You are on page 1of 16

Cambridge IGCSE

FRANKLIN PARRA ARZE

B O 0 0 6

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*7638064276*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term software.

.....................................................................................................................................
software refers to computer programs and applications that instruct a computer

to perform specific tasks, written in a programming language.


.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(b) There are two types of software.

Identify the types.

System software
1...................................................................................................................................

.....................................................................................................................................
Application software
2...................................................................................................................................

.....................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).

CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer

[2]

© UCLES 2020 06_0417_11_2020_1.13


3

3 Every computer contains input and output devices and a central processing unit (CPU).

(a) Describe the CPU including its role.

.....................................................................................................................................
Responsible for executing instructions and performing calculations.

It is called sometimes as a processor. Manages the flow of data between different


.....................................................................................................................................
parts of the computer, and an arithmetic logic unit and communicates with the other
.....................................................................................................................................
components of the computer, such as memory and input/output devices.
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(b) Data can be read directly by using a number of different devices.

Name the most appropriate device used to read the following data.

Cheque No. Branch Code Account No. Transaction Code

RFID reader MICR


..................................................... .....................................................

0 26815 38221 6

Bar code reader


..................................................... Chip reader
.....................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


4

4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.

(a) When a new blood donor wishes to give blood they need to fill in a form.

Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.

Blood group can be A, B, AB or O.

Part of the form is shown below.

Blood donor

1. What is your health number?

2. What is your date of birth? / /

3. What is your gender? M/F

4. What is your blood group?

Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Integer/text
Question 1...................................................................................................................

Question 2...................................................................................................................
Date/time
Boolean logical
Question 3...................................................................................................................

Question 4...................................................................................................................
Text alphanumeric

[4]

© UCLES 2020 06_0417_11_2020_1.13


5

(b) In the Blood_group field the only data that can be entered is A, B, AB or O.

Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.

abnormal normal
Blood group
(✓) (✓)

AB

AO

[2]

(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.

To find the blood donor with the health number 9434765919 he will need to type in the
following query.

Health_number = 9434765919

Write a query to find all the female blood group donors with the blood group A as well as
those with AB.

Gender= F AND Blood_group


.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


6

(d) When the details of a new donor are added to the database the person’s date of birth is
entered.

Explain why the administrator would prefer their date of birth to be stored rather than their
age.

.....................................................................................................................................
The date of birth is precise because it doesn't change throughout the years. And

the age of the donor can be calculated or determined just by the date of birth, so
.....................................................................................................................................
it prevents errors and the data just needs to be put once by the donor instead of
.....................................................................................................................................
returning to the same place and putting he/she their age.
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(e) Name the most appropriate validation check for the Health_number.

.....................................................................................................................................
Length

..................................................................................................................................... [1]

© UCLES 2020 06_0417_11_2020_1.13


7

5 Phishing and pharming can affect the security of a user’s data.

(a) Compare and contrast phishing and pharming.

Both are used in the internet and both redirect a user to a fake website.
.....................................................................................................................................
Emails are usually send in phishing, on the other hand pharming sent a code to
.....................................................................................................................................
the computer. Phishing emails are similar to original emails. A pharming website
.....................................................................................................................................
is unique. Both may look normal but in reality they aren't because both steal users
.....................................................................................................................................
information.
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


8

(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.

Don't click to links or texts from unknown users. Also don't answer questions from those
.....................................................................................................................................
users giving personal information. It is important to report if anything suspicious happens.
.....................................................................................................................................
If there was a sign of congratulations you won this item, don't click it because it
.....................................................................................................................................
tries to steal information.
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.

LAN WAN WLAN


(✓) (✓) (✓)

The internet is an example of this type of network

This type of network is found in a building but is


connected without cables
This type of network is used to transmit data
between Europe and North America
This type of network is found in a building but is
connected with cables

[4]

© UCLES 2020 06_0417_11_2020_1.13


9

7 The headteacher of a school has decided to replace desktop computers with laptop computers.

Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.

Laptops are thinner and easier to carry to everywhere and can do all tasks as a desktop.
............................................................................................................................................
Although they ran out of battery, they get heated faster, they could be damaged by
............................................................................................................................................
external forces.
............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [4]

8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.

(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.

If it is conserved it prevents from money stealing and taking advantage from relatives.
.....................................................................................................................................
Sometimes it reduces the probability of getting harmed from this kind of problems.
.....................................................................................................................................
Although it is difficult to keep personal data as we put our information in different websites.
.....................................................................................................................................
Sometimes they don't read the terms and conditions. It is difficult too because
.....................................................................................................................................
of the global network.
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


10

(b) The sharing of email addresses can lead to spam.

