You are on page 1of 21

IGCSE - 0417 – ICT Past

Papers
Classified questions for chapter 5,8,10

Eng. Hiba O. Zaki 11/17/19 IGCSE – ICT Syllabus


IGCSE - 0417 – ICT PAST PAPERS

1.

ENG. HIBA O. ZAKI 1


IGCSE - 0417 – ICT PAST PAPERS

2.

3. A school encourages its students to use the Internet for research purposes.
Discuss the issues relating to such use with reference to the reliability and
desirability of the information.

……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………

ENG. HIBA O. ZAKI 2


IGCSE - 0417 – ICT PAST PAPERS

……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………[8]

4.

ENG. HIBA O. ZAKI 3


IGCSE - 0417 – ICT PAST PAPERS

(b)

5. Explain what is meant by the following terms.


Phishing………………………………………………………………………
………………………………………………………………………………..
………………………………………………………………………………..
………………………………………………………………………………..
Pharming……………………………………………………………………..
………………………………………………………………………………..
………………………………………………………………………………..
………………………………………………………………………………..
Spam………………………………………………………………………….
………………………………………………………………………………..
………………………………………………………………………………..
……………………………………………………………………………[3]

ENG. HIBA O. ZAKI 4


IGCSE - 0417 – ICT PAST PAPERS

6. When sending documents companies sometimes use email and sometimes


use ordinary
post.
(a) Give two reasons why email might be used.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) Give two reasons why ordinary post might be used.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]

7. Ali and his family have three computers in their home. He wants to connect
the computers into a network which will have access to the internet.
(a) Give two advantages of doing this.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….

ENG. HIBA O. ZAKI 5


IGCSE - 0417 – ICT PAST PAPERS

.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) Give two disadvantages of doing this.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
8.

ENG. HIBA O. ZAKI 6


IGCSE - 0417 – ICT PAST PAPERS

9. Describe three ways to evaluate the reliability of information found on a


website.
1.………………………………………………………………………………
..……………………………………………………………………………….
2.………………………………………………………………………………
..……………………………………………………………………………….
3.………………………………………………………………………………
..……………………………………………………………………………[3]

10.The internet has given rise to a number of developments, including blogs


and wikis.
(a) Give two features of a blog.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
ENG. HIBA O. ZAKI 7
IGCSE - 0417 – ICT PAST PAPERS

(b) Give two features of a wiki.


1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]

11. (a) Give two uses of ICT devices which, when prolonged, can cause RSI.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) Identify two safety issues and how they are caused.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]

12.The company’s workers are concerned that their data may not be secure.
Name three authentication techniques and for each one explain how it will
help to prevent illegal access to data
ENG. HIBA O. ZAKI 8
IGCSE - 0417 – ICT PAST PAPERS

1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...

2……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...

3……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[3]
13. (a) Explain what is meant by a computer virus.
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) Explain what is meant by hacking.
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
……………………………………………………………………………..[2]
14. (a) Explain what is meant by software copyright.
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
……………………………………………………………………………..[2]

ENG. HIBA O. ZAKI 9


IGCSE - 0417 – ICT PAST PAPERS

(b) Explain how software manufacturers attempt to prevent copyright being


broken.
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
……………………………………………………………………………..[2]

15.Computers can cause health problems. Identify two of these problems and
for each problem write down a method which would help you avoid it. Do
not use the same method for both answers.
Problem 1
.………………………………………………………………………………..
………………………………………………………………………………...
Method1.……………………………………………………………………...
…………..…………………………………………………………………….
Problem 2
.………………………………………………………………………………..
………………………………………………………………………………...
Method2.……………………………………………………………………...
…………..…………………………………………………………………[4]

16.A student wishes to use the internet in order to research a topic. Discuss how
the student can assess the reliability and bias of a website.

ENG. HIBA O. ZAKI 10


IGCSE - 0417 – ICT PAST PAPERS

………………………………………………………………………………...
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
………………………………………………………………………………...
.………………………………………………………………………………..
………………………………………………………………………………...
.……………………………………………………………………………[6]
17.The manager of a company wants to improve the security of the computer
network. She has decided to use authentication techniques so that employees
can identify themselves to the system.
Name three authentication techniques and describe how each technique
would help keep the data more secure.
Technique 1
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
Technique 2
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
Technique 3

ENG. HIBA O. ZAKI 11


IGCSE - 0417 – ICT PAST PAPERS

………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[6]

18.The prolonged use of computers can lead to health and safety problems.
(a) List two health problems that may be caused by the prolonged use of
computers.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) List two safety problems that may be caused by the use of computers.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]

ENG. HIBA O. ZAKI 12


IGCSE - 0417 – ICT PAST PAPERS

19.A number of people use methods to defraud online bank customers. Name
and describe
two of these methods.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...

