You are on page 1of 477

2013-2017

Past Papers & Mark Schemes


COMPILED BY: M. MUSHTAQ HUSSAIN

03215275281
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education
*9118532402*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 May/June 2013
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 14 printed pages and 2 blank pages.

IB13 06_0417_12/5RP
© UCLES 2013 [Turn over
2

1 Name the input devices A, B, C and D using the words from the list. For
Examiner's
A B Use

5
1 2 3 10
4 5 6 20
40
7 8 9 60
TOTAL 80
ENTER
100

C D

keyboard microphone remote control scanner

sensor touch pad touch screen video camera

A B

C D
[4]

2 Ring two output devices.

buzzer DVD R joystick

magnetic tape plotter touch pad

[2]

© UCLES 2013 0417/12/M/J/13


3

3 Tick True or False next to each of these statements. For


Examiner's
Use
True False

A numeric keypad is used to type a letter.

Word processing software is used to monitor physical variables.

A laser printer works best in an industrial environment.

A palmtop computer is easier to carry than a laptop computer.

Sensors are used to input data to a microprocessor.

[5]

4 Tick four devices which are used to connect networks together.

Hub

Printer

Bridge

Router

Scanner

Passwords

Monitor

Switch

[4]

5 Microprocessors are used in different applications to control the process or to simply gather
data (measurement only).

Tick which of the following applications are examples of control or of measurement only.

Measurement
Control
only

Automatic cookers

Weather stations

Microwave ovens

Automatic washing machines

[4]

© UCLES 2013 0417/12/M/J/13 [Turn over


4

6 A floor turtle can use the following instructions: For


Examiner's
Use
INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

Finish
70 mm 50 mm

40 mm
NOT TO
SCALE
Start
60°
80 mm

Using only the following commands, complete the set of instructions to draw this shape by
filling in the blank lines.

PENDOWN

FORWARD 40 REPEAT

RIGHT 90 80

FORWARD 60

FORWARD

[8]

© UCLES 2013 0417/12/M/J/13


5

7 Use the most appropriate phrase from the list below to complete each sentence. For
Examiner's
Use

store data in real time applications

store high definition films

store backups of file servers

store music for sale

store photographs in a digital camera

(i) A CD ROM is used to

(ii) A blu-ray disc is used to

(iii) A magnetic tape is used to

(iv) A flash memory card is used to

[4]

8 Describe four features of ROM.

[4]

© UCLES 2013 0417/12/M/J/13 [Turn over


6

9 Robots are now used on many car production lines. For


Examiner's
Use
Describe three advantages of this to a car company.

[3]

10 (a) Car mechanics often use expert systems to help them to diagnose faults with car
engines.

Tick four components of a typical expert system.

Graph plotter

Inference engine

Interactive input screen

Knowledge base

Rules base

Scanner

Spreadsheet

Web cam

[4]

(b) Name two other applications which involve the use of expert systems.

[2]

© UCLES 2013 0417/12/M/J/13


7

11 Give three advantages of using a graphical user interface (GUI) rather than a command For
line interface (CLI). Examiner's
Use

[3]

© UCLES 2013 0417/12/M/J/13 [Turn over


8

12 A company wishes to replace its current system with a new computerised system. It has For
employed a systems analyst to investigate the current system. Examiner's
Use

(a) Describe three methods the systems analyst could use to research the current system.

[3]

When large volumes of data are input to a new system it is usual to carry out verification
and validation on this data.

(b) Name and describe two methods of verification which could be used.

Name

Description

Name

Description

[4]

(c) Explain why it is necessary to carry out validation even though the data has been
verified.

[3]

© UCLES 2013 0417/12/M/J/13


9

13 A bank is looking into a variety of security measures to protect its customers’ data. It is For
worried that hackers may gain access and cause viruses to infect the system. Examiner's
Use

(a) Explain what is meant by a virus and what it does.

[3]

(b) Describe three ways in which a bank customer could protect their computer from
becoming infected.

Way 1

Way 2

Way 3

[3]

© UCLES 2013 0417/12/M/J/13 [Turn over


10

14 The manager of a travel company asked her secretary to look into the reliability of trains in For
Birmingham. The secretary obtained the details of some of the trains. He created two Examiner's
Use
spreadsheets to help him do this.

Sheet 1 is a list of some of the UK stations that trains from Birmingham go to. Sheet 2
consists of the train details he looked at.

A B
1 Code Station
2 E Edinburgh
3 LB Longbridge
4 B Bournemouth
5 LI Lichfield
6 S Shrewsbury
7 W Wolverhampton
8 LO London
9 P Plymouth

Sheet 1

(Commas are used as delimiters in the functions shown below.)

A B C D
1 Arrival Station Code Number
2 =VLOOKUP(B2,Sheet1!$A$2:$B$9,2) E =COUNTIF($C$9:$C$18,B2)
3 =VLOOKUP(B3,Sheet1!$A$2:$B$9,2) LO =COUNTIF($C$9:$C$18,B3)
4 =VLOOKUP(B4,Sheet1!$A$2:$B$9,2) S =COUNTIF($C$9:$C$18,B4)
5 =VLOOKUP(B5,Sheet1!$A$2:$B$9,2) LI =COUNTIF($C$9:$C$18,B5)
6 =VLOOKUP(B6,Sheet1!$A$2:$B$9,2) W =COUNTIF($C$9:$C$18,B6)
7
8 Arrival time Minutes late Arrival code Late Y/N
9 11:03 0 E =IF(B9>0,"Y","N")
10 11:05 4 LO =IF(B10>0,"Y","N")
11 11:07 -4 W =IF(B11>0,"Y","N")
12 11:10 13 LO =IF(B12>0,"Y","N")
13 11:12 6 S =IF(B13>0,"Y","N")
14 11:14 -2 LI =IF(B14>0,"Y","N")
15 11:16 0 W =IF(B15>0,"Y","N")
16 11:19 -3 LO =IF(B16>0,"Y","N")
17 11:22 0 LI =IF(B17>0,"Y","N")
18 11:25 6 E =IF(B18>0,"Y","N")

Sheet 2

© UCLES 2013 0417/12/M/J/13


11

(a) Explain what the function in cell A2 in Sheet 2 does. For


Examiner's
Use

[3]

(b) What station would you expect to see in cell A3 in Sheet 2?

[1]

(c) Explain what the function in cell C2 in Sheet 2 does.

[3]

(d) What value would you expect to see in cell C4 in Sheet 2?

[1]

(e) Explain what the function in cell D9 in Sheet 2 does.

[3]

(f) What value would you expect to see in cell D11 in Sheet 2?

[1]

© UCLES 2013 0417/12/M/J/13 [Turn over


12

15 Chi has employed Sarbjit, a systems analyst, to create a new database system for his For
mobile telephone (cellphone) business. Examiner's
Use

• He keeps a number of different models in stock.


• Most of the phones have a camera but some do not.
• The rental plans have 100, 200 or 500 free texts depending on the amount the
customer pays per month.
• The minimum monthly payment is $10 and the maximum is $100.

(a) Complete the data dictionary below filling in the field names and the most appropriate
data types to create a database using only the above information.

Field name Data type

Model

Monthly payment
[6]

(b) Name and describe three different validation checks that could be used on the data in
this database.

[6]

© UCLES 2013 0417/12/M/J/13


13

16 A small business wishes to set up a Local Area Network (LAN). The manager is not sure For
whether to use cables to connect the computers or use wireless technology. Examiner's
Use

Give three disadvantages of using wireless technology.

[3]

17 Describe four differences between an intranet and the Internet.

[4]

© UCLES 2013 0417/12/M/J/13 [Turn over


14

18 A supermarket has a number of EFTPOS terminals. For


Examiner's
Use
Explain what is meant by EFTPOS and how such a system works.

[6]

© UCLES 2013 0417/12/M/J/13


15

BLANK PAGE

© UCLES 2013 0417/12/M/J/13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2013 0417/12/M/J/13


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the May/June 2013 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2013 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

1 A touch screen [1]


B scanner [1]
C video camera [1]
D sensor [1]

2
buzzer DVD R joystick [1]

magnetic tape plotter touch pad [1]

3
True False

A numeric keypad is used to type a letter 

Word processing software is used to monitor physical variables 

A laser printer works best in an industrial environment 

A palmtop computer is easier to carry than a laptop computer 

Sensors are used to input data to a microprocessor 


[5]

4


Hub 

Printer

Bridge 

Router 

Scanner

Passwords

Monitor

Switch 
[4]

© Cambridge International Examinations 2013


Page 3 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

5
Measurement
Control
only

Automatic cookers 

Weather stations 

Microwave ovens 

Automatic washing machines 

[4]

6
PEN DOWN PENDOWN

FORWARD 40 REPEAT 6

RIGHT 90 FORWARD 80

FORWARD 70 RIGHT 60

PENUP END REPEAT

FORWARD 50
1 mark for each correct statement
[8]

7 (i) A CD ROM is used to store music for sale

(ii) A blu-ray disc is used to store high definition films

(iii) A magnetic tape is used to store backups of file servers

(iv) A flash memory card is used to store photographs in a digital camera [4]

8 Four from:

Read only memory


Can be read from but not written to/can’t be changed/edited
Used to store BIOS/start up programs for computer
Used to store software that must not change e.g. games
Non-volatile/permanent (memory) [4]

© Cambridge International Examinations 2013


Page 4 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

9 Three from:

Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously [3]

10 (a)


Graph plotter

Inference engine 

Interactive input screen 

Knowledge base 

Rules base 

Scanner

Spreadsheet

Web cam
[4]

(b) Two from:

Medical diagnosis
Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [2]

11 Three from

Don’t have to type in commands/just use mouse to select options


Easier to change/edit action
Don’t have to learn/be familiar with a lot of commands
Easier to open/load programs [3]

© Cambridge International Examinations 2013


Page 5 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

12 (a) Three from:

Observing the users using the current system


Questionnaires are distributed to users asking questions about the current system
Interviewing the users about the current system
Examining documents from the current system [3]

(b) Visual verification/checking [1]


Read through data on screen and compare with source document [1]

Double data entry [1]


One from:

Data is typed in twice by one typist


Data is typed in by two operators
Computer compares versions [1]

(c) Three from:

Source document may contain errors


Verification only checks that data is copied correctly
Verification does not check if data is reasonable/sensible
A correct explanation of an example of one validation check [3]

13 (a) Three from:

A piece of programming code/software/program/script


It replicates itself
Attaches itself to files
Corrupts/deletes files/data
Can corrupt or erase the contents of the hard disk
Can completely fill the hard disk/memory making it unusable/slows down operations
Makes software/operating system unusable
One mark is available for an accurate description of method of transmission [3]

(b) Three from:

Regularly update antivirus/use/install antivirus


Only use storage media from known sources
Only accept software/download software from known/trusted websites
Only visit trusted websites
Only open attachments from known sources/people you know [3]

© Cambridge International Examinations 2013


Page 6 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

14 (a) Three from:

Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’E’/the contents of B2 (in Sheet 2)

Or
It reads the contents of B2 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1

until it finds the first matching value


It records the corresponding value from column 2 of the range A2:B9 in Sheet 1
B2 (in Sheet 2) contains E
Produces /records Edinburgh [3]

(b) London [1]

(c) Three from:

It looks through (the contents of) C9 to C18….


… to see if they contain the code E/contents of B2
Counts all the cells where there is a match
Cell B2 contains the code E
Produces/records the answer 2 [3]

(d) 1 [1]

(e) Three from:

It reads the contents of B9 (0) and checks if it is greater than 0…


…if it is it records Y
If it is not greater than 0 it records N
In this case it produces/records N [3]

(f) N [1]

© Cambridge International Examinations 2013


Page 7 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

15 (a)

Field name Data type

Model Text [1]

Camera Boolean [1], [1]

Free texts Integer [1], [1]

Monthly payment Currency [1]

(b) Three matched pairs from:

Range check on Monthly payment


No less than $10, no more than $100

(Invalid) character/type check on ‘Free texts’ field


Only digits allowed

Presence check on any field


To make sure data has been entered in that field

Consistency check on Monthly payment field and Free texts field


To make sure that number of free texts corresponds to the monthly payment [6]

16 Three from:

Limited area of network


Strength of signal is weaker
Easier to hack into/less secure
Physical obstacles can interfere with signal/can cause disconnection [3]

17 Four from:

Internet is network of networks/intranet doesn’t have to be a network of networks


Internet is global
Intranet is within one organisation
Intranet is private/Internet is public
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more reliable/relevant than that found on the Internet
Internet has more information than an intranet [4]

© Cambridge International Examinations 2013


Page 8 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12

18 Six from:

Electronic Funds Transfer at Point of Sale


Enables payment for goods at a checkout using credit/debit cards
Goods are purchased and bill is calculated
Customer inserts card into chip reader
Card is checked for validity/reported stolen
PIN is entered
PIN is compared with that stored on the chip
If PIN is OK/verified transaction is authorised
If not, customer is asked to re-enter PIN
Supermarket computer contacts customer’s bank
Checks if sufficient funds
If sufficient funds, transaction is completed/if not, transaction is rejected
Amount deducted from customer’s bank account
Amount credited to supermarket’s bank account
The supermarket EFTPOS terminal produces a receipt [6]

© Cambridge International Examinations 2013


UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education
*9328073356*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 May/June 2013
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 13 printed pages and 3 blank pages.

IB13 06_0417_13/3RP
© UCLES 2013 [Turn over
2

1 Name the devices A, B, C and D using the words from the list. For
Examiner's
A B Use

C D

CRT Monitor desktop computer laptop computer mainframe computer

microphone multimedia projector personal digital assistant printer

A B

C D
[4]

2 Ring two items which are used to store data.

buzzer DVD R fixed hard disc

joystick plotter touch pad

[2]

© UCLES 2013 0417/13/M/J/13


3

3 Tick True or False next to each of these statements. For


Examiner's
Use
True False

Database software is the best software to use to write letters.

DTP software is used to create models.

Palmtop computers are bigger than PCs.

Graph plotters are used to output car designs.

A dot matrix printer is used to print magazines.

[5]

4 An examination mark is recorded as an integer in a database. The marks are between 0


and 100.

Name and describe two validation checks which would be used to check the marks as they
are entered.

[4]

5 Tick whether the following statements apply to RAM or apply to ROM.

RAM ROM

This memory can only be read from not written to.

This memory is not volatile.

This memory is used to store the data the user is currently working on.

This memory is used to store the startup instructions of a computer.

[4]

© UCLES 2013 0417/13/M/J/13 [Turn over


4

6 Draw four lines on the diagram to match the use to its most appropriate input device. For
Examiner's
Use

Use Input device

To input details from a bank card Joystick

To input data from a school register Chip reader

To input details of a product in a supermarket Optical mark reader

To control an object in a computer game Bar code reader

[4]

7 A student wishes to use a floor turtle to draw this shape which has no two lines the same
length:

Name four different instructions which the turtle graphics software could use in order to
draw the shape. For each one explain the meaning of the instruction.

Instruction 1

Meaning

Instruction 2

Meaning

Instruction 3

Meaning

Instruction 4

Meaning

[8]

© UCLES 2013 0417/13/M/J/13


5

8 Explain what is meant by OCR and give one example of its use. For
Examiner's
Use

[3]

9 A head teacher has decided that the school magazine will now be included in the school’s
website.

(a) Tick three features of a website which would not be found in a magazine printed on
paper.

Hyperlinks

Colour

Large font size

Photos

Sound

Video

[3]

(b) Give three other reasons why the head teacher thinks it is a good idea to replace the
paper version with a website version.

[3]

© UCLES 2013 0417/13/M/J/13 [Turn over


6

10 Describe what is meant by a blog. For


Examiner's
Use

[4]

11 Car mechanics often use an expert system to help them with their work in diagnosing car
engine faults.

Describe how this system would work.

