Cambridge IGCSE: Solved
Cambridge IGCSE: Solved
™
Cambridge IGCSE
Asmita Parnami
I A 1 4 5 0 2 0 9
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2023_1.13
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the bar code.
A check digit
B format check
C range check
D spell check
[1]
(b) an internal component that provides the input and output of audio signals
Sound card
........................................................................................................................................... [1]
(c) an internal component that is composed of the main memory, the control unit and the arithmetic
logic unit.
3 A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and
a scanner to use to convert the hard-copy photographs into a digital format.
Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.
Similarities
..................................................................................................................................................
Both capture images
Both store digital data
..................................................................................................................................................
Both create digital images
..................................................................................................................................................
Differences
Digital camera is more portable
..................................................................................................................................................
Scanner captures the image in more detail
Scanners do not have a keystone effect
..................................................................................................................................................
Digital camera may capture glare/shadow off the image
Digital camera has faster data capture
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
1 An extranet is part of a company's intranet
2 The company gives permission for customers and suppliers to access it
...........................................................................................................................................
3 Enables businesses to exchange information over the internet in a secure way
4 Requires credentials/username and password to access it
...........................................................................................................................................
........................................................................................................................................... [2]
5 State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.
6 A company requires its employees to regularly change their login passwords for the company’s
computer systems. Passwords must be strong and cannot be reused.
(a) Explain three problems that may occur when the employees change their passwords regularly.
...........................................................................................................................................
...........................................................................................................................................
2 May
........................................................................................................................................
be more difficult to find a different password …
… the passwords/security could be weakened
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Users could easily forget the current password … leading to system lock out
3 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
4 It may be typed incorrectly as the password is like the previous one …
...........................................................................................................................................
… could lead to login errors
[6]
5 Users may have to write the passwords down so they are not forgotten …
… this may lead to others seeing the passwords
(b) The company has a website which uses a digital certificate.
Company/owner's name
1 ........................................................................................................................................
Date issued
3 ........................................................................................................................................
4 Expiry date
5 Company/owner's digital signature [3]
6 Issuer's/Sender’s name
7 Serial number
7 A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.
=IF(AND(A10>1,A10<32),"OK","error")
(a) Identify two items of extreme test data the student should use and give the reason why this
data was chosen.
2
Extreme test data 1 ..........................................................................................................
32
Extreme test data 2 ..........................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
........................................................................................................................................... [6]
9 (a) The products in a warehouse contain either a bar code or a Radio Frequency Identification
(RFID) tag.
Compare bar code readers and RFID readers. Your answer must include similarities and
differences.
Similarities
...........................................................................................................................................
Both readers scan the product code
Both readers use direct data entry
...........................................................................................................................................
Both readers allow tracking of products
Both readers are contactless
...........................................................................................................................................
Differences
...........................................................................................................................................
Bar code readers only scan one bar code at a time whereas RFID readers
read multiple tags at the same time
...........................................................................................................................................
Bar code readers require a direct line-of-sight with the code
RFID readers use near-field technology
...........................................................................................................................................
Bar code readers need to be close to the bar code
...........................................................................................................................................
Bar code needs to be in the correct position for reader to be able to read it
...........................................................................................................................................
Bar codes readers might not be able to read a damaged/scratched bar code
...........................................................................................................................................
whereas RFID can read data as long as chip/tag is not severely damaged.
...........................................................................................................................................
Bar code reader might have read errors if the bar code is damaged/scratched
...........................................................................................................................................
whereas RFID readers are more likely to read damaged/scratched tags
........................................................................................................................................... [6]
Bar code readers emit/use light whereas RFID uses electromagnetic/radio waves
(b) Identify two other uses of RFID.
Name attributes
1 ........................................................................................................................................
Charset//Character set
2 ........................................................................................................................................
Content attributes
3 ........................................................................................................................................
[3]
11 Some gaming systems use gesture based user interfaces to operate a game.
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the drawbacks of using gesture based user interfaces in this way.
Fatigue/gorilla arm
...........................................................................................................................................
User can unintentionally activate the device …
… by moving their arms/fingers
...........................................................................................................................................
Not as accurate as other interfaces
Issues with stopping the gesture …
...........................................................................................................................................
… if user touches a button, interface knows the command is completed
Have to learn what the gestures do//Having to remember the gestures
...........................................................................................................................................
Could cause damage if in restricted space
May have a limited number of gestures that can be used
...........................................................................................................................................
Users with physical disabilities may not be able to make the gestures
Have to use/learn the gestures accurately otherwise they may not be
...........................................................................................................................................
identified
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing movies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Hard disks and Blu-ray discs are examples of backing storage.
................................................................................................................................
................................................................................................................................
3 Slower to access than internal memory
[2]
Magnetic tape
1 ............................................................................................................................
CD
2 ............................................................................................................................
3 DVD
4 DVD RAM [2]
5 Memory cards
6 Pen drives
7 SSD
8 Cloud storage
9 Flash memory
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Data is collected by different types of sensor and then input to the computer model to be
processed.
Pressure
1 ........................................................................................................................................
Temperature
2 ........................................................................................................................................
3 Moisture/Humidity
4 Wind speed [2]
Printer
1 ........................................................................................................................................
Monitor
2 ........................................................................................................................................
3 Plotter [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Give two methods that could be used to prevent software copyright legislation being broken.
...........................................................................................................................................
Users install DRM (parts of the code which stop you from copying it)
2 ........................................................................................................................................
...........................................................................................................................................
3 Use of license agreements
4 Getting permission from the owner [2]