2……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
………………………………………………………………………………...
……………………………………………………………………………..[4]
20.Describe two safety issues, caused by working with computers. For each
safety issue give a method of prevention. Do not use the same method for
both answers.
Safety issue 1
…………………………………………………………………………...........
........…………………………………………………………………………...
……...…………………………………………………………………………
Method of prevention
…………………………………………………………………………...........
......…………………………………………………………………………….

ENG. HIBA O. ZAKI 13


IGCSE - 0417 – ICT PAST PAPERS

…...……………………………………………………………………………
Safety issue 2
…………………………………………………………………………...........
………………………………………………………………………………...
………………………………………………………………………………...
Method of prevention
…………………………………………………………………………...........
.......……………………………………………………………………………
…...…………………………………………………………………………[4]

21.Encrypted data is used in on-line banking. Describe encryption.

…………………………………………………………………………...........…
……………………………………………………………………………...……
…………………………………………………………………………...………
…………………………………………………………………...........................
…………………………………………………………………………………...
………………………………………………………………………………...[3]

22.Describe what is meant by a blog and a wiki.


(a) Blog
…………………………………………………………………………...........
………………………………………………………………………………...
………………………………………………………………………………...
…………………………………………………………………………......[2]
(b) Wiki

ENG. HIBA O. ZAKI 14


IGCSE - 0417 – ICT PAST PAPERS

…………………………………………………………………………...........
………………………………………………………………………………...
………………………………………………………………………………...
…………………………………………………………………………......[2]
23.Explain the difference between phishing and pharming.
…………………………………………………………………………...........
………………………………………………………………………………...
………………………………………………………………………………...
…………………………………………………………………………......[3]

24.The use of computer networks can lead to problems of keeping data secure
and confidential. Two methods of overcoming this are the use of
authentication techniques and data encryption.
(a) Describe two authentication techniques.
1……………………………………………………………………………….
.………………………………………………………………………………..
………………………………………………………………………………...
2……………………………………………………………………………….
.………………………………………………………………………………..
……………………………………………………………………………..[2]
(b) Describe data encryption.
………………………………………………………………………………..
………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...
……………………………………………………………………………..[2]

ENG. HIBA O. ZAKI 15


IGCSE - 0417 – ICT PAST PAPERS

25.Hackers try to defraud online banking customers by pretending to be their


bank. Name and describe two methods by which they do this.
26.………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...
………………………………………………………………………………...
……………………………………………………………………………..[4]

27.Describe how the following health problems can arise due to the use of
computers. Give a different cause for each.
RSI in the wrists
………………………………………………………………………………
………………………………………………………………………………
RSI in the fingers
………………………………………………………………………………
………………………………………………………………………………
Headaches
………………………………………………………………………………
………………………………………………………………………………
Back pain
………………………………………………………………………………
……………………………………………………………………………[4]
28.A bank is looking into a variety of security measures to protect its
customers’ data.
ENG. HIBA O. ZAKI 16
IGCSE - 0417 – ICT PAST PAPERS

Describe three types of authentication technique they could use and for each
give a benefit and a drawback.
Technique 1
………………………………………………………………………………
………………………………………………………………………………
Benefit
………………………………………………………………………………
………………………………………………………………………………
Drawback
………………………………………………………………………………
………………………………………………………………………………

Technique 2
………………………………………………………………………………
………………………………………………………………………………
Benefit
………………………………………………………………………………
………………………………………………………………………………
Drawback
………………………………………………………………………………
………………………………………………………………………………
Technique 3
………………………………………………………………………………
………………………………………………………………………………
Benefit

ENG. HIBA O. ZAKI 17


IGCSE - 0417 – ICT PAST PAPERS

………………………………………………………………………………
……………………………………………………………………………
Drawback
………………………………………………………………………………
…………………………………………………………………………….[9]
29.Describe what a virus is and what effect it may have on the data on a hard
disc.
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………[3]

30.Discuss the benefits and drawbacks of students using the internet to carry
out research.
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………

ENG. HIBA O. ZAKI 18


IGCSE - 0417 – ICT PAST PAPERS

………………………………………………………………………………
……………………………………………………………………………[6]

31.

32.

ENG. HIBA O. ZAKI 19


IGCSE - 0417 – ICT PAST PAPERS

33.

ENG. HIBA O. ZAKI 20

You might also like