[5]

© UCLES 2013 0417/13/M/J/13


7

12 A house has a microprocessor controlled central heating system. For


Examiner's
Use
(a) Describe the use of the following input devices in such a system.

Keypad

Sensor

[2]

(b) Describe how the microprocessor would use the data from these devices to control the
system.

[4]

© UCLES 2013 0417/13/M/J/13 [Turn over


8

13 Davina has asked Boris, a systems analyst, to create a new database system for her zoo. For
She keeps animals of all types. Here are some of the questions that visitors to the zoo ask: Examiner's
Use

What is the name of the female lion you have?


How heavy is Jumbo the elephant?
How much does it cost to adopt a tiger?

(a) Complete the data dictionary below filling in the field names and most appropriate
data type to create a database which would answer these questions.

Field name Data type

Name Text

Species

Weight (kg)

Currency

[5]

(b) Boris will provide two types of documentation when the system is implemented.

Name each type of documentation and for each one give two items which would be
included.

Name

Item 1

Item 2

Name

Item 1

Item 2

[6]

© UCLES 2013 0417/13/M/J/13


9

14 Mobile phones (cellphones) are used for accessing the Internet. For
Examiner's
Use
Give two advantages and two disadvantages of using a mobile phone rather than using a
desktop computer to access the Internet.

Advantage 1

Advantage 2

Disadvantage 1

Disadvantage 2

[4]

© UCLES 2013 0417/13/M/J/13 [Turn over


10

15 A Sports Science student had to analyse the performance of athletes prior to the 2012 For
Olympic Games. He created a spreadsheet to do this. Below is his analysis of the javelin Examiner's
Use
event. It is split into two sheets. Sheet 1 contains the Code for each nationality. Sheet 2
contains a list of athletes and the results they achieved in a pre-Olympic event.

A B
1 Code Country
2 AUS Australia
3 FRA France
4 GHA Ghana
5 RUS Russia
6 THA Thailand
7 TUN Tunisia
8 TUR Turkey
9 USA America
10

Sheet 1

(Commas are used as delimiters in the functions shown below.)

Because athletes sometimes miss a throw or throw outside the area, this is recorded in the
spreadsheet as a no throw using the letters NT.

A B C D E F G H
1 Country Athlete Code Throw Throw Throw Total Number
2 1 2 3 thrown of throws
3 =LOOKUP(C3,Sheet1!$A$2:$B$9) Chevonne Baines USA 85.02 73.29 76.9 =SUM(D3:F3) =COUNTIF(D3:F3,”<>NT”)
4 =LOOKUP(C4,Sheet1!$A$2:$B$9) Mary Bempe GHA NT 66.64 70.61 =SUM(D4:F4) =COUNTIF(D4:F4,”<>NT”)
5 =LOOKUP(C5,Sheet1!$A$2:$B$9) Rhiannon Jones USA 81.22 68.4 71.18 =SUM(D5:F5) =COUNTIF(D5:F5,”<>NT”)
6 =LOOKUP(C6,Sheet1!$A$2:$B$9) Abhasra Boonme THA 83.04 76.43 60.35 =SUM(D6:F6) =COUNTIF(D6:F6,”<>NT”)
7 =LOOKUP(C7,Sheet1!$A$2:$B$9) Jean Claude Devandre FRA 68.04 45.98 62.62 =SUM(D7:F7) =COUNTIF(D7:F7,”<>NT”)
8 =LOOKUP(C8,Sheet1!$A$2:$B$9) Brett Lewis AUS 79.98 68.78 NT =SUM(D8:F8) =COUNTIF(D8:F8,”<>NT”)
9 =LOOKUP(C9,Sheet1!$A$2:$B$9) Vera Stepanov RUS 70.42 49.88 90.18 =SUM(D9:F9) =COUNTIF(D9:F9,”<>NT”)
10 =LOOKUP(C10,Sheet1!$A$2:$B$9) Murat Mehmet TUR 49.81 67.51 53.66 =SUM(D10:F10) =COUNTIF(D10:F10,”<>NT”)
11 =LOOKUP(C11,Sheet1!$A$2:$B$9) Joan Lewington USA 88.85 NT 69.44 =SUM(D11:F11) =COUNTIF(D11:F11,”<>NT”)
12 =LOOKUP(C12,Sheet1!$A$2:$B$9) Youssef Ibrahim TUN 93.39 63.1 47.14 =SUM(D12:F12) =COUNTIF(D12:F12,”<>NT”)
13 =LOOKUP(C13,Sheet1!$A$2:$B$9) Laura Bennett AUS 55.97 49.45 70.07 =SUM(D13:F13) =COUNTIF(D13:F13,”<>NT”)

Sheet 2

(a) Explain what the function in cell A3 does.

[3]

© UCLES 2013 0417/13/M/J/13


11

(b) What value would you expect to see in cell A6? For
Examiner's
Use
[1]

(c) Explain what the function in cell G3 does.

[2]

(d) Explain what the function in cell H4 does.

[3]

(e) What value would you expect to see in cell H6?

[1]

(f) Spreadsheets are often used to produce computer models. There are however, other
forms of models such as simulations.

Explain, using air pilot training as an example, what is meant by simulation.

[3]

© UCLES 2013 0417/13/M/J/13 [Turn over


12

16 School networks often contain a router and a proxy server. For


Examiner's
Use
(a) Describe the role of a proxy server in such a network.

[3]

(b) Explain the purpose of a router.

[3]

17 (a) Explain what is meant by software copyright.

[2]

(b) Explain how software manufacturers attempt to prevent copyright being broken.

[2]

© UCLES 2013 0417/13/M/J/13


13

18 Robots are now used on many car production lines. For


Examiner's
Use
Discuss the benefits and drawbacks to the car company of using robots.

[7]

© UCLES 2013 0417/13/M/J/13


14

BLANK PAGE

© UCLES 2013 0417/13/M/J/13


15

BLANK PAGE

© UCLES 2013 0417/13/M/J/13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2013 0417/13/M/J/13


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the May/June 2013 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2013 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

1 A mainframe computer [1]


B laptop computer [1]
C personal digital assistant [1]
D desktop computer [1]

2 buzzer DVD R fixed hard disc [1]

joystick plotter touch pad [1]

3
True False

Database software is the best software to use to write letters. 

DTP software is used to create models. 

Palmtop computers are bigger than PCs. 

Graph plotters are used to output car designs. 

A dot matrix printer is used to print magazines. 


[5]

4 Two matched pairs from:

Range check
Check no less than 0 and no more than 100

(Invalid) character check/Type check


Must be digits only

Presence check
Mark must be entered [4]

5
RAM ROM

This memory can only be read from not written to 

This memory is not volatile 

This memory is used to store the data the user is currently working on 

This memory is used to store the startup instructions of a computer 


[4]

© Cambridge International Examinations 2013


Page 3 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

6 To input details from a bank card Joystick

To input data from a school register Chip reader

To input details of a product in a supermarket Optical mark reader

To control an object in a computer game Bar code reader


[4]

7 Four matched pairs from:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

1 for instruction
1 for meaning [8]

8 Two from:

Optical Character Recognition/Reader


Text is read by scanner
Image compared with characters stored in computer
Converted to text for use with other software [2]

Utility bills/word processors/ANPR/identity cards [1]

9 (a)


Hyperlinks 

Colour

Large font size

Photos

Sound 

Video 
[3]

© Cambridge International Examinations 2013


Page 4 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

(b) Three from:

Saves school cost of printing copies


Can include colour at no extra cost
Can include animated text effects
Saves cost of delivery
Audience not limited to parents of school children [3]

10 Four from:

Weblog
Usually one author
Personal opinions on a number of topics/personal thoughts
Can be an electronic diary
Others can comment
Only author can edit entries [4]

11 Five from:

Data is read by sensors/downloaded from onboard computer/entered using keyboard/touch


screen/answers to questions are typed in
Uses interactive interface/Asks questions...
........based on previous responses
Expert system analyses data
Inference engine compares data
Compares data with that held in the knowledge base.......
........ using rules base
Matches are found
System suggests possible faults/solutions [5]

12 (a) Two from

Keypad to input required temperature


Sensor to input current temperature of the room [2]

(b) Four from:

Microprocessor stores required temperature as preset value


Compares temperature from sensor to pre-set temperature
If temperature is lower than preset value microprocessor sends a signal to turn heater on
If higher than preset value microprocessor sends a signal (to the actuator) to turn heater off
If values are equal microprocessor does nothing
Wait set period of time before looping [4]

© Cambridge International Examinations 2013


Page 5 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

13 (a)
Field name Data type

Name Text

Gender Boolean [1, 1]

Species Text [1]

Weight (kg) Numeric [1]

Adoption cost Currency [1]

(b) Technical [1]

Two from:

Program listing
Programming language
Flowchart/algorithm
List of variables
File structure
Purpose of the system/program
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Known bugs/possible errors
Validation rules
Limitations of the system [2]

User [1]

Two from:

How to load software/install/run software


How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system/program (only if not mentioned in technical documentation)
Input format or example (only if not mentioned in technical documentation)
Output format or example (only if not mentioned in technical documentation)
Hardware requirements (only if not mentioned in technical documentation)
Software requirements (only if not mentioned in technical documentation)
Sample runs (only if not mentioned in technical documentation)
Error messages (only if not mentioned in technical documentation)
Error handling
Limitations of the system
Tutorials
Troubleshooting guide/Contact details/help line/FAQ [2]

© Cambridge International Examinations 2013


Page 6 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

14 Two advantages from:

Easy to carry/are portable


Usually have mobile phone in your possession
Can access Internet almost anywhere
Can access Internet on the move [2]

Two disadvantages from:

Easily lost
May have poorer signal
Display is smaller/keyboard is smaller
Content is more limited
Can be slower to access Internet
Batteries might run out
No mouse so can be more difficult to navigate [2]

15 (a) Three from:

Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’USA’/the contents of C3 (in Sheet 2)

Or
It reads the contents of C3 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1

until it finds the first matching value


It records the corresponding value from column 2 of the range A2:B9 in Sheet 1
C3 (in Sheet 2) contains USA
Produces /records America [3]

(b) Thailand [1]

(c) Two from:

It totals the contents


Of cells D3 to F3 [2]

(d) Three from:

It looks through the contents of D4 to F4…


…to see if they are not equal to NT
It counts the number of cells that are not
Produces/records 2 [3]

(e) 3 [1]

© Cambridge International Examinations 2013


Page 7 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

(f) Three from:

Creating a model of a real system (such as a cockpit)…


…in order to study the behaviour of the system/pilot reactions
Is able to predict/react to the behaviour of the system or pilot
The cockpit simulation has all the controls normally found in an actual cockpit
Creating models of situations that pilots might meet in real life/Creates whatif scenarios [3]

16 (a) Three from:

Can act as a web server


Can act as a buffer (between Internet and LAN)
Server passes on requests to the Internet
Passes the requested web pages to individual computers
Can cache/store the webpages
Subsequent requests for that/those web page(s) are responded to more quickly
Can be used to monitor Internet usage
Can block certain sites [3]

(b) Three from:

Connects a LAN to a WAN


Connects a LAN to the Internet
Forward data packets to the individual computers on a network
Hold the addresses of each computer on the network [3]

17 (a) Two from:

Lawful protection....
......given to authors/software companies and publishers
Relates to the software the author/publisher/company created/published
Prohibits purchaser from making unlimited copies/lend it to others/change the software/sell it
without the company’s permission [2]

(b) Two from:

Encryption of the execution code requires a key to run


Use of a dongle
Registration system requiring the typing in of a registration code
“Guards” are hardware or software modules that monitor the running program and
ensure that it has not been tampered with in any way
Activation code which can be used only on a limited number of machines [2]

© Cambridge International Examinations 2013


Page 8 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13

18 Seven from:

Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously
Robots have to be reprogrammed when there is a small change/can’t think for themselves
Robots need programming in order to be adaptable
Expensive start up costs – redundancy payments
Expensive start up costs – have to spend money on training workers to use robots
Expensive start up costs – buying of robots/programming of robots
Computer crash would halt production
Maintenance/repair costs can be expensive [7]

© Cambridge International Examinations 2013


UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education
*3032619274*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 October/November 2013
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 14 printed pages and 2 blank pages.

IB13 11_0417_12/3RP
© UCLES 2013 [Turn over
2

1 Name the storage media A, B, C and D using words from the list. For
Examiner's
A B Use

C D

blu-ray disc chip flash memory card hard disc

magnetic stripe magnetic tape pen drive touch pad

A B

C D
[4]

2 Ring two items which are output devices.

disc drive laser printer light pen

microphone TFT monitor web cam

[2]

© UCLES 2013 0417/12/O/N/13


3

3 Tick hardware or software next to each item as appropriate. For


Examiner's
Use
hardware software

virus checker

keyboard

chip

mobile phone

[4]

4 Complete the following sentences using the most appropriate device from this list.

A graphics tablet A dot matrix printer An inkjet printer

A joystick A keypad A multimedia projector

(a) is used to print high quality photographs.

(b) is used to input freehand drawings.

(c) is used to input preset values into control systems.

(d) is used to show slides.

(e) is used to control a flight simulator.

[5]

© UCLES 2013 0417/12/O/N/13 [Turn over


4

5 Name and describe three ICT methods which could be used to help prevent illegal access For
to computer networks. Examiner's
Use

[6]

6 Describe three features of a social network site.

[3]

© UCLES 2013 0417/12/O/N/13


5

7 A floor turtle can use the following instructions: For


Examiner's
Use
INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

Finish
60 70 30

30
NOT TO
80 SCALE

60°

Start

Complete the set of instructions to draw this shape by filling in the blank lines provided. Do
not use additional lines.

PENDOWN FORWARD 70

FORWARD 80

[8]

© UCLES 2013 0417/12/O/N/13 [Turn over


6

8 There is a public library in New York. The librarian uses a computer to keep records of For
borrowers as well as records of the books in the library. Examiner's
Use

(a) The borrower file is stored on a hard disc.

State the type of access needed to retrieve a single record quickly.

[1]

(b) When a borrower comes in for a book they show their membership card.

Give a method of data input which could be used instead of typing in the borrower’s
membership number.

[1]

(c) Give two reasons why your method in (b) is better than typing in the membership
number.

[2]

(d) Describe how the librarian could create a relational database using the data already
held in the borrower file and the book file.

[3]

© UCLES 2013 0417/12/O/N/13


7

9 Describe, including the uses of the hardware and software, what is meant by video For
conferencing. Examiner's
Use

[5]

10 There are many safety issues associated with the use of computers.

Tick three of these issues.

Back ache from bad posture

Electrocution from touching bare wires

Fire from overloading electric sockets

Headaches from staring at the screen continuously

Injury caused by tripping over trailing wires

RSI in the fingers


[3]

© UCLES 2013 0417/12/O/N/13 [Turn over


8

11 A greenhouse is controlled by a computer. For


Examiner's
Use
(a) Other than a temperature sensor name two sensors used in the greenhouse.

2 [2]

(b) Explain why computers are unable to read the data directly from these sensors.

[2]

(c) Describe what is meant by a pre-set value and how it is used by the computer to help it
control the temperature of the greenhouse.

[4]

© UCLES 2013 0417/12/O/N/13


9

12 A store uses EFTPOS terminals at all of its checkouts. For


Examiner's
Use
(a) Identify two input devices which would be used at each EFTPOS.

2 [2]

(b) Describe the computer processing which takes place in order to determine if a product
needs re-ordering.

[4]

© UCLES 2013 0417/12/O/N/13 [Turn over


10

13 Abdul owns a large factory. He has asked Imran, a systems analyst, to create a new For
database system for keeping records of his workers and their pay. Examiner's
Use

(a) Imran will collect information about the existing system.

Identify three methods he would use to do this.

3 [3]

After collecting information, Imran found that each worker has an ID which consists of one
letter followed by five digits. He also found that no worker earns more than $500.

He wrote down two of the questions that Abdul might ask when using the database, such
as:

What is the phone number of the worker whose ID is L67123?


How much does Sunil Kapoor earn?

(b) Complete the data dictionary table below giving the field names which would be used in
the database in order to answer these questions. State the data types which would be
used for each field.

Field name Data type

First_name

Text

Phone_number

Worker_ID

[6]

© UCLES 2013 0417/12/O/N/13


11

(c) Identify three items of test data which could be used to test the Worker_ID field, giving For
a reason for each choice. Examiner's
Use

Item 1

Reason

Item 2

Reason

Item 3

Reason

[6]

© UCLES 2013 0417/12/O/N/13 [Turn over


12

14 Joanne runs a large company. Her computer network has a large capacity server. She is For
investigating ways of backing up the data on the server. Examiner's
Use

(a) Describe what is meant by a backup.

[2]

(b) Joanne has to choose between using magnetic disc or magnetic tapes to make her
backups.

Discuss the advantages and disadvantages of using each of these media.

[6]

© UCLES 2013 0417/12/O/N/13


13

15 Explain the differences between phishing and pharming. For


Examiner's
Use

[4]

16 A company decides to introduce robots to the production line to manufacture cars.

Discuss the advantages and disadvantages to the workers of introducing robots rather than
using humans to manufacture cars.

[5]

© UCLES 2013 0417/12/O/N/13 [Turn over


14

17 Describe some of the benefits and drawbacks of students using the Internet to do research For
for homework. Examiner's
Use

[7]

© UCLES 2013 0417/12/O/N/13


15

BLANK PAGE

© UCLES 2013 0417/12/O/N/13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2013 0417/12/O/N/13


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the October/November 2013 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

1 A magnetic tape B flash memory card


C blu-ray disc D hard disc [4]

2 disc drive laser printer light pen [1]

Microphone TFT monitor web cam [1]

hardware software

virus checker  [1]

keyboard  [1]

chip  [1]

mobile phone  [1]

4 An inkjet printer is used to print high quality photographs [1]

A graphics tablet is used to input freehand drawings [1]

A keypad is used to input preset values into control systems [1]

A multimedia projector is used to show slides [1]

A joystick is used to control a flight simulator [1]

© Cambridge International Examinations 2013


Page 3 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

5 Three matched pairs from:

User ID and one of password/PIN/Memorable data

Password/PIN/Memorable data has to be entered before access is gained/Password/PIN can be


changed frequently to avoid hackers guessing them/Unsuccessful logins can throw you out of the
system

Magnetic stripe/smart card/electronic key/bar code system/ID card

Has to be read before access is gained/Prevents people without cards accessing system

Biometric data

Fingerprint/retina/iris/face/voice recognition used as input/Biometric data is difficult to replicate/is


used because it is unique/compared with those stored on the system

Firewall

Only allows known computers to access network/prevents unknown computers accessing


network [6]

6 Three from:

Allows users to keep in contact/communication/connect with friends


Allows user to send messages to more than one friend/to people overseas
Can search for people who you’ve fallen out of touch with/people with similar interests
Can arrange meetings/events/visits to cinemas/theatre with whole group
Can show photographs to whole group/share photographs/music/videos
Can create and share personal profile
You can follow actions/thoughts of others
Can write comments on other’s posts
Can have privacy controls
Can lead to cyber bullying [3]

7 PEN DOWN FORWARD 70


FORWARD 80 REPEAT 6
RIGHT 90 FORWARD 30
PENUP RIGHT 60
FORWARD 60 ENDREPEAT
PENDOWN

1 mark for each correct statement [8]

8 (a) Direct [1]

(b) Chip reader/magnetic stripe reader/bar code reader/OCR/RFID [1]

© Cambridge International Examinations 2013


Page 4 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

(c) Two from:

More accurate/fewer mistakes


Faster data entry [2]

(d) Three from:

The borrower’s file and book data files would be saved as separate tables
Primary key/key field(s)/foreign key would be identified
One mark is available for an appropriate example of the field which would be set to primary
key
This would be used to link the tables together [3]

9 Five from:

Video conferencing is a method of visual and audio communication between people at separate
locations
Webcams/small video cameras are used to input faces of participants
Large monitor/projector to output faces of participants
Microphones are used to input voices of participants
Speakers are used to output voices of participants
Router/broadband modem used to connect to internet
Video conferencing software needed to link participants
Employees are connected on-line/may need to access the Internet/WAN to work
Images of the employees appear on the screen in real time
Software is needed in each computer to operate the conference
Employees can be heard by all the other employees in the conference
You can take part wherever you are [5]

10


Back ache from bad posture

Electrocution from touching bare wires  [1]

Fire from overloading electric sockets  [1]

Headaches from staring at the screen continuously

Injury caused by tripping over trailing wires  [1]

RSI in the fingers

© Cambridge International Examinations 2013


Page 5 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

11 (a) Two from:

Humidity
Moisture
Light
pH [2]

(b) Sensors send analogue data to computer [1]


Computer works in digital [1]

(c) The preset value is the (required) value input by the user/already stored in the computer [1]

Three from:

temperature is compared with preset value


if lower than preset value computer switches on heater
if lower than preset value computer shuts windows
if higher than preset value computer switches heater off
if higher than preset value computer switches fan on
if higher than preset value computer opens window [3]

12 (a) Two from:

Bar code reader


Key/number pad
Weighing scales
Touch screen
RFID reader
Magnetic Stripe reader
Chip and PIN reader [2]

(b) Four from:

The stock file is searched


Until a match is found with the entered bar code number/product id number
The number in stock of the matching record is read
One is subtracted from the number in stock
The number in stock is compared with the re-order number
If it is equal to the re-order number
More goods are automatically re-ordered
The new value of number in stock is written back to the file [4]

13 (a) Three from:

Observation
Interview
Questionnaire
Examining documents [3]

© Cambridge International Examinations 2013


Page 6 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

(b)

Field name Data type

First_name Text [1]

Family_name/second_name Text [1]

Phone number Text [1]

Worker_ID Text [1]

Wage currency [1], [1]

(c) Three matched pairs from:

A letter followed by five digits


This should be accepted by system

Two letters followed by four digits


This would be rejected by format check

Six digits
This would be rejected by format check

Six letters
This would be rejected by format check

Fewer or greater than 6 characters


This would be rejected by a length check

(1 mark for item, 1 mark for reason) [6]

14 (a) Two from:

A copy of file(s)
On an alternative medium
In case anything happens to original
Usually removed from the location of the computer [2]

© Cambridge International Examinations 2013


Page 7 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12

(b) Six from:

Magnetic tape is less expensive per unit volume of memory


Tape is slower to access data than magnetic disc
Tape requires a special drive…
…but these often come as standard with file servers
Tapes are easier to store
Tapes are easier to remove from premises if needed

One mark is available for a reasoned conclusion [6]

15 Four from:

phishing is done by email


can invite you to go to a website/respond to an email
pharming is done by installing malicious code on a PC or server
redirects a genuine website’s traffic to the fraudulent website [4]

16 Five from:

Advantages
Safer environment
Don’t need to lift heavy loads/Fewer manual tasks to do
Cleaner/healthier working environment
Can lead to retraining to improve skills
More technical jobs available

Disadvantages
Can lead to unemployment
Deskilling can occur

One mark is available for a reasoned conclusion [5]

17 Seven from:

Danger of accessing inappropriate websites


Can take long time to find required information
Have to have internet connectivity/computer/phone line/modem
Internet tends to be up date
Internet has vast amounts of information/wide range of information
Speed of search only if referring to use of search engine
Can access biased/inaccurate websites
Lack of expertise leads to inefficient searching
Easy to plagiarise information [7]

© Cambridge International Examinations 2013


UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education
*2248293167*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 October/November 2013
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 12 printed pages.

IB13 11_0417_13/3RP
© UCLES 2013 [Turn over
2

1 Name the devices A, B, C and D using the words from the list. For
Examiner's
Use
A B C D

bar code reader dot matrix printer joystick laser printer

microphone scanner speakers trackerball

A B

C D
[4]

2 Ring two network devices.

hub CD ROM graph plotter

magnetic disc router trackerball

[2]

3 Tick True or False next to each of these statements.

True False

A network card is an example of hardware.

A light sensor is an example of software.

Icons are part of a Graphical User Interface.

A magnetic tape has a greater storage capacity than a CD.

Laser printers are quieter than a dot matrix printer.

[5]

© UCLES 2013 0417/13/O/N/13


3

4 Draw five lines on the diagram to match the input device to its most appropriate use. For
Examiner's
Use

Input Device Use

Remote control to input data at a POS

Electronic scales playing a video game

Joystick inputting text so it can be processed by


a software package

Optical Character Reader an input device in a burglar alarm system

Sound sensor to operate a multimedia projector

[5]

5 Tick True or False for the following statements.

True False

A magnetic tape has faster data access than a DVD ROM.

A CD is used to store a two hour high definition movie.

A magnetic disc is used for online processing.

Pen drives are used to copy data from one computer to another.

[4]

© UCLES 2013 0417/13/O/N/13 [Turn over


4

6 A floor turtle can use the following instructions: For


Examiner's
Use
INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

50 30 70

Finish NOT TO
50 SCALE

50
Start

Complete the set of instructions to draw this shape by filling in the blank lines. Do not use
additional lines.

PENDOWN

LEFT 90

FORWARD 50

REPEAT

[8]

© UCLES 2013 0417/13/O/N/13


5

7 Multi-national companies often use video conferencing instead of face-to-face meetings. For
Examiner's
Use
(a) Tick three advantages of video conferencing.

Companies do not have to buy any equipment

Companies can arrange the meeting for any time of day

It is safer as employees do not have to travel

Companies do not have to pay hotel expenses

Employees don’t have to carry so many documents with them

Employees are paid less


[3]

(b) Tick three disadvantages of video conferencing.

Video conferences can only last a short time

Employees are unable to see who they are talking to

It is difficult to call international meetings because of time differences

There is sometimes a time lag between video and sound

It is difficult to share documents

Legal documents may need to be signed


[3]

8 There are many health risks associated with the use of computers.

Tick three of these risks.

Electrocution from touching bare wires

Fire from overheating of equipment

Fire from overloading of sockets

Neck pain due to bad positioning of the screen

RSI due to continuous typing

Sight problems from staring at the screen continuously


[3]

© UCLES 2013 0417/13/O/N/13 [Turn over


6

9 (a) Describe what is meant by hacking, including ways that a hacker can misuse data held For
on a computer. Examiner's
Use

[4]

(b) Describe two methods which would help prevent hackers accessing a computer
network.

[4]

© UCLES 2013 0417/13/O/N/13


7

10 Many people now use internet shopping sites. For


Examiner's
Use
(a) Apart from not having to travel, give three benefits to the customer of internet
shopping.

[3]

(b) Apart from data security give three drawbacks to the customer of internet shopping.

[3]

© UCLES 2013 0417/13/O/N/13 [Turn over


8

11 Explain why information found on websites is not always reliable and describe how the For
reliability of the information can be evaluated. Examiner's
Use

[5]

12 Chad has developed a new computer system. He now needs to implement it. He has
decided against using phased implementation.

Name and describe three other methods which could be used to implement a new system.

[6]

© UCLES 2013 0417/13/O/N/13


9

13 Computers are used in supermarkets at checkouts. For


Examiner's
Use
(a) Identify three output devices which could be used when an item is purchased.

[3]

When paying for goods the customer uses a bank card.

(b) Identify the input device which will be used to directly input data from the card.

[1]

(c) Describe the processing which takes place during an electronic funds transfer. Include
reasons why the card might be rejected.

[7]

© UCLES 2013 0417/13/O/N/13 [Turn over


10

14 Describe what phishing is and explain its purpose. For


Examiner's
Use

[4]

15 Paul owns a shop. He has employed Jean, a systems analyst, to write software for a new
database system to store data about the CDs he sells. Jean wrote down three of the
questions that customers might ask which Paul might need to find the answers to quickly:

Have you got the CD recorded by the artist ‘Bett Lyryx’ in 2008?
How much does the CD called ‘Let It Be’ cost?
How many tracks are on the CD?

(a) Complete the data dictionary table below giving the field names which would be used in
the database and identify the data types needed to answer these questions.

Field name Data type

Artist_name text

text

[7]

© UCLES 2013 0417/13/O/N/13


11

(b) No CD lasts for longer than 90 minutes or is shorter than 20 minutes. Paul wants to For
add a field to the database to include this data. He will use test data on this field. Examiner's
Use

Name three types of test data, giving an example of the data which would be used.

Type 1

Example 1

Type 2

Example 2

Type 3

Example 3 [6]

(c) When the system is implemented, documentation will be provided.

Tick four items that would be included in the technical documentation but not in the
user documentation.

purpose of the system

limitations of the system

program coding

system flowcharts

hardware and software requirements

file structures

list of variables

frequently asked questions


[4]

© UCLES 2013 0417/13/O/N/13 [Turn over


12

16 Libraries make use of both batch processing and online processing. For
Examiner's
Use
Describe the differences between these types of processing giving examples of situations
where each would be used in a library.

[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2013 0417/13/O/N/13


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the October/November 2013 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

1 A microphone B speakers [1], [1]


C dot matrix printer D joystick [1], [1]

2 hub CD ROM graph plotter [1]

magnetic disc router trackerball [1]

3
True False

A network card is an example of hardware.  [1]

A light sensor is an example of software.  [1]

Icons are part of a Graphical User Interface.  [1]

A magnetic tape has a greater storage capacity than a CD.  [1]

Laser printers are quieter than a dot matrix printer.  [1]

4 Remote control to input data at a POS [1]

Electronic scales playing a video game [1]

Joystick Inputting text so it can be processed by a software package


[1]

Optical Character Reader an input device in a burglar alarm system [1]

Sound sensor to operate a multimedia projector [1]

5
True False

A magnetic tape has faster data access than a DVD ROM.  [1]

A CD is used to store a two hour high definition movie.  [1]

A magnetic disc is used for online processing.  [1]

Pen drives are used to copy data from one computer to another.  [1]

© Cambridge International Examinations 2013


Page 3 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

PEN DOWN ENDREPEAT

LEFT 90 PENUP

FORWARD 50 FORWARD 30

REPEAT 2 PENDOWN

RIGHT 90 FORWARD 70

FORWARD 50

1 mark for each correct statement [8]

7 (a)
Companies do not have to buy any equipment

Companies can arrange the meeting for any time of day

It is safer as employees do not have to travel  [1]

Companies do not have to pay hotel expenses  [1]

Employees don’t have to carry so many documents with them  [1]

Employees are paid less

(b)
Video conferences can only last a short time

Employees are unable to see who they are talking to

It is difficult to call international meetings because of time differences  [1]

There is sometimes a time lag between video and sound  [1]

It is difficult to share documents

Legal documents may need to be signed  [1]

© Cambridge International Examinations 2013


Page 4 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

8
Electrocution from touching bare wires

Fire from overheating of equipment

Fire from overloading of sockets

Neck pain due to bad positioning of the screen  [1]

RSI due to continuous typing  [1]

Sight problems from staring at the screen continuously  [1]

9 (a) Four from:


Illegal accessing of data
Unauthorised access to data/computer system
Usually remotely
Two max.

Deletion of data
Amending/changing of data
Copying and distributing data
Using data for fraudulent purposes
Three max. [4]

(b) Four max from two descriptions:

Allocating User ID and one of password/PIN/Memorable data to network users


Password/PIN/Memorable data has to be entered before access is gained
Password/PIN can be changed frequently to avoid hackers guessing them
Unsuccessful logins can throw you out of the system

Allocating each user a Magnetic stripe/smart card/electronic key/bar code system/ID card
Card/key has to be read before access is gained
Prevents people without cards accessing system

Biometric data has to be used to enter the network


Fingerprint/retina/iris/face/voice recognition used as input
Biometric data is difficult to replicate
Biometric data is used because it is unique
Data is compared with those stored on the system.

Firewall is installed in the network


Only allows known computers to access network/prevents unknown computers
accessing network
Only allows known or trusted programs to communicate across the firewall/with the computer
[4]

© Cambridge International Examinations 2013


Page 5 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

10 (a) Three from:


Less danger of mugging
Can shop when shops are closed
Doesn't have to spend time queuing/going around different shops
Can compare prices at different shops more easily
Can look at wide range of shops
Easier to search and find what you’re looking for [3]

(b) Three from:


Lack of socialising/social contacts
Customers must have a computer/Internet access/(basic) computer skills
Deprived of personal touch
Phone bills can increase
Without broadband other family members cannot use the phone
Cannot see/feel goods in reality [3]

11 Five from:
Anybody can set up a website (claiming to be factually accurate) so information is not necessarily
reliable/accurate
Some commercial sites are bound to be biased
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
Can use the final part of a URL to identify reliability
.ac, .gov, .org are usually fairly reliable
Compare information from reliable sites or reliable/authenticated text books (to see if it is reliable)
See if responsible bodies have endorsed the site
Does it have links to other reliable sites/unreliable sites?
If site has testimonials it is likely to be reliable
If the date of the last update was a long time ago it is likely to be unreliable
If the author’s credentials are good it is likely to be reliable [5]

12 Three matched pairs from:

Direct changeover
New system replaces existing system immediately/overnight

Parallel running
New system runs alongside/together with existing system

Pilot running
system is implemented in one branch/one office (at a time) [6]

13 (a) Three from:


Printer
Monitor
Speaker/buzzer
LCD display [3]

(b) Chip reader/magnetic stripe reader [1]

© Cambridge International Examinations 2013


Page 6 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

(c) Seven from:


Details from customer’s card processed
PIN is compared with that stored on the chip
Card is checked for validity/reported stolen
If PIN is OK/verified transaction is authorised
(Bank code allows) shop computer to contact bank’s computer
Account checked for sufficient funds
If insufficient funds/ over the credit limit then transaction/card is rejected/If sufficient funds
then transaction is authorised
Amount deducted from customer’s bank account
Amount credited to shop’s bank account
Itemised receipt printed out

Card might be rejected if:


PIN entered incorrectly
Past its expiry date
Registered as stolen
Physical damage to chip
Unusual spending patterns
Unable to use some cards abroad [7]

14 Four from:
Phishers send an e-mail…
… asking for a customer’s details
appears to be from the bank/says that the bank needs the information
asks the customer for password, card or account number
Three max.

So that they can use these details to log on to bank website


Access account and transfer funds
Two max. [4]

15 (a)
Field name Data type

Artist_name text

CD_title text [1]

Price Currency [1], [1]

Date_recorded/Year_recorded Date [1], [1]

Number_of_tracks Integer [1], [1]

© Cambridge International Examinations 2013


Page 7 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13

(b) Three matched pairs from:

Normal data
One of:
greater than or equal to 20 and less than or equal to 90

Abnormal data
One of:
greater than 90 or less than 20

Extreme data
One of:
90, 20 [6]

(c)
purpose of the system

limitations of the system

program coding  [1]

system flowcharts  [1]

hardware and software requirements

file structures  [1]

list of variables  [1]

frequently asked questions

16 Six from:

Batch processing:
data are collected together
during the course of the day
then processed all at once
processed overnight
letters sent to borrowers who are overdue
letters sent to borrowers following morning
no human intervention

Online processing
results in immediate updating of records
book details inputted as soon as book borrowed/returned
records are searched until match is found
recorded as being borrowed/returned [6]

© Cambridge International Examinations 2013


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*3483070646*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 May/June 2014
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 16 printed pages.

IB14 06_0417_12/4RP
© UCLES 2014 [Turn over
2

1 Name the items A, B, C and D using the words from the list.

A B

C D

Bar code reader CD ROM Desktop computer Graph plotter

Graphics tablet Laptop computer Laser printer Mouse

A B

C D
[4]

2 Identify two input devices which are used in mobile phones when making a phone call.

2 [2]

© UCLES 2014 0417/12/M/J/14


3

3 Tick whether the following statements are True or False.

True False

Viruses can be transmitted by opening e-mail attachments.

MICR is used to read data from bar codes.

Hard discs can store more data than Blu-ray discs.

Regular use of computers can cause headaches.

[4]

4 Give two methods a company could use to send instructions electronically to an employee who
works from home.

2 [2]

5 In science lessons, students use sensors connected to computers to find the boiling point of
water.

Give three advantages of using computers and sensors rather than students taking the
temperature readings themselves.

[3]

© UCLES 2014 0417/12/M/J/14 [Turn over


4

6 A floor turtle can use the following instructions:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

NOT TO
SCALE

60°

100 mm
Start

Complete the set of instructions to draw this shape by filling in the blank lines.
All the sides are the same length.
The turtle is facing up the page and the pen is up.
You must use the REPEAT instruction.

RIGHT 90

[5]

© UCLES 2014 0417/12/M/J/14


5

7 The table shows part of a spreadsheet file.

A B C D E
1 Sweet shop
2 Item Cost price Selling price Profit Amount sold
3
4 Nutty bar $1.10 $1.30 $0.20 193
5 Choco bar $0.95 $1.10 $0.15 194
6 Cocoa bar $1.05 $1.30 $0.25 171
7 Chocolate digits $0.80 $0.90 $0.10 181
8

(a) Give the cell reference of one cell containing a label.

[1]

(b) Give the cell reference that contains $0.15.

[1]

(c) Write down how many columns are shown in the spreadsheet.

[1]

(d) Give the cell reference for a cell that should be formatted as currency.

[1]

(e) State the formula that should be in cell D5.

= [1]

© UCLES 2014 0417/12/M/J/14 [Turn over


6

8 The chemistry department in a school keeps its stock records on computer. The stock for any
item is not allowed to fall below 10 or go above 100.

Here are examples of records from the suggested database.

Description Serial_number Number_in_stock Name_of_supplier Area_code

Flask 061237410231 22 Patels 0789

Beaker 061237410352 35 Smithsons 0635

(a) As the data is entered it will need to be verified.

Name two ways in which the data could be verified.

2 [2]

(b) For each of these validation checks write down the field that would be best suited to it. You
must name three different fields.

Range

Length

Check digit [3]

9 Tick four benefits of using robots on car production lines.

Robots never take breaks

More workers are employed

Faster cars are produced

Standard of the product is more consistent

Robots never break down

Robots don’t need paying

No humans are needed

Greater productivity

[4]

© UCLES 2014 0417/12/M/J/14


7

10 A video-conference is being set up.

Complete each sentence below using the most appropriate device from the list.

MICR OCR router

web cam scanner printer

keyboard microphone speaker

(i) Moving images are input using a

(ii) Sound is input using a

(iii) Sound is output using a

(iv) Connection to the Internet is made using a

[4]

© UCLES 2014 0417/12/M/J/14 [Turn over


8

11 A library has decided to update its computer system. The details of each book are typed into a
screen input form.

(a) Design a suitable screen input form for inputting the details of one book. The form must have
appropriate spacing for each field, and navigation aids.

[5]

(b) As the data is typed in, it is stored in a database.

Name the medium which would be most suitable for storing the data and having direct
access to records. Give two reasons for your choice.

Name

Reason 1

Reason 2

[3]

© UCLES 2014 0417/12/M/J/14


9

(c) The library wants to include the new computerised borrowing system on its website.
Borrowers will be able to reserve or renew books using the Internet. Some people are
concerned about this because there is a risk that their data may be accessed by
unauthorised people.

Describe three ways that the library could try to prevent unauthorised access to their system.

[3]

(d) The new system will be implemented.

Describe three different ways in which the system could be implemented.

[3]

© UCLES 2014 0417/12/M/J/14 [Turn over


10

(e) After the system is implemented the library will be given two types of documentation.

(i) One type will help people use the new system.

Give two examples of the contents of this type of documentation.

(ii) The other type will help a programmer or systems analyst who wants to upgrade the
system.

Give two examples of the contents of this type of documentation.

[4]

© UCLES 2014 0417/12/M/J/14


11

12 A school is going to introduce an automatic registration system controlled by computer. Students


will carry a card which will be read automatically by an input device every session so that the
school office will know that they are present.

(a) Name a suitable input device to read the card.

[1]

(b) Instead of using this system the school ICT teacher suggests using student fingerprints.

Describe two advantages and two disadvantages of such a system.

Advantage 1

Advantage 2

Disadvantage 1

Disadvantage 2

[4]

13 Discuss the advantages and disadvantages, in terms of cost, to customers of using the Internet
for home shopping.

[5]

© UCLES 2014 0417/12/M/J/14 [Turn over


12

14 Describe the effects on people’s lifestyles of the use of microprocessor-controlled devices in the
home.

[4]

© UCLES 2014 0417/12/M/J/14


13

15 A word-processed school newsletter contains only text. The head teacher wants to add images to
the newsletter.

(a) Describe how he could include photographs, taken using a digital camera, in the newsletter.

[3]

(b) Name two other suitable sources of digital images.

2 [2]

(c) The head teacher needs one thousand copies of this newsletter.

Give four reasons why a laser printer should be used rather than an inkjet or a dot matrix
printer.

[4]

© UCLES 2014 0417/12/M/J/14 [Turn over


14

16 A head teacher keeps IGCSE examination results stored in a spreadsheet. Part of the
spreadsheet is shown below

A B C
Percentage of students
1
passing
2
3
4 Year 1 95.6
5 Year 2 96.1
6 Year 3 96.4
7

One of the features of a spreadsheet is that you can use it to produce charts.

Describe the steps needed to show these results in the form of a chart.

[3]

17 Describe the role of the microprocessor in an automatic washing machine.

[5]

© UCLES 2014 0417/12/M/J/14


15

18 A theatre has an on-line booking system.


Customers can reserve seats using the Internet with a credit card.
The theatre’s computer keeps records of which seats are available.
When the customer pays for a seat the theatre’s computer communicates with the credit card
company’s computer.

(a) Describe three checks that the credit card computer will make on the customer’s credit card
account.

[3]

(b) Describe the processing carried out by the theatre’s computer when the credit card
company’s computer authorises the transaction.

[4]

© UCLES 2014 0417/12/M/J/14 [Turn over


16

19 People can access the Internet using mobile (cell) phones, laptops and their PCs.

Compare and contrast the use of these different devices to access the Internet.

[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 0417/12/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the May/June 2014 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

1 A Laptop computer [1]


B Laser printer [1]
C Bar code reader [1]
D Graphics tablet [1]

2 Two from:
Touch screen
Microphone
Buttons
Keypad [2]

True False

Viruses can be transmitted by opening e-mail attachments. 

MICR is used to read data from bar codes 

Hard discs can store more data than Blu-ray discs 

Regular use of computers can cause headaches 

[4]

4 Two from:
Send an email
Send an SMS/text message
Use instant messaging
Send a fax
Leave a message on voicemail
Make a phone call
Use VOIP
Send an alert on the company intranet/website
Social networking
Video conference [2]

5 Three from:
Sensors take more accurate readings
Possibly less danger to students
Students could lose concentration and forget taking some readings
More readings can be taken in a short period of time
Results can be automatically/more quickly produced
Graphs are automatically produced [3]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

6 RIGHT 90

PENDOWN [1]

REPEAT 6 [1]

FORWARD 100 [1]

LEFT 60 [1]

END REPEAT [1]

7 (a) A1/A2/A4/A5/A6/A7/B2/C2/D2/E2 [1]

(b) D5 [1]

(c) 5 [1]

(d) Any cell in range B4:D7 [1]

(e) = C5 – B5 [1]

8 (a) Visual verification [1]


Double data entry [1]

(b) Range: Number_in_Stock [1]


Length: Area_code [1]
Check digit: Serial_number [1]

9
True False

Robots never take breaks. 

More workers are employed.

Faster cars are produced.

Standard of the product is more consistent. 

Robots never break down.

Robots don’t need paying. 

No humans are needed.

Greater productivity.  [4]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

10 (i) Webcam

(ii) Microphone

(iii) Speaker

(iv) Router [4]

11 (a) Appropriate spacing for each field [1]


Forward/backward buttons/save(submit) – must have at least two navigation aids [1]
Information fills the page AND is clearly a screen form [1]

Title [1]
Author’s name [1]

Four from:
Reference number/ISBN/Publisher/Picture of cover/Dewey number/Genre or
Category/fiction or non-fiction/target age group/picture of author/date [2]

Three from:
Published/revision date/summary of contents/no. of copies/cost price/selling price
Number of pages/hardback or softback [1]

Maximum of five marks

(b) Fixed hard/magnetic disc [1]

Two from:
Fast data access
Stores a lot of data
Cannot be misplaced [2]

(c) Three from:


Firewalls to only allow authorised computers to use the system
User name/id and password will prevent users who do not know the password from accessing
the system
Biometric methods – fingerprints/retina scans are unique
Description of twin factor system [3]

(d) Three from:


Parallel running is running the old and new system together
Direct changeover is stopping the old system and starting the new one immediately
Phased implementation – new system is implemented part by part
Pilot running – system is implemented in one branch/office (at a time) [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

(e) (i) Two from:


How to load software/ run software/install software
How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Troubleshooting guide/contact details/help line/faqs
Error messages/handling
Tutorials [2]

(ii) Two from:


Program coding/listing
Name of program language
System flowchart
Program flowchart/algorithm
List of variables
File structure
Purpose of the program
Purpose of the system (only if not mentioned in user documentation)
Input format or example (only if not mentioned in user documentation)
Output format or example (only if not mentioned in user documentation)
Hardware requirements (only if not mentioned in user documentation)
Software requirements (only if not mentioned in user documentation)
Sample runs/test runs (only if not mentioned in user documentation)
Limitations of the system (only if not mentioned in user documentation)
Known bugs
Validation routines [2]

12 (a) Chip/magnetic stripe/bar code reader [1]

(b) Advantages – Two from:


Unique so students can’t check each other in
Students could forget cards
Students could lose cards
Sets of cards may be expensive to buy

Disadvantages – Two from:


Students will feel personal liberty infringed/parents might object to children’s fingerprints
being taken
Method can be slower than cards
Equipment/set up is more expensive
Time taken to gather all the fingerprints would be very long [4]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

13 Five from:

Advantages:
Don’t have to spend money on travelling to shops
Goods may be cheaper as shops have less staff to pay/less premises to rent
Don’t have to pay car parking charges
Don’t have to pay for shopping bags
Vouchers/special deals are often only available online
Comparison websites will find you the cheapest option/can compare prices more easily

Disadvantages:
May have to pay delivery charges
Postal costs of returning items
Initial cost of equipment/phone line
ISP costs/Possible high connection charges

Must have at least one advantage and disadvantage to gain full marks.

One mark is available for a reasoned conclusion [5]

14 Four from:
Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Manual household skills are lost [4]

15 (a) Up to two from:


Save photos to memory card
Insert memory card to computer
Copy photos to a new folder/desktop/hard disc
Connect camera lead to computer
Import/upload photos

Up to two from:
Load word processing package/open document
Insert image from folder/copy and paste/drag and drop
Edit/position the image

If camera is phone-based/web-enabled allow email/SMS for 1 mark

Maximum of three marks [3]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

(b) Two from:


Internet
Create own using a painting/drawing package
CD of images
Clipart library [2]

(c) Four from:


Laser is cheaper to buy than a dot matrix
Laser is faster at printing than other two for this task
Laser has a better quality printout than dot matrix
Laser has a larger paper tray than inkjet
Laser doesn’t need to change cartridges as often as an inkjet [4]

16 Three from:
Highlight A4 to C6/highlight A4 to A6 and C4 to C6
Select insert chart
Select type of chart
Label axes
Select legend/no legend
Create a heading/title [3]

17 Five from:
Microprocessor is programmed with pre-set values
Microprocessor starts cycle at specified time
Microprocessor reads data from sensors
Checks contact switch on door is closed
If it isn’t microprocessor will not start the cycle/if it is microprocessor starts cycle
Microprocessor compares sensor readings with pre-set value
If temperature is above pre-set value, microprocessor switches off heater
If temperature is below pre-set value, microprocessor switches on heater
If pressure is greater than preset value, microprocessor sounds alarm
Microprocessor checks pressure reading and calculates the amount of water to use
At start of cycle, microprocessor opens valve to let in water
If water level reached, microprocessor switches off valve
Microprocessor ends cycle at specified time [5]

18 (a) Three from:


Is credit card number valid/exists
Does name entered match that on system
Is expiry/start date valid/matches date stored on system
Does security code/CVV entered match that stored on system
Is there available credit/funds
Checks for unusual spending patterns
Is card blocked/reported stolen/lost [3]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12

(b) Four from:


Looks up required date of performance
Checks that seats are available
Flags seats as being booked
Stores name of customer with seats booked
Sends email confirmation/text
Prints tickets ready to post or to be collected/sends electronic version of ticket
Deducts number of seats booked from number of seats available/reduces number of seats
available (by one) [4]

19 Six from:
Mobile phones/laptops are portable, PCs are not
Keyboard on mobile phone is smaller/difficult to type
Mobile phone display is smaller than laptop or PC
Mobile phone may not be able to access certain sites
Signal is likely to be more reliable with PC/laptops as they can be cabled
Slower to access the internet with mobile phone
May not always be able to access the internet using a mobile phone or laptop
More likely to have a mobile phone with you
Can access the internet from greater number of places with a mobile phone
Easier to use a mobile phone while on the move
Some sites do not have full facilities for mobile phones [6]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*5248835992*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 May/June 2014
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 14 printed pages and 2 blank pages.

IB14 06_0417_13/5RP
© UCLES 2014 [Turn over
2

1 Name the items A, B, C and D using the words from the list.

A B

C D

Bar Code Reader CD ROM Drive Digital Camera Joystick

Memory Stick Mouse Speakers Web cam

A B

C D
[4]

2 Identify two features of a Graphical User Interface.

2 [2]

© UCLES 2014 0417/13/M/J/14


3

3 Complete the table below by identifying an appropriate type of software which would be used to
carry out each of the following tasks.

Software Task

Typing a letter

Calculating profit and loss

Viewing pages on the Internet

Creating a slide show

[4]

4 Tick whether the following tasks are carried out in the Evaluation or Analysis phase of the
systems life cycle.

Evaluation Analysis

Identifying user and information requirements

Comparing the new system with the original task requirements

Carry out research on the current system

Identifying any limitations of the new system

[4]

5 Tick three input devices that would be used at an EFTPOS terminal in a supermarket.

Chip reader

Web cam

Printer

Buzzer

Keypad

Bar code reader

TFT screen

[3]

© UCLES 2014 0417/13/M/J/14 [Turn over


4

6 A floor turtle can use the following instructions:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

NOT TO
SCALE

72°

50 mm 60 mm
Start Finish

120 mm

Complete the set of instructions to draw these regular shapes by filling in the blank lines. The
turtle is facing up.

PENDOWN PENUP

LEFT 90 BACKWARD 120

REPEAT 5

FORWARD 50

FORWARD 60

END REPEAT

[5]

© UCLES 2014 0417/13/M/J/14


5

7 A systems analyst has designed a new computer system for the payroll of a large organisation.

(a) The system needs to be tested.

Using examples of workers pay, which must not be lower than $200 and no more than $800,
explain what is meant by normal test data, abnormal test data and extreme test data.

Normal

Abnormal

Extreme

[6]

(b) The systems analyst produces documentation for the system.

Give four reasons why both user and technical documentation are needed.

[4]

© UCLES 2014 0417/13/M/J/14 [Turn over


6

8 Explain, giving examples of their use, the differences between ROM and RAM.

[4]

9 Other than communication systems, identify two applications which use online processing.

2 [2]

10 Complete each sentence below using one item from the list.

a bar code reader a data logger a chip reader

MICR OMR a robot

a simulation validation verification

Data from a bank card is input using

Data from a product in a supermarket is input using

Data from a cheque is input using

Fixing wheels to a car on a production line would be done by [4]

© UCLES 2014 0417/13/M/J/14


7

11 Computers are used in libraries to keep records of books and borrowers.

This is part of the database of books in a library:

Paperback or Borrower
ISBN Title Name of Author
Hardback number
9780593057049 Gone Tomorrow Lee Child P 864752

9781858683416 The World of the Brontës Jane O’Neill H 673257


Harry Potter and the
9780747591054 J K Rowling H 489323
Deathly Hallows
9780091765132 Old Bear stories Jane Hissey H 489323

This is part of the borrower’s database:

Borrower number Name of borrower e-mail of borrower Borrower phone number

673257 Giovanni Benitez benitez.g@fmail.fr 02 34 45 67

489323 Sarbjit Chandra sarb@goofie.es 24 17 39 81

(a) Individual records in the data files need to be retrieved quickly.

Write down the name of the most suitable storage medium for this purpose.

[1]

(b) The records in the book file are to be sorted in descending order of ISBN.

What will be the title of the book in the first record in the database after it has been sorted?

[1]

(c) Give the name of a field that contains a Boolean data type.

[1]

(d) Identity the data type of the borrower phone number field.

[1]

(e) Why would the borrower number in the borrower’s database be used as a key field?

[1]

© UCLES 2014 0417/13/M/J/14 [Turn over


8

(f) Write down the author of the book that Giovanni Benitez has borrowed.

[1]

(g) The final digit in the ISBN is used for validation purposes.

Write down the name of this digit.

[1]

(h) Describe two suitable validation checks, other than limit or range checks, that could be
carried out on the borrower number field.

[2]

(i) Describe three advantages and one disadvantage of the library using email rather than a
phone call to contact borrowers.

Advantage 1

Advantage 2

Advantage 3

Disadvantage

[4]

© UCLES 2014 0417/13/M/J/14


9

(j) When a book is borrowed the borrower presents the book and library card to the librarian.

Discuss the advantages and disadvantages of different input devices which could be used by
the librarian.

[6]

(k) Libraries often let borrowers access their own records at home.

One method the library uses to make sure that each borrower only accesses their own
records is by using a User ID and password.

Describe the purpose of each.

User ID

Password

[2]

© UCLES 2014 0417/13/M/J/14 [Turn over


10

12 An online bank keeps customer account data on their computers.

(a) Give one way a hacker can use customer accounts to defraud the bank.

[1]

(b) Give three reasons why, despite the risk of hacking, the bank still operates on-line banking.

[3]

13 Describe four drawbacks to young people using social networking sites.

[4]

© UCLES 2014 0417/13/M/J/14


11

14 Complete the sentences using words from the list below.

OMR CAD/CAM a disc

a tape an icon a keyboard

(i) Pupil exam answers can be read using

(ii) In a Graphical User Interface, to select an application you click on

(iii) To enter an instruction into a Command Line Interface you would use

[3]

15 Computer controlled traffic lights are used at busy road junctions. Light sensors and sound
sensors are not used to measure traffic flow.

(a) Giving a different reason for each, explain why these sensors are unsuitable.

Sound

Light

[2]

(b) Explain the difference between measurement and control when using microprocessors.

[2]

© UCLES 2014 0417/13/M/J/14 [Turn over


12

16 A company is planning to have a video-conference.

(a) Describe the purpose of each of the following devices.

Microphone

Speakers

Webcam

[3]

(b) Apart from saving costs and travelling time, describe the advantages to the company of
having a video-conference rather than a conference in a hotel.

[4]

© UCLES 2014 0417/13/M/J/14


13

17 Doctors use an expert system to help them with their diagnoses of illnesses.

(a) The symptoms are typed in by the doctors.

Describe the processing which the system uses so that it can suggest possible illnesses.

[5]

(b) Name two applications other than medical diagnosis and car fault diagnosis which involve
the use of expert systems.

[2]

© UCLES 2014 0417/13/M/J/14 [Turn over


14

18 Students are going to produce a word-processed report about the school greenhouse. It will
contain images of the plants that are grown. It will also contain data and charts from a
spreadsheet showing the costs of plants.

Describe how the students will produce their report.

[4]

19 Explain what is meant by phishing and pharming.

[4]

© UCLES 2014 0417/13/M/J/14


15

BLANK PAGE

© UCLES 2014 0417/13/M/J/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 0417/13/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education

MARK SCHEME for the May/June 2014 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Writing), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

1 A Speakers [1]
B Web cam [1]
C Joystick [1]
D Memory stick [1]

2 Two from:
Windows
Icons
Menus
Pointer/Pointing device [2]

Software Task

Word processing/DTP Typing a letter [1]

Spreadsheet Calculating profit and loss [1]

Web browser Viewing pages on the internet [1]

Presentation Creating a slide show [1]

Evaluation Analysis

Identifying user and information requirements  [1]

Comparing the new system with the original task [1]



requirements

Carry out research on the current system  [1]

Identifying any limitations of the new system  [1]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

5
Chip reader  [1]

Web cam

Printer

Buzzer

Keypad  [1]

Bar code reader  [1]

TFT screen

6 PENDOWN PENUP
LEFT 90 BACKWARD 120
REPEAT 5 PENDOWN
FORWARD 50 REPEAT 4
RIGHT 72 FORWARD 60
ENDREPEAT RIGHT 90
END REPEAT
1 mark each correct instruction [5]

7 (a) Normal data – data within a (given) range/appropriate for that data type [1]
Example – any wage between $200 and $800 [1]
Abnormal data – data outside the range/of the wrong data type [1]
Example – any wage less than $200 or greater than $800 or text such as “two hundred” [1]
Extreme data – data on the boundaries of the range [1]
Example – $200 or $800 [1]

(b) Four from:

Technical documentation has to be produced for systems analysts/programmers


Technical documentation to know how to improve/update the system
Technical documentation to know how to repair system
Technical documentation to know how to maintain the system
User documentation so that the user can understand the system
User documentation so that the user can learn/knows how to operate/use/access the system
User documentation so that the user can overcome problems/errors

Must gain at least one mark for each of user and technical to gain full marks [4]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

8 Four from:
ROM cannot be changed/RAM can be changed
RAM can be read from and written to
ROM is read only memory and RAM is random access memory
ROM is non-volatile/RAM is volatile
RAM holds the work that is being currently done by the user
ROM holds instructions that need to be unchanged such as BIOS/program cycles in a washing
machine/program instructions in games [4]

9 Two from:
Buying tickets
Online shopping
Online banking
Any control application
Automatic stock control
(EFT) POS system [2]

10 (i) A chip reader [1]

(ii) A bar code reader [1]

(iii) MICR [1]

(iv) A robot [1]

11 (a) Fixed hard/magnetic disc [1]

(b) The World of the Brontës [1]

(c) Paperback or Hardback [1]

(d) Alphanumeric/Text [1]

(e) Each item of data in the field is unique [1]

(f) Jane O’Neill [1]

(g) Check digit [1]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

(h) Two from:


(Invalid) character check/type check to check only digits have been entered
Length check to ensure only 6 characters are entered
Presence check to ensure a borrower number is entered [2]

(i) Three advantages from:


Phone call can last a long time
Can send same email to lots of people at same time
Can send advertising literature as an attachment
Borrower may be not available to answer phone
Phone line may be busy [3]

One disadvantage from:


Cannot be sure borrower has received the message
Can be using a computer when other librarians want to use it for other purposes [1]

(j) Six from:


Bar code reader/Magnetic stripe reader is quicker to enter data than keyboard
Bar code reader/Magnetic stripe reader is more accurate when entering data than keyboard
If bar code/is missing/damaged, it is difficult to enter data
Easier to damage a bar code than a magnetic stripe/chip
Chip reader can input more information than magnetic stripe or bar code
Chip/stripe/bar code readers have to be bought/keyboard comes with the computer
Continuous use of mouse/keyboard can cause RSI

One mark is available for a reasoned conclusion [6]

(k) User id identifies user to the system [1]


Password prevents unauthorised user from accessing data/must match the one that the
system stores for that user name [1]

12 (a) Can transfer money out of account/Can create bogus account/Can transfer money into
bogus account [1]

(b) Three from:


Fewer bank employees, so less paid out in wages
Fewer banks needed – less spent on rates/rent
Less actual cash handled – fewer robberies
Less money spent on security staff
More customers attracted by lower interest rates on loans/higher interest rates on saving
accounts [3]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

13 Four from:
May make friends with inappropriate people
Cannot be sure the person you are communicating with is the same as the images you have
seen.
Can become preoccupied with sites and not do other tasks/perform poorly academically
Can swap coursework/homework inappropriately
Lose person to person social skills/spend less time with family/friends
Prone to cyber bullying
Continual use results in lack of exercise, causing health problems [4]

14 (i) OMR [1]

(ii) An icon [1]

(iii) A keyboard [1]

15 (a) Sound – there might be other noises – e.g. roadworks, masking the sound of a car [1]

Light – Anybody could break the beam not just cars/direct sunlight may affect readings [1]

(b) Measurement is the monitoring of physical variables without the microprocessor taking action
[1]

Control is when the microprocessor takes action depending on sensor readings [1]

16 (a) Microphone to input voices of participants/speak to other participants [1]


Speakers to output voices to participants/hear other participants [1]
Web cam to input/capture video/images of participants/documents [1]

(b) Four from:


Workers can use own office so documents do not get lost in transit
Bulky documents/equipment do not have to be carried around
Sensitive documents less likely to be lost/stolen
Company can call meeting at short notice
Might be dangerous to fly/travel [4]

17 (a) Five from:


System/User interface asks questions...
...based on previous responses
Inference engine compares data
Compares data with that held in the knowledge base...
...using rules base
Matches to the symptoms are found [5]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13

(b) Two from:


Mineral prospecting
Tax
Careers
Chess games
Animal/plant classification/identification
Computer fault diagnosis [2]

18 Four from:
Save pictures from clipart/Internet/scanned images/digital camera
Load word processing software
Insert images
Edit images
Insert spreadsheet
Position chart/images/spreadsheet
Create chart
Type in text
Edit/format text
Save chart
Insert chart/ copy and paste chart
Edit chart [4]

19 Four from:
Phishing involves fraudster sending an e-mail…
…whereas pharming involves fraudster/hacker installing malicious code on a pc or server
Both involve trying to obtain personal details

Phishing
Email appears to be authentic
Is sent by a fraudster posing as a bank/organisation

Pharming
User is redirected to bogus website
User accesses websites which look authentic
But belong to the fraudster/hacker [4]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 8 0 4 6 1 4 9 0 3 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 October/November 2014
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 13 printed pages and 3 blank pages.

DC (AC/CGW) 88639/5
© UCLES 2014 [Turn over
2

1 This diagram shows a laptop computer.

web cam
microphone

screen

keyboard

touch pad

speaker

number pad

(a) Name two input devices shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Name two output devices shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 Identify two storage media used to store data on a bank card.

1 .......................................................................................................................................................

2 .......................................................................................................................................................
[2]

© UCLES 2014 0417/12/O/N/14


3

3 Tick two appropriate uses of dot matrix printers.

Using Multipart stationery

Producing high quality printouts

Producing A0 printouts

CAD applications

Producing continuous printouts

Producing printouts of photographs


[2]

4 Complete the table below by identifying the most appropriate type of software which would be
used to carry out each of the following tasks.

Software Task

Monitoring atmospheric pressure

Keeping temperature constant in a greenhouse

Modelling personal finances

Creating a slideshow

Finding information on the internet


[5]

5 Tick whether the following statements are TRUE or FALSE.

TRUE FALSE
 
Pen drives are used to make backups on large company file servers.

Magnetic tapes use direct access when searching for records.

Fixed hard discs have slower access times than optical discs.

DVD RWs allow you to save new data to them.

A CD has greater storage capacity than a DVD.


[5]

© UCLES 2014 0417/12/O/N/14 [Turn over


4

6 (a) Write down the type of interface shown in the picture below.

.............................................................................................................................................. [1]

(b) Write down the type of interface shown in the picture below.

Folders
Desktop
My Documents
My Computer
3½ Floppy (A:)

.............................................................................................................................................. [1]

7 Below is a spreadsheet containing data about a snack shop.

A B C D E

1 Snack shop
Number in Number in
Sold more
2 Item stock at start Number sold stock at end
than 150?
of week of week
3 Fruity bars 120 95 25 No

4 Cheesy chips 280 170 110 Yes

5 Muesli dips 295 125 170 No

6 Choco Lols 320 220 100 Yes

(a) Write down the number of columns shown in this spreadsheet.

.............................................................................................................................................. [1]

(b) Write down the cell reference of a cell containing an integer.

.............................................................................................................................................. [1]

(c) Write down one cell containing a label.

.............................................................................................................................................. [1]

(d) Write down the formula that should go in D4.

.............................................................................................................................................. [2]
© UCLES 2014 0417/12/O/N/14
5

(e) Write down the formula that should go in E5.

.............................................................................................................................................. [3]

8 A floor turtle can use the following instructions:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

20 mm 40 mm 25 mm
NOT TO
SCALE

30 mm
40 mm
25 mm

10 mm

Start Finish

Complete the set of instructions to draw this shape by filling in the blank lines. The turtle is facing
up at the start.

PEN DOWN ...................................................

FORWARD 10 ...................................................

LEFT 90 ...................................................

FORWARD 25 ...................................................

RIGHT 90 FORWARD 25

FORWARD 30 RIGHT 90

RIGHT90 ...................................................
[5]

© UCLES 2014 0417/12/O/N/14 [Turn over


6

9 A number of schools have Local Area Networks (LANs) in their buildings. The LANs are used to
share software and for students to save their work.

(a) Describe two ways that students can prevent the work they save from being edited by others.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

The schools want to connect their LANs to the Internet.

(b) Name the device they will need.

.............................................................................................................................................. [1]

As a result of all the schools having access to the Internet, students will be able to communicate
with students at other schools in a number of ways.

(c) Give two examples of these ways.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

The headteachers of the schools will want to send confidential data to each other.

(d) Give one advantage and one disadvantage of encryption.

Advantage .................................................................................................................................

...................................................................................................................................................

Disadvantage .............................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2014 0417/12/O/N/14


7

10 A school is going to install a new computer system that uses WiFi. The headteacher is very
concerned about the problems that the introduction of such a system will cause.

The safety issue of students tripping over trailing cables has been minimised by using WiFi, and
the risk of electrocution has been minimised by the use of automatic circuit breakers.

(a) Give two other safety issues which might occur and for each one describe a method of
preventing it.

Safety issue 1 ...........................................................................................................................

...................................................................................................................................................

Prevention .................................................................................................................................

...................................................................................................................................................

Safety issue 2 ...........................................................................................................................

...................................................................................................................................................

Prevention .................................................................................................................................

...................................................................................................................................................
[4]

(b) Describe what a virus is and explain how viruses cause problems for computer users.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(c) If hackers get into the system, they may plant spyware. Describe what is meant by spyware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2014 0417/12/O/N/14 [Turn over


8

11 The owner of a shop wants a new computer system to store the records of all the stock and
customers. The systems analyst will need to find out how the existing system works.

(a) Describe, in detail, two out of the four possible ways she could find out this information.

Way 1 ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Way 2 ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) After analysing the existing system, the systems analyst will design a database.

Identify four items that the systems analyst will need to design for the database.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2014 0417/12/O/N/14


9

After the system is designed, it will be developed, then implemented.

(c) Name two methods, other than direct changeover, that could be used to implement the
system and give an advantage for each method compared to direct changeover.

Method 1 ...................................................................................................................................

...................................................................................................................................................

Advantage .................................................................................................................................

...................................................................................................................................................

Method 2 ....................................................................................................................................

...................................................................................................................................................

Advantage .................................................................................................................................

...................................................................................................................................................
[4]

12 A large multi-national company uses video conferencing instead of face to face meetings between
branches in different countries.

(a) Apart from a keyboard, mouse and display devices, identify two other devices which must be
present in such a system for a video conference to take place.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe four disadvantages of video conferencing.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2014 0417/12/O/N/14 [Turn over


10

13 Tick three benefits of using computers to store patient records in hospitals.

Patients are always cured.

Patient records can be sorted into order more easily.

Doctors can find patient records more quickly.

Patients’ medicines are never lost.

Fewer doctors are needed.

Nurses don’t have to be paid as much.

Takes up less filing space.


[3]

14 Students save and carry their work from school to home on a pen drive.

(a) Describe two advantages of a pen drive compared to a CD of doing this.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Describe two disadvantages of a pen drive compared to a CD of doing this.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2014 0417/12/O/N/14


11

15 A supermarket uses a computerised stock control system.


This is part of the supermarket’s stock file.

Product number Product name Number_in_stock Reorder_level

5011476130069 Wheaters 185 130

0000208097939 Cricket Tea 152 120

0001570248867 Geo garden peas 212 185

It has EFTPOS terminals at each of its checkouts.

(a) Write down the input devices used to read:

(i) The product numbers of the goods bought by customers

...................................................................................................................................... [1]

(ii) The customer’s credit card details

...................................................................................................................................... [1]

(b) Name the validation check that would be carried out on the product number.

...............................................................................................................................................[1]

(c) Describe the computer processing involved in updating the stock file every time a product is
sold and checking whether it needs re-ordering.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 0417/12/O/N/14 [Turn over


12

(d) The customer has to type in the PIN to authorise the transaction.

Describe the check that is carried out by the EFTPOS terminal.

...................................................................................................................................................

.............................................................................................................................................. [1]

(e) After the checks on the customer’s card have been completed, the supermarket computer
contacts the customer’s bank.

Describe the computer processing involved in taking payment from the customer’s bank.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

16 Describe what is meant by batch processing, using the processing of bank cheques as an example.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2014 0417/12/O/N/14


13

17 Many bank customers do their banking using the Internet at home. Many transactions can now be
done without having to travel to the bank.

(a) Describe three types of transaction which they can do from home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Identify one type of transaction which they cannot do from home.

...................................................................................................................................................

.............................................................................................................................................. [1]

(c) Give three benefits to the bank of internet banking.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(d) Give three drawbacks to the bank of internet banking.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2014 0417/12/O/N/14


14

BLANK PAGE

© UCLES 2014 0417/12/O/N/14


15

BLANK PAGE

© UCLES 2014 0417/12/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 0417/12/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the October/November 2014 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

1 (a) Two from:


Number pad
Keyboard
Microphone
Web cam
Touchpad [2]

(b) Screen [1]


Speaker [1]

2 Magnetic stripe [1]


Chip [1]

3
Using Multipart stationery  [1]

Producing high quality printouts

Producing A0 printouts

CAD applications

Producing continuous printouts  [1]

Producing printouts of photographs

4
Software Task

Measuring program monitoring atmospheric pressure [1]

Control program keeping temperature constant in a greenhouse [1]

Spreadsheet Modelling personal finances [1]

Presentation software Creating a slide show [1]

Search engine finding information on the internet [1]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

5
Pen drives are used to make backups on large company file servers.  [1]

Magnetic tapes use direct access when searching for records.  [1]

Fixed hard discs have slower access times than optical discs.  [1]

DVD RWs allow you to save new data to them  [1]

A CD has greater storage capacity than a DVD  [1]

6 (a) Command Line Interface/CLI [1]

(b) Graphical User Interface/GUI [1]

7 (a) 5 [1]

(b) Any cell in the range B3:D6 [1]

(c) A1 or any cell in ranges A2:E2 or A3:A6 [1]

(d) = b4–c4
b–c formula [1]
Row 4 [1]

(e) = if(c5 > 150, “Yes”, “No”)


Correct syntax of if() [1]
C5 > 150 [1]
“Yes”, “No” [1]

PEN DOWN FORWARD 20 [1]

[1]
FORWARD 10 PENUP

LEFT 90 FORWARD 40 [1]

FORWARD 25 PENDOWN [1]

RIGHT90 FORWARD 25

FORWARD 30 RIGHT 90

RIGHT 90 FORWARD 40 [1]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

9 (a) Two from:


Make their file/work read only
Password encrypt their file/work
Grant people access to their file/work without permission to edit
Make their file/work hidden [2]

(b) Modem/router [1]

(c) Two from:


Email
Instant messaging
VOIP
Video conferencing [2]

(d) Advantage
Unauthorised users won’t be able to understand data/only person/computer with key can
understand data

Disadvantage
The data can still be deleted/if the person encrypting the data accidentally deletes the
encryption key the data will be unreadable [2]

10 (a) Issue – heavy equipment falling injuring users [1]


Prevention – sturdy tables/place heavy equipment in centre of tables [1]

Issue – fire might be caused [1]


Prevention – CO2 extinguisher/don’t overload sockets/have fans/cooling system [1]

(b) Three from:


A piece of programming code/software/program/script
It replicates itself
Attaches itself to files
Corrupts/deletes files/data
Can corrupt or erase the contents of the hard disk
Can completely fill the hard disk/memory making it unusable/slows down operations
Makes software/operating system unusable
One mark is available for an accurate description of method of transmission [3]

(c) Three from:


Software that gathers data from computers without the user realising
It monitors and records all key presses
It sends this information back to the hacker who sent it out
Used to gain personal details of users [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

11 (a) Two matched pairs from:

Interview users of the existing system


Asking questions about the system face to face/in person

Distribute questionnaires to users of the existing system


Asking questions about the system in hard copy form

Observation of the existing system/workers in action


To see all aspects of the system/whole overview to see how system works

Examining documents about the current system


To see inputs and outputs to the system [4]

(b) Four from:


Data capture forms
Screen layouts
Report layout
Screen displays
Validation routines
Data/file structures [4]

(c) Two matched pairs from:

Parallel running
There is always the old system to fall back on in the event of the new system failing/training
can be gradual

Phased implementation
You still have most of old system to fall back on/training can be gradual

Pilot running
Only one branch is affected if new system fails/other branches can learn from the branch’s
experiences [4]

12 (a) Two from:


Router
Web cam
Microphone
Network card
Speakers [2]

(b) Four from:


Takes time/costs money to learn new technology/to be trained
Difficult to have international meetings because of time differences
Initial cost of hardware (and software)
Equipment can break down/power cuts can stop conference
Poor strength of signal/time lag/lip sync can be a problem/connection can be lost
Loss of personal/social contact [4]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

13
Patients are always cured.

Patient records can be sorted into order more easily.  [1]

Doctors can find patient records more quickly.  [1]

Patients’ medicines are never lost.

Fewer doctors are needed.

Nurses don’t have to be paid as much.

Takes up less filing space  [1]

14 (a) Two from:


Pen drives are easier to carry than CDs
Most computers have USB ports not all have CD drives
Pen drives store more data than a CD [2]

(b) Two from:


Pen drives are more expensive than CDs
Pen drives are easier to lose than CDs
Saving directly to a pen drive can be problematical [2]

15 (a) (i) Bar code reader [1]

(ii) Chip/magnetic strip readers [1]

(b) Check digit [1]

(c) Four from:


Product number is searched for in stock file
Matching number in stock reduces by 1
Compare number in stock with re-order level
If number in stock is less than re-order level product is re-ordered
Order is automatically sent to supplier [4]

(d) The PIN on the chip is compared with the typed in PIN [1]

(e) Four from:


Bank looks up customer account number
Checks available balance
If insufficient funds then transaction is rejected
If sufficient funds then transaction is authorised
Amount deducted from customer account
Amount credited to supermarket account [4]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 12

16 Three from:
Cheques are collected together…
…during the course of the day
Cheques are then processed all at once
Cheques are processed overnight
Bank accounts updated following morning [3]

17 (a) Three from:


Customers can pay bills
Customers can amend/create standing orders/direct debits
Customers can order a new PIN
Customers can stop a cheque
Customers can see recent/pending transactions
Customers can apply for a loan
Have access to up-to-date bank statements/can check account balances
Can transfer funds between the customer’s different accounts
Can amend personal details [3]

(b) Withdraw cash/pay in cash [1]

(c) Three from:


Fewer bank tellers so less paid out in wages
Less actual cash handled – fewer robberies
Have access to a wider customer base
Fewer branch offices needed – less spent on rates/rent/utilities
Less money spent on security staff [3]

(d) Three from:


Initial cost of hardware/software is expensive
Need to retrain staff
Loss of customers/more difficult to sell other services due to lack of personal touch
System maintenance may be expensive/costs of system maintenance [3]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 9 8 1 2 9 7 6 2 0 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 October/November 2014
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 13 printed pages and 3 blank pages.

DC (AC/CGW) 88646/5
© UCLES 2014 [Turn over
2

1 This diagram shows a desktop computer.

DVD drive
pen drive

screen internal hard disk drive

microphone

speaker
mouse

keyboard

(a) Name two input devices shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]
(b) Name two output devices shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]
(c) Name two storage devices shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 Tick the most appropriate method of inputting data for the following applications.

OMR OCR MICR


Applications
  
Reading data from bank cheques

Reading data from candidate exam answer papers

Inputting data ready for processing by a word processor

Inputting pencil mark data from a school register


[4]

© UCLES 2014 0417/13/O/N/14


3

3 Complete the table by identifying the most appropriate device for each use.

Device Use

printing on multipart stationery

reading information from the front of bank cards

making fileserver backup copies

to read data from a product at a POS terminal


[4]

4 Many young people use social networking sites.

Tick whether the following statements are true or false.

TRUE FALSE
 
It is easy to keep in immediate contact with friends

You can share photographs with friends

You can do internet banking using a social networking site

You can access everybody’s personal details


[4]

5 Complete the sentences using words from the list below.

(a) The type of processing used when booking an airline ticket is called ...................................[1]

(b) The type of access used on a magnetic tape is called ..........................................................[1]

(c) An item of hardware which can read temperatures is called a ..............................................[1]

online sensor OCR

MICR serial

batch motor

© UCLES 2014 0417/13/O/N/14 [Turn over


4

6 A floor turtle can use the following instructions:

INSTRUCTION MEANING
FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

70 mm

NOT TO
20 mm SCALE
35 mm

15 mm

20 mm 35 mm

Start Finish

Complete the set of instructions to draw this shape by filling in the blank lines. You will need to use
a REPEAT loop after the turtle has moved the 70 mm.

PEN DOWN FORWARD 20

LEFT 90 RIGHT 90

FORWARD 20 ...................................................

RIGHT 90 ...................................................

................................................... RIGHT 90

................................................... FORWARD 35

................................................... ...................................................
[6]

© UCLES 2014 0417/13/O/N/14


5

7 A meal is to be cooked using a microprocessor controlled oven.

(a) Identify two variables which have to be pre-set before the cooking begins.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe the role of the microprocessor in controlling the oven.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2014 0417/13/O/N/14 [Turn over


6

8 The English teacher stores details of her students’ exam scores in a spreadsheet. The exam is
marked out of 80 and the results are typed into the Exam result column.

A B C D
1 Name Form Exam result Pass/Fail
2

(a) The teacher wants to use a validation check which only allows numbers between 0 and 80 to
be typed in. What is the name of this type of validation check?

...............................................................................................................................................[1]

(b) She types in the following exam results to test that the validation works:

0, 25, 80 and 87.

Using the data above write down one example of:

(i) normal data

...........................................................................................................................................

(ii) extreme data

...........................................................................................................................................

