 A student has produced some work for a school project. A page of the work is shown.
The Problem
Wild wallabies (Macropus rufogriseus) con nue The Zoological Society of London keeps
to be reported across the whole of England. up-to-date records of private collec ons of
Despite the harsh winter condi ons, these wallabies in England, and to date there are over
animals have flourished in recent years. Many 100 such collec ons.
people have contacted the police with reported
sigh ngs in gardens, quiet country lanes and Many people ask why it ma!ers if these animals
even alongside busy motorways. have escaped, as they are not dangerous. The
problem is that the introduc on of invasive, non-
The original colony, thought to be the source of na ve species can have substan al impacts on
the English wallaby, was first reported in na ve species, and wallabies are no excep on.
Derbyshire in England. These animals were
believed to have been released in the 1940s from
a private zoo. It is more likely that other private
zoos and escapees from wallaby farms are to
blame.
Fig. 12.1
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) After running a spell check and proofreading his document the student notices that one word
is still showing an error.
Explain why this word has caused an error and how the student could ensure that the error
does not reappear when this word is used in future.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2023_1.10
© UCLES 2023 [Turn over
2
A sound card
B pen drive
C motherboard
D ROM
[1]
................................................................................................................................
................................................................................................................................ [1]
................................................................................................................................
................................................................................................................................ [1]
(b) Digital data is processed in a computer system. Sometimes digital data needs to be converted
to analogue data.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) Use the most appropriate phrase from the list to complete the sentences. Your answer
must be different in each case.
analogue data
digital data
................................................................................................................................
................................................................................................................................ [1]
................................................................................................................................
................................................................................................................................ [1]
................................................................................................................................
................................................................................................................................ [1]
3 Identify three different network communication devices and describe what each one does.
Device 1 ...................................................................................................................................
Description ...............................................................................................................................
..................................................................................................................................................
Device 2 ...................................................................................................................................
Description ...............................................................................................................................
..................................................................................................................................................
Device 3 ...................................................................................................................................
Description ...............................................................................................................................
..................................................................................................................................................
[6]
4 A teacher is creating a database for a class library. The teacher types the details of each book into
the database. The teacher has entered a number of records.
Databases are
1414 Cam Press 01/10/2009 0090116393
fun
Identify and describe a validation check based on the data shown in the database table, which
could be applied to the data as it is entered into each of the fields. Each validation check must be
different.
Book_number
Validation check........................................................................................................................
Description................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Date_acquired
Validation check........................................................................................................................
Description ...............................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
ISBN
Validation check........................................................................................................................
Description................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[6]
5 A group of pupils is planning to create a newsletter for a history project. The group can either use
a smartphone or a phablet computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Discuss the advantages and disadvantages of using a phablet computer rather than a
smartphone for this project.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(a) State two health issues associated with the use of multimedia projectors.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) State two safety issues associated with the use of multimedia projectors.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
7 A video of a race can be recorded using a camera either on an autonomous flying vehicle (drone)
or in a helicopter. A person would be needed in the helicopter to operate the camera.
Describe two advantages and two disadvantages of using an autonomous flying vehicle (drone)
to record the video of the race.
Advantage 1 .............................................................................................................................
..................................................................................................................................................
Advantage 2 .............................................................................................................................
..................................................................................................................................................
Disadvantage 1 ........................................................................................................................
..................................................................................................................................................
Disadvantage 2 ........................................................................................................................
..................................................................................................................................................
[4]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
9 A hospital administrator enters data from medical forms into a database. Validation and verification
are both used when entering data to minimise errors.
Explain what is meant by validation and verification and why they are both needed in this scenario.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 The manager of the Tawara Hotel has decided to computerise the hotel’s room booking system.
The new booking system will allow customers to book rooms online using an app on their
smartphones.
The manager has employed a systems analyst who will carry out research into the current system
by examining existing documentation and completed questionnaires from staff.
(a) One item of information that the systems analyst will need to identify is problems with the
current system.
State three other items of information that the systems analyst will need to identify.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Following the analysis, the systems analyst will implement the new system using either parallel
running or direct changeover.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Describe the benefits and drawbacks of using an online booking system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Discuss the benefits and drawbacks to the clothing retailer of using internet shopping.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Describe the steps the customer would take when purchasing the new clothes using internet
shopping.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
12 The manager of a sports club is designing an online form for members to enter their personal
details. The form must be accessible to all members of the club.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) State two characteristics of good form design that would help users with visual impairment to
enter their data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.