You are on page 1of 7

Year 11 IGCSE 0417 –ICT/AO1,AO3- Theory Test paper(April)

Name of the student:_Diyana Agha


Instruction: students to write the answers in blue font in the text box given
Once you finish the paper save your work as PDF and upload the same to Teams Assignmnet

Q1. Complete the following questions using the most appropriate items from the list below.

Click here to enter text.

(a) Identify two output devices from the list. [2]

1 Laser printer

2 Buzzer

(b) Identify two optical storage media from the list.[2]

1 Blu-ray disk

2 DVD RAM

Q2. An examination is marked out of 100 marks and each mark is recorded as an integer in a database.

Tick(✔) whether each of the following is the most appropriate example of abnormal, normal or extreme data.[4]

abnormal normal extreme

0 (✔)

45 (✔)

100 (✔)
Q3.(a) Identify 110 (✔) four components of technical
documentation. [4]
1. Input format
2. Output format
3. Sample routine or sample runs
4. Hardware requirements

(b) Identify two components of user documentation.[2]


1. Input format
2. output format

Q4
(i) Department Type check
(ii) Date_of_birth format check
(iii) Year_left Range check [3]

(b) The systems analyst has set the data type for the contact_phone_number field as text.
Explain why this field has been set for a text data type rather than a numeric data type. [2]
Numeric data would eliminate the 0’s in the beginning of the contact_phone_number. This would alter
the alter the collected data. Since it is a text data type, the data would not be subject to rounding or any
other mathematical calculation, thus no alterations to the data.

Q5
(a) Tick whether the following are examples of System software or Applications software [2]

System Application

A linker system (✔)


A database (✔)
An operating (✔)

An applet (✔)

Q6.

[3]

1. There no need for travelling to attend the meeting


2. The personal would save time without the need for travelling
3. Cost for renting an accommodation or venue for the meeting is cut down

(b) Give three disadvantages of holding a video-conference rather than a face-to-face meeting [3]
1. There can be an issue of timings due to the personal being in different countries. Leading some
people to attend meeting in the middle of the night due to the difference in time zone.
2. A video conference requires a good network connection but if the personal doesn’t have good
internet, they might not be able to access and communicate with the other collegues.
3. It can be expensive to set up as it requires a webcam, good internet connection, microphone
etc.
Q7.

[3]

1. Light sensor
2. Temperature sensor
3. Humidity sensor

Q8.

[6]

First the microprocessor creates and records the starting preset value as what time it was for the
sprinklers to start. After a set the time, the microprocessor records the ending preset value as what time
it was for the sprinklers to end. The microprocessor constantly compares the timings with the preset
value until they match with the starting and ending preset value. Once the same time arrives as the
starting preset value, the sprinklers would turn on and once the same time arrives as the ending preset
value, the sprinklers would turn off. This process is repeated everyday until the microprocessor is
instructed to a different preset value
Q9.

[6]

Strategy 1 Do not share personal information to unknown people you don’t recognize

Reason 1 This information could be used as identity fraud

Strategy 2 Do not communication with stranger you don’t recognize

Reason 2 This can lead to potentially dangerous people to contact you by trying to groom and access
private information like your location and real name.
Strategy 3 Do not post vulnerable picture of yourself or your location online

Reason 3 This can lead to potentially dangerous people to contact you in person and can be in a
dangerous situation to be in.
Q10.
Tick whether the following statements refer to 3D printers, Laser printers or Dot matrix printers [4]

3D printers Laser printers Dot matrix


This printer prints layer by layer (✔)
This printer is an impact printer (✔)
This printer is a form of ink jet printer (✔)
This printer produces high quality output quickly (✔)

Q11.

[4]

ROM RAM HDD


It loses its data when the computer is switched off. (✔)
It is classed as backing storage. (✔)
It stores the start-up instructions of the computer. (✔)
It temporarily stores the current work of the current user. (✔)

Q12.

[3]

(a) This sensor is used to measure how cold it is on the course.


Temperature sensor
(b) This sensor is used to stop the clock when a skier crosses the finish line.
Motion sensor
(c) This sensor is used to measure the altitude (height above sea level) at the top of the course.
Pressure sensor

Q13

[4]
Analysis Design Evaluation
Identifying the problems with the current system (✔)
Deciding on testing strategies (✔)
Observation of workers using the current system (✔)
Comparing the solution with the original task (✔)

Q14.

[5]

1. There is a missing bracket after #7g7d76. So add a ‘ } ‘ after #7g7d76


2. In h1 the text-weight should instead be written as ‘font-weight’.
3. In h1, there is a missing ‘;’ after 42px so semi colon should be added after 42px
4. In h2, the word ‘underlined’ should instead be written as ‘underline’
5. The format of the hexadecimal colour in body is incorrect as there should not be a ‘g’ in the
colour code format
Q15
Define the following internet terms.

HTTPS

It’s full form is Hypertext Transfer Protocol Secure in which the data is a particular website that contains
this https is all encrypted
URL Its full form is Unifrom Resource Locator. This is the address of a page in a website

[4]

Q16
A new employee of a company is required to log on to the company’s computer system and will
need to create a suitable password.
(a) Give three rules that the company would have in place, to help the employee choose a
password.

1. The password should not include personal information


2. It should not contain your birthday date
3. Do not repeat a password that you already have created in the past

[3]

(b) He changes his password to R4hB5&Fg1


Explain why he has chosen this password.
It contains a range of characters like numbers and uppercase and lower case letters. The password has
no pattern to hard to guess and most importantly follows the rules of the comanny [3]

(c) When a password is changed it is verified.


Identify the type of verification which is carried out.
Double data entry.[1]

Q17
A variety of network devices can be used to connect computers together.
(a) Complete the following sentences using the most appropriate network device from the list.

Your answers must be different in each case.


an access point a bridge a hub
a modem a network interface card a switch

A device used to connect a Local Area Network (LAN) to another LAN that uses the same
protocol is called . a bridge
A device used to convert a computer’s digital signal to an analogue signal for communication
is called a modem

A device that connects a number of other devices and sends data to one specific device only
is a switch

An item of hardware in a computer that allows a device to connect to a network is a network interface card
[4]

A router is used to connect a LAN to the internet. A message is sent from the router to another
router.
(b) Give the name of the part of the router where the IP addresses are stored.
Routing table [1]
End of question

You might also like