(iii) abnormal data

...........................................................................................................................................
[3]

The teacher decides that the pass mark for the exam should be 45. Depending on the number of
marks each pupil gets, the word ‘Pass’ or the word ‘Fail’ will appear in the Pass/Fail column.

(c) Write down the formula which should appear in cell D2.

...................................................................................................................................................

.............................................................................................................................................. [3]

(d) Explain how she can replicate the formula in the 30 cells below D2.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 0417/13/O/N/14


7

(e) Give two reasons, apart from safety, why computer models are often used rather than the
real thing.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

9 Complete each sentence below using one item from the list.

analysis a flowchart hacking

a virus implementation data logging

encryption a password the world wide web

(a) A program can be designed using ...............................

(b) Observing the current system in use is part of ...............................

(c) Gaining access to somebody else’s work without permission is called ...............................

(d) Reducing unauthorised access can be achieved by asking for ...............................


[4]

10 Tick four benefits to banks of using ICT.

Higher charges can be made

They have fewer bad risks

Less paid out in wages as fewer staff need to be employed

Lower costs as fewer buildings need to be rented

A wider customer base is available

Mistakes are never made

Less actual cash handled so there are fewer robberies

The initial cost of hardware is cheap


[4]

© UCLES 2014 0417/13/O/N/14 [Turn over


8

11 A car manufacturer uses robots on its production line.

(a) Describe four disadvantages to the company of using robots to build cars.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(b) Identify two changes to the workers’ working environment that the use of robots has brought
about.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

12 Tick two applications which use on-line processing.

Producing the payroll

Producing utility bills

Printing credit card statements

Paying for goods using EFTPOS

Processing bank cheques overnight

A microprocessor controlled greenhouse


[2]

© UCLES 2014 0417/13/O/N/14


9

13 A sports club uses a computer database to keep records of members in one file and records of the
sport bookings in another file. Here is a record in the sport bookings file.

Sport Venue Sport code Member number

Football Sports Hall SHF10 543210

(a) The members file and the sport bookings file will be saved as separate tables.
Describe other steps which would be required in order to create a relational database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Give two advantages of creating and using a relational database compared to using two flat
files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Explain why a hard disk is used to store the data files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2014 0417/13/O/N/14 [Turn over


10

(d) The member number varies between 500000 and 549999.


All sport codes consist of three letters followed by two numbers.

Name an appropriate validation check for each of the member number and the sport code. Do
not use the same check twice.

Member number ........................................................................................................................

Sport code ................................................................................................................................


[2]

(e) When members make a booking, they will show their membership card which holds their
details electronically. Name the device which will be used to input their details from the card.

.............................................................................................................................................. [1]

(f) Give two reasons why this method is better than typing the number in.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

When the system was implemented the systems analyst gave some documentation to the sports
club owner.

(g) Name three different items found in the user documentation.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2014 0417/13/O/N/14


11

(h) Name three different items in the technical documentation which are not present in the user
documentation.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

14 Describe the differences between an intranet and the Internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2014 0417/13/O/N/14 [Turn over


12

15 The use of microprocessor-controlled devices in the home affects an individual’s leisure time,
social interaction and the need to leave the home.

(a) Give three advantages to the individual when microprocessor-controlled devices are used in
the home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give three disadvantages to the individual when microprocessor-controlled devices are used
in the home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2014 0417/13/O/N/14


13

16 Describe three ways in which personal data held on computers can be misused. For each way
explain a different method for helping to prevent it.

Way 1 ...............................................................................................................................................

..........................................................................................................................................................

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

Way 2 ...............................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

Way 3 ...............................................................................................................................................

..........................................................................................................................................................

Method 3 ..........................................................................................................................................

..........................................................................................................................................................
[6]

17 RAM and ROM are part of Immediate Access Memory.


Explain why computer systems have both backing storage and Immediate Access Memory.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2014 0417/13/O/N/14


14

BLANK PAGE

© UCLES 2014 0417/13/O/N/14


15

BLANK PAGE

© UCLES 2014 0417/13/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 0417/13/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the October/November 2014 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

1 (a) Two from:


Microphone
Keyboard
Mouse [2]

(b) Speakers [1]


Screen [1]

(c) Two from:


DVD drive
Internal hard disc drive
Pen drive [2]

2
Reading data from bank cheques  [1]

Reading data from candidate exam answer papers  [1]

Inputting data ready for processing by a word processor  [1]

Inputting pencil mark data from a school register  [1]

3
Dot matrix printer printing on multipart stationery [1]

Chip reader reading information from the front of bank cards [1]

Magnetic tape drive making fileserver backup copies [1]

Bar code reader to read data from a product at a POS terminal [1]

4
It is easy to keep in immediate contact with friends  [1]

You can share photographs with friends  [1]

You can do internet banking using a social networking site  [1]

You can access everybody’s personal details  [1]

5 (a) On-line [1]

(b) Serial [1]

(c) Sensor [1]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

PEN DOWN FORWARD 20

LEFT 90 RIGHT 90

FORWARD 20 FORWARD 70

RIGHT 90 REPEAT 2

PENUP RIGHT 90

FORWARD 15 FORWARD 35

PENDOWN END REPEAT

1 mark for each correct instruction [6]

7 (a) Temperature [1]


Time [1]

(b) Five from:


Microprocessor switches heater on
Microprocessor receives data from temperature sensor
Temperature of oven is compared with pre-set value by microprocessor
If higher microprocessor switches heater off
If lower microprocessor leaves heater on
Time is constantly monitored by microprocessor
Time elapsed/finish time is compared to pre-set time by microprocessor
If equal then heater is switched off by microprocessor…
…microprocessor causes buzzer to sound [5]

8 (a) Range check [1]

(b) (i) 0, 25 or 80 [1]

(ii) 0 or 80 [1]

(iii) 87 [1]

(c) =if(C2>=45,”Pass”,”Fail”)

Correct syntax of if() [1]


C2>=45 [1]
“Pass”,”Fail” [1]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

(d) Three from:


Click on D2 and manoeuvre to bottom right hand corner of cell
Until black cross appears
Drag black cross down to D32

Or

Right click on D2 select copy from menu


Select D3 to D32
Right click and click on paste

Or

Highlight cells D2 to D32


Click on Fill
Click on down [3]

(e) Two from:


Cost of building real thing may be expensive
Real thing may waste raw materials/natural resources
Easier to change data/variables
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be on too vast a scale
Extremes which can’t be tested in real life can be tested using models [2]

9 (a) A flowchart [1]

(b) Analysis [1]

(c) Hacking [1]

(d) A password [1]

10
Higher charges can be made
They have fewer bad risks
Less paid out in wages as fewer staff need to be employed  [1]
Lower costs as fewer buildings need to be rented  [1]
A wider customer base is available  [1]
Mistakes are never made.
Less actual cash handled so there are fewer robberies  [1]
The initial cost of hardware is cheap

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

11 (a) Four from:


Robots have to be reprogrammed when there is a small change/can’t think for themselves
Robots need programming in order to be adaptable
Expensive start-up costs – redundancy payments
Expensive start-up costs – have to spend money on training workers to use robots
Expensive start-up costs – buying of robots/programming of robots
Computer crash would halt production
Maintenance/repair costs can be expensive [4]

(b) Two from:


It is quieter
They have a safer environment
It is a cleaner environment [2]

12
Producing the payroll

Producing utility bills.

Printing credit card statements.

Paying for goods using EFTPOS.  [1]

Processing bank cheques overnight

A microprocessor controlled greenhouse.  [1]

13 (a) Two from:


Primary key/key field(s)/foreign key would be identified… [1]
…would be used to link the tables together [1]

(b) Two from:


Data does not have to be typed in twice
Quicker to enter/update/edit data
Fewer errors are likely
Reduces storage requirements [2]

(c) Three from:


Can store vast amount of information
Has a fast data access speed
Has a fast data transfer speed
Most computer systems come with hard discs [3]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

(d) Member number: Length check/(invalid) character check/type check/range check

Sport code: Length check/format check [2]

(e) Chip reader/magnetic stripe reader [1]

(f) Two from:


It is faster to enter data
More accurate/fewer errors [2]

(g) Three from:


How to load software/ run software/install software
How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Troubleshooting guide/contact details/help line/FAQs
Error messages/handling
Tutorials [3]

(h) Three from:


Program coding/listing
Name of program language
System flowchart
Program flowchart/algorithm
List of variables
File structure
Known bugs
Validation routines
Purpose of the program [3]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

14 Four from
Internet is network of networks/intranet doesn’t have to be a network of networks
Internet is global
Intranet is within one organisation
Intranet is private/internet is public
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more reliable/relevant than that found on the Internet
Internet has more information than an intranet [4]

15 (a) Three from:


Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents [3]

(b) Three from:


Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Manual household skills are lost
These may malfunction and, because the individual has left the device unattended, this can
lead to fires/damage to the house [3]

16 Three matched pairs (with a different method for each one) from:
Data could be amended
Use a username and password so that only the person who knows these can access the data
Use biometrics so that only that person who has those characteristics can access the data
Use a firewall which prevents unknown computers accessing a network

Data could be deleted


Use a username and password so that only the person who knows these can access the data
Use biometrics so that only that person who has those characteristics can access the data
Use a firewall which prevents unknown computers accessing a network

Data could be read and passed on


Encryption so that data is unreadable to unauthorised users [6]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2014 0417 13

17 Four from:
If computer is switched off work in RAM goes but backing storage stores data for future use
Backing storage is cheaper than IAM per unit of memory so more cost effective to have both
IAM is bulkier than backing storage per unit of memory so more sensible to have both
IAM provides faster access than backing storage so as there has to be backing storage computer
needs IAS to speed up operations
Software package may be so large that it is physically impossible for RAM to store it
Data may need to be transferred from one computer to another and can’t do that with RAM [4]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 9 9 3 7 1 3 8 9 0 0 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/SG) 101050/2
© UCLES 2015 [Turn over
2

1 This diagram shows a tower PC.

(a) Name two input devices apart from a keyboard and mouse, which could connect directly to
the tower.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Name two storage devices which would be available in the PC shown above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Name two output devices which could connect directly to the PC shown above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2015 0417/12/M/J/15


3

2 Below is a list of statements. Each statement is true for only one of the given methods of
implementation. Tick the method which matches the statement.

Parallel Direct Pilot


running Changeover running
✓ ✓ ✓
All of the old and new systems run at the same time.
If the system fails in one branch, the rest of the
company is not affected.
The new system has to be completely free of errors
before implementation.
The benefits of the new system are available
immediately.
[4]

3 Below is a list of uses of ICT.


Tick the device which would be most appropriate for each activity.

Input Output Storage


device device device
✓ ✓ ✓
Making a backup of work

Typing a document

Printing out student records

Reading details from a bar code

Making a soft copy for future use


[5]

4 Tick whether the following items are found in user documentation only, technical documentation
only or are found in both.

User Technical Both


✓ ✓ ✓
Systems flowchart

How to save a document

List of variables

The purpose of the system


[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


4

5 There are a number of methods of direct data entry.

Complete the sentences using words from the list below.

(a) The method of inputting bank codes from the bottom of a cheque is called

............................................................[1]

(b) The device used for inputting details from a label on a product is called

............................................................[1]

(c) The device used for inputting data directly from a bank card is called

............................................................[1]

a bar code reader a PIN pad OMR

MICR a keyboard a graphics tablet

a mouse a chip reader

6 A floor turtle can use the following instructions:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

35 mm
10 mm

20 mm
10 mm

15 mm
Start Finish

The turtle is facing up the page and the pen is up.

© UCLES 2015 0417/12/M/J/15


5

A student has written the following set of instructions to make the floor turtle draw the above
shape.

1. PENDOWN

2. LEFT 90

3. FORWARD 15

4. RIGHT 90

5. PENUP

6. FORWARD 20

7. RIGHT 90

8. PENUP

9. FORWARD 90

10. RIGHT 35

11. FORWARD 20

Although the first four instructions are correct, this set of instructions would not draw the shape
exactly as shown. One instruction has been missed out and four are incorrect.

(a) Write down the missing instruction and indicate where it should be positioned in the list of
instructions provided.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Identify the four incorrect instructions and state the correct instructions to be used.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


6

7 A microprocessor controlled washing machine is fitted with a number of sensors.

(a) Tick three sensors which would be used in such a system.

Pressure sensor

Height sensor

Wind speed sensor

Sound sensor

Temperature sensor

Moisture sensor

Cold sensor

Detergent sensor
[3]

(b) Describe the actions taken by a microprocessor during a wash cycle, based on the readings
from those sensors identified in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2015 0417/12/M/J/15


7

8 A bank has introduced a system whereby its customers will use contactless smart cards to make
purchases. This method of payment involves customers holding their card close to a reader at
shopping outlets and restaurants.

Discuss the advantages and disadvantages of this method of payment compared to using chip
and PIN cards.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 0417/12/M/J/15 [Turn over


8

9 (a) Explain how a VLOOKUP function works, using the example of VLOOKUP(38,A2:C10,3,FALSE).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) A spreadsheet contains the following data and formula.

D E F G H I

1 Months in employment :ŽďĚĞƐĐƌŝƉƟŽŶ Name


2 31 Teacher John =VLOOKUP(33,D2:F10,3)
3 34 Chemist Avtar
4 39 Engineer Ahmed
5 43 Lecturer Ho
6 32 Bricklayer David
7 35 Manager Jose
8 38 Shopkeeper Simon
9 33 Zoo owner James
10 23 Explorer /ŶƟŬŚĂď
11
12

Explain why the cell H2 might not contain James. Suggest the value that would be contained
in that cell, giving reasons why.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 0417/12/M/J/15


9

10 Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as well as
job losses.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

11 Aftab wants to create a network using a PC and two laptop computers he has bought for his family.
All have network cards fitted. He has already purchased network protection software. He wishes to
use them for online banking.

Name and describe the use of four additional items, apart from cables, he would need in order to
set up this network.

Item 1 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 2 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 3 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 4 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................
[8]
© UCLES 2015 0417/12/M/J/15 [Turn over
10

12 A school in the UK holds a sports day every year. Students compete in a number of athletics
events during the day.

The results of all events, together with suitable photographs, are to be included in the school
newsletter on its website. Initially the results will be stored in a spreadsheet.

Describe how the sports day part of the newsletter will be produced.

..........................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

......................................................................................................................................................[6]

13 Tick three drawbacks in terms of costs to banks of introducing online banking.

Initial purchase of hardware and software is expensive

Bank workers will have to be paid more

Extra buildings will be need to be rented

System maintenance costs may be high

Cost of lighting and electricity will be higher

More cashiers will need to be employed

More security staff will need to be employed

Redundancy payments will need to be made to cashiers who are now


unemployed
[3]

© UCLES 2015 0417/12/M/J/15


11

14 A headteacher wishes to store details of her students in a computer database. She has been
given an example of one student record by the school secretary:

Strauss, Johann, SR132516, 83, 01/09/2011

This corresponds to family_name, first_name, Student_Id, Maths_test_score, joined_the_school.

The file is currently stored in the form of plain text with each record separated by a line break.

(a) Give a file extension which is appropriate for this file.

...............................................................................................................................................[1]

(b) For each field identify the most appropriate data type. The Maths_test_score is used in
calculations.

Field name Data type

family_name

first_name

Student_Id

Maths_test_score

joined_the_school
[5]

(c) Identify the two fields for which a format check would be the most appropriate validation
check. In each case describe how the format check would work.

1 ..............................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


12

(d) The school secretary will use a screen input form to make it easier to enter data on the new
system.

Design a suitable screen input form to enter the details of one student using the fields given in
part (b) but leaving the field contents blank.

It should contain appropriate spacing for each field, as well as navigation aids and other
appropriate features of a screen input form.

[5]

15 One of the stages in systems analysis and design is called development and testing.

Describe the different testing strategies that can be used on a new system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]
© UCLES 2015 0417/12/M/J/15
13

16 An oil prospecting company wants to use an expert system to help it to decide where to drill for oil.

(a) Describe how such a system would work.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Give two different uses of expert systems for diagnosis.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2015 0417/12/M/J/15


14

BLANK PAGE

© UCLES 2015 0417/12/M/J/15


15

BLANK PAGE

© UCLES 2015 0417/12/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 0417/12/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the May/June 2015 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

1 (a) Two from:

Joystick
Microphone
Tracker ball
Concept keyboard
Touch screen
Scanner
Digital camera
Graphics tablet
Webcam [2]

(b) Two from:

Hard disk drive


Optical disc drive
Flash memory card reader/writer
Solid State Drive [2]

(c) Two from:

Dot matrix printer


Laser printer
Inkjet printer
Speakers
Monitor [2]

2
Direct
Parallel Pilot
Change-
running running
over
 


All of the old and new systems run at the same


 [1]
time

If the system fails in one branch the rest of the


 [1]
company is not affected

The new system has to be completely free of


 [1]
errors before implementation

The benefits of the new system are available


 [1]
immediately

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

3
Input Output Storage
device device device
  

Making a backup of work  [1]

Typing a document  [1]

Printing out student records  [1]

Reading details from a bar code  [1]

Making a soft copy for future use  [1]

4
User Technical Both
  

Systems flowchart  [1]

How to save a document  [1]

List of variables  [1]

The purpose of the system  [1]

5 (a) MICR [1]

(b) a bar code reader [1]

(c) Chip reader [1]

6 (a) FORWARD 10 is missing before first PENUP/5th instruction/after 4th instruction/first


RIGHT 90/ between 4th and 5th instruction [1]

(b) First FORWARD 20 (6) should be FORWARD 10 [1]

Second PENUP (8) should be PENDOWN [1]

FORWARD 90 (9) should read FORWARD 35 [1]

RIGHT 35 (10) should read RIGHT 90 [1]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

7 (a)
Pressure sensor  [1]

Height sensor

Wind speed sensor

Sound sensor

Temperature sensor  [1]

Moisture sensor  [1]

Cold sensor

Detergent sensor

(b) Five from:

Microprocessor stores pre-set values


Reads data from sensors
Microprocessor compares readings with pre-set value
If temperature is at or above the pre-set value microprocessor sends a signal to turn the
heater off
If temperature is below pre-set value microprocessor sends a signal to turn the heater on
At start of cycle, microprocessor sends a signal to open valve to let in water
If water level reached microprocessor sends a signal to switch off valve
If pressure is above preset value microprocessor sends a signal to sound alarm
Microprocessor checks pressure reading and calculates the amount of water to use [5]

8 Six from:

Contactless systems reduce the time taken by retailers to deal with each customer
Customers don’t need to queue for so long as contactless cards speed up the transactions/
quicker than inserting the card and entering the PIN
Only checks whether the card is not cancelled or stolen not always making a full check on what
the balance of the holder’s account is.
Customers are limited in what they can buy as transactions must be below a certain value
In some cases, the customer can unwittingly pay for another customer’s purchase if they get too
close to the terminal.
A thief armed with a suitable reader, within a few feet of the customer, would be able to
interrogate all of the cards in their wallet without their knowledge.
If customer lost card a thief could make purchases without having to know a PIN
Customer can pay twice as terminal may detect the card for contactless payment but has inserted
the card to use the PIN.
Customer doesn’t have to worry about PIN being overseen/shoulder surfed [6]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

9 (a) Four from:

Searches for the value 38


38 is the lookup value
Searches in the range A2:C10
It returns the value that is contained in the third column of the range...
…and on the same row as the lookup value…
…if it’s an exact match of 38 [4]

(b) Four from:

There is no return value/FALSE/0…


…to force an exact match
The data is not sorted on column D
So only an approximate match will be made
First four items in column D are sorted so as soon as it gets to D6 it’s is no longer sorted…
…so it doesn’t get to 33…
So formula will return David [4]

10 Five from:

Max four from:


e.g.
Fewer secretaries needed – computers provide much of the secretarial expertise once provided
by a secretary
Fewer general office staff needed – workload has been reduced by the storage capacity of
computers
Computerised accounting packages – fewer accountants needed
Stock control used to require specialists but is now done through computerised checkout systems
Security systems – computerised security gates have caused a reduction in the number of people
employed for store security
Automated return and issue systems in libraries have led to a number of library staff being made
redundant
Production lines are now operated by robots reducing the number of jobs available to production
line workers

Max four from:


Increase in employment of ICT systems/network maintenance workers
Increase in employment of robot maintenance workers
Increase in employment of programmers
Increase in employment of web designers
Increase in employment of computer operators
Increase in employment of van drivers by online retail industries
More workers needed to manufacture robots [5 max]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

11 Four matched pairs from:

Modem/Router
To connect the network to the internet

Hub/Switch
To connect the computers to form a network

(Internet) browser
To access the bank’s website/to search on different websites/allow access to internet (if not given
elsewhere)

ISP (contract)
To access the internet/to provide internet services

Telephone line
To connect the router to the internet [8]

12 Six from:

Load/open web authoring package


Create tables
Take photo using digital camera/ordinary camera or video camera
Upload from camera
Save the image/video
Load webpage
Import/copy and paste/insert image into document/embed image source into markup
Position the image/resize image/edit image
Type text/import text files
Edit/format text
Insert spreadsheet
Insert/copy data from spreadsheet
Paste data into table
Create chart from spreadsheet
Edit chart
Insert chart/ copy and paste chart
Upload web page to internet [6]

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

13


Initial purchase of hardware and software is expensive  [1]

Bank workers will have to be paid more

Extra buildings will be need to be rented

System maintenance costs may be high  [1]

Cost of lighting and electricity will be higher

More cashiers will need to be employed

More security staff will need to be employed

Redundancy payments will need to be made to cashiers who are


 [1]
now unemployed

14 (a) .csv/.txt/.rtf [1]

(b) Text/alphanumeric [1]


Text/alphanumeric [1]
Text/alphanumeric [1]
Numeric/Integer [1]
Date [1]

(c) Two matched pairs:

Student_Id [1]
It would make sure that it would consist of two letters followed by 6 digits [1]

joined_the_school [1]
It would make sure that it would consist of two digits, a slash, two digits, a slash followed by
4 digits [1]

(d) All 5 correct fields – 2 marks


4 correct fields – 1 mark
fewer than 4 correct fields – 0 marks
Additional fields lose 1 mark each down to a minimum of 0 marks [2]

Three from:

Appropriate spacing for each field


Forward and backward buttons
Drop down boxes for joined_school field/calendar to choose dates from
Information fills the page [3]

© Cambridge International Examinations 2015


Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 12

15 Six from:

Testing modules with abnormal data


Testing modules with data that is outside the range
Testing modules with data that is of the wrong type/format/length
Testing modules with normal data
Testing modules with data that is within the range
Testing modules with data that is of the correct type/format/length
Testing modules with extreme data
Testing modules with data that is at the boundaries/ends of the range
After testing each module thoroughly…
…testing the whole system
Description of user testing
Testing with live data [6]

16 (a) Six from:

Uses interactive interface/interactive interface asks questions about geological profile


Answers to questions are typed in
geological profile is typed in
Further questions are asked based on previous responses
expert system analyses data
inference engine compares data…
…compares data with that held in the knowledge base...
...using rules base
matches are found
Probabilities of oil being present are suggested
Depths of likely deposits are suggested
Predictions of geological strata above the deposits of oil are output [6]

(b) Two from:

Medical diagnosis
Car engine fault diagnosis
Computer fault diagnosis [2]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 5 7 2 5 5 6 4 5 3 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 15 printed pages and 1 blank page.

DC (AC) 101051/3
© UCLES 2015 [Turn over
2

1 This diagram shows a smart phone.

(a) Name two input devices shown on the phone diagram.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Name one storage device which would be available in the phone shown above.

.............................................................................................................................................. [1]

(c) Identify three ways the phone shown above could be used to contact a bank apart from
making a phone call to the bank.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2015 0417/13/M/J/15


3

2 Tick the most appropriate method of inputting data for the following uses.

Bar code
MICR OMR
Use reader
✓ ✓

Inputting exam answers from a multiple choice test paper

Inputting the account number from the bottom of a cheque

Inputting the ISBN from the back cover of a book

Inputting pencil marks from a school register

[4]

3 Explain what is meant by computer hardware and computer software, giving an example of each.

Hardware ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Software ...........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

4 Tick whether the following statements apply to verification, validation or neither.

Neither
verification
Verification Validation
nor
✓ ✓
validation

Data is entered by two different operators

Data is checked to see if it is present

Data is checked to make sure it is correct

Data entered is checked to see if it matches data


on the source document
[4]

© UCLES 2015 0417/13/M/J/15 [Turn over


4

5 Complete each sentence using a word from the list below.

(a) The type of processing used for updating bank


accounts at ATMs is called .................................................... [1]

(b) The type of access used on a magnetic tape is called .................................................... [1]

(c) The type of software used to create printed magazines


is called .................................................... [1]

batch sensor spreadsheet

online direct random

serial DTP

6 Describe two recent developments in ICT which have improved the quality and speed of
communication using the internet.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................
[2]

© UCLES 2015 0417/13/M/J/15


5

7 There are many causes of health and safety issues related to the use of computers in the
workplace.

Explain, giving examples, the differences between the causes of each issue.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 0417/13/M/J/15 [Turn over


6

8 A floor turtle can use the following instructions:

INSTRUCTION MEANING
FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

Each shape
has equal sides

72° 90°

50 mm 80 mm 60 mm
Start

The turtle is facing up the page and the pen is up.

A student has written the following set of instructions to make the floor turtle draw the above
shapes.

1. PENDOWN

2. LEFT 90

3. REPEAT 6

4. FORWARD 50

5. RIGHT 72

6. BACKWARD 80

7. RIGHT 90

8. FORWARD 60

9. END REPEAT

© UCLES 2015 0417/13/M/J/15


7

Although the first two instructions are correct, this set of instructions would not draw the shapes
exactly as shown. Four instructions have been missed out and one is incorrect.

(a) Identify the incorrect instruction and state the correct instruction to be used.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Write down the four missing instructions and indicate where they should be positioned in the
list of instructions provided.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

9 An office has a microprocessor controlled central heating system.

(a) Name and describe, in detail, the use of two input devices in such a system.

Name 1 .....................................................................................................................................

...................................................................................................................................................

Use 1 ........................................................................................................................................

...................................................................................................................................................

Name 2 .....................................................................................................................................

...................................................................................................................................................

Use 2 ........................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/13/M/J/15 [Turn over


8

(b) Describe how the microprocessor would keep the temperature of the office at a constant
19°C.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

10 Apart from security aspects, describe the role of a proxy server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2015 0417/13/M/J/15


9

11 A headteacher keeps all details of students in a database.

(a) Describe what is meant by the following terms, using examples of student data.

Field ..........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

File ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Record ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) Describe what is meant by a key field, using examples of student data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 0417/13/M/J/15 [Turn over


10

12 An airline keeps a database of all the flights it operates. A short extract is shown below.

Flight_ Departure_ Number_of_


Destination_Airport_code Ticket_prices
number Airport_Code passengers

EK236 JNB 135 LHR $1200

EK080 DXB 256 DEL $500

EK029 LHR 375 DXB $650

(a) Explain fully, what is meant by the following validation checks using the extract above.

Range check .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Format check ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Length check ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) Using the extract above, give an example of one field which would contain:

Text data
(alphanumeric) ..........................................................................................................................

Numeric data ............................................................................................................................


[2]

© UCLES 2015 0417/13/M/J/15


11

13 (a) Explain how a SUMIF function works, using the example of SUMIF(A1:A6, ">29", B1:B6).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) A spreadsheet contains the following data and formula.

D E F G

1 Months in employment Days holiday due


2 31 10 =SUMIF(D2:D10,>31<35",F2:F10)
3 33 10
4 39 20
5 33 10
6 42 30
7 35 10
8 38 20
9 33 10
10 41 30

Explain why the cell G2 does not produce the expected value of 30.
Write down a formula which would total the Days holiday due to those workers who had worked for
the company for more than 31 months but less than 35 months.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 0417/13/M/J/15 [Turn over


12

14 Biometric methods are increasingly being used to authorise user access to computer systems.

(a) Explain, giving examples, why biometric methods are considered to be a more secure method
of authorising access to a network than using id and passwords.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Give three disadvantages of using biometric methods compared to user id and passwords.

1 .................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2015 0417/13/M/J/15


13

15 Many computer networks are connected using cables but some are now connected using wireless
technology.

Discuss the advantages and disadvantages of using wireless networks compared to using cabled
networks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 0417/13/M/J/15 [Turn over


14

16 A travel company uses an online booking system to book flights for its customers.

(a) The travel agent will type in the departure date, departure airport and destination airport. The
system does not allow invalid airport names.

Describe the processing and outputs involved in such a system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Give three other organisations which make use of online booking systems.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2015 0417/13/M/J/15


15

17 A headteacher has decided that the school newsletter will no longer be printed out for parents but,
instead, will appear on the school website.

Name three features available on a website not available in a hard copy version of the newsletter.
For each one describe how it could be used on the school website.

Feature 1 ..........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Feature 2 ..........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Feature 3 ..........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2015 0417/13/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 0417/13/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the May/June 2015 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

1 (a) Two from:

Touch screen
Microphone
(Push) button
Camera [2]

(b) One from:

(Flash) memory card reader [1]

(c) Three from:

Send emails
Send texts
Access website and send secure message [3]

Bar code
MICR OMR
Use reader
 


Inputting exam answers from a multi choice test paper  [1]

Inputting the account number from the bottom of a [1]



cheque
Inputting the ISBN from the back of a book  [1]

Inputting pencil marks from a school register  [1]

3 Computer hardware is the collection of physical components that make up a computer


system/physical parts of a computer that can be touched [1]

Examples of hardware are the monitor, mouse, keyboard, computer data storage, hard disk drive,
graphic cards, sound cards, memory, motherboard, CPU [1]

Computer software is made up of the instructions that can be stored and run by hardware/ any
set of machine-readable instructions/software directs a computer's processor to perform specific
operations/programs that control the computer system [1]

Examples of software are spreadsheet software, data handling software, word processing
software, DTP software, presentation software, control software, measuring software, operating
system, anti-virus software [1]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

4
Neither
verification
Verification Validation
nor
 
validation

Data is entered by two different [1]

operators
Data is checked to see if it is present  [1]

Data is checked to make sure it is [1]



correct
Data entered is checked to see if it [1]
matches data on the source 
document

5 (a)

The type of processing used for updating bank accounts at


ATMs is called online
[1]
(b)

The type of access used on a magnetic tape is called serial

[1]
(c)

The type of software which is used to create printed


magazines is called DTP

[1]

6 Two from, descriptions of:


e.g.:
Optical fibre broadband
Increased bandwidth
Fourth generation mobile telecommunications [2]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

7 Safety issues are usually caused by accidents [1]


Health issues are those caused by continuous use of computers [1]

Max four from:

Health issues are caused by-


Max three from:
Bad posture
Incorrect positioning of equipment
Not taking regular breaks
Continuously staring at a monitor
Repetitive clicking/typing

Safety issues are caused by –


Max three from:
Having trailing wires
Overloading sockets
Allowing drinks near equipment
Placing heavy equipment in an unsafe position on a table/desk [4]

8 (a) REPEAT 6 (3) should be REPEAT 5 [1]

(b) END REPEAT is missing after RIGHT 72 (5) [1]

PENUP is missing before BACKWARD 80 (6) [1]

PENDOWN is missing after BACKWARD 80 (6) [1]

REPEAT 4 is missing before RIGHT 90 (7) [1]

9 (a) Two matched pairs from:

Number pad/touch screen/remote control


For the user to input the required temperature