Explain what is meant by the term spam email.

.....................................................................................................................................
It is emails that are considered garbage or unrequested emails from users.

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(c) Explain why spam email should be prevented.

.....................................................................................................................................
It fills the users mail box, it also can slow down the network as well as the disk,

and it could have a virus


.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13


11

9 Point of sale (POS) terminals are used in supermarkets.

(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.

Input Output Both


Device
(✓) (✓) (✓)

Bar code reader

Buzzer

Touch screen on till

Receipt printer

Light sensor on the conveyor belt

Electronic scales

[6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


12

(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.

When an item is scanned at a Point of Sale (POS) terminal, several steps are
.....................................................................................................................................
necessary to update the stock file and potentially order new stock:
.....................................................................................................................................
The POS terminal reads the barcode or other identifier on the item being sold
.....................................................................................................................................
and sends this information to the point-of-sale software.
.....................................................................................................................................
The point-of-sale software checks the stock file to see if there is sufficient stock
available to sell the item. If there is not enough stock, it may alert the salesperson
.....................................................................................................................................
and/or automatically order new stock from the supplier.
.....................................................................................................................................
If there is sufficient stock, the point-of-sale software updates the stock file to
.....................................................................................................................................
reflect the sale. This might involve reducing the quantity of the item sold from the

available stock, updating the value of stock remaining, or both.


.....................................................................................................................................

If new stock needs to be ordered automatically, the point-of-sale software can


.....................................................................................................................................
send a request to the supplier's system or to an automated inventory
.....................................................................................................................................
management system to order more of the item.
.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13


13

10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.

(a) Describe the steps required in the analysis of such a system.

The network manager should identify students, teachers, parents, and administrators.
.....................................................................................................................................
The objectives of the system should be clearly defined, including the purpose of the
.....................................................................................................................................
system, the data to be collected, and the reports to be generated.

Gather requirements: The requirements of the system should be gathered from the
.....................................................................................................................................

administrators. This can be done through interviews, surveys, and focus groups.
.....................................................................................................................................
Analyze the requirements: The requirements should be analyzed to determine their
.....................................................................................................................................
efficiency, cost, and impact on the system.
.....................................................................................................................................
Design the system: Once the requirements are analyzed, the network manager
.....................................................................................................................................
should design the system, including the database schema, user interface, and reports.
.....................................................................................................................................
Develop the system: The system should be developed using appropriate software
.....................................................................................................................................
development methodologies, programming languages, and tools.
.....................................................................................................................................
Test the system: The system should be tested to ensure that it meets the
.....................................................................................................................................
requirements and objectives.
..................................................................................................................................... [6]
Implement the system: Once the system is tested and approved, it should be

implemented in the school.


(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.
Train the users: The users should be trained on how to use the system effectively.
Describe
Maintainthe
theadvantages
system: Theand disadvantages
system should be of using fingerprint
maintained datathat
to ensure entry for student
it continues to
beregistration
up-to-datesystems
with therather than requirements
changing magnetic ID cards.
of the school.

.....................................................................................................................................
Fingerprints are unique, so it is a more accurate entry. As well it improves security.

Although, It may take long to register the fingerprint and the equipment is relatively
.....................................................................................................................................
expensive
.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


14

(c) Fingerprints are one example of biometrics.

Identify three other examples of biometrics.

1...................................................................................................................................
Retina scan

.....................................................................................................................................

2...................................................................................................................................
Facial recognition

.....................................................................................................................................

3...................................................................................................................................
Voice recognition

.....................................................................................................................................

[3]

11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.

List four other principles of a typical data protection act.

1..........................................................................................................................................
It should be secure

............................................................................................................................................
Data users are allowed to access to their own personal information
2..........................................................................................................................................

............................................................................................................................................
Parental consent for the usage of children online services
3..........................................................................................................................................

............................................................................................................................................

4..........................................................................................................................................
Data shouldn't be transferred to another country until they are sure that is is secure
............................................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


15

12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.

Discuss the effectiveness of using these different methods to improve security when paying
for goods.

Contactless payment is one of the most used methods as this is more secure because
............................................................................................................................................
it is encrypted and can be stored on a users device. Although if someone steals the
............................................................................................................................................
card they can use it.
............................................................................................................................................
Magnetic stripe it requires the user to have its credit card and because it has stripes
............................................................................................................................................
it is difficult to copy. Although it can be damaged by overuse.
............................................................................................................................................
Chip and pin is secure as it requires a pin. However the chip contains personal information.
............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [8]

© UCLES 2020 06_0417_11_2020_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_11_2020_1.13

You might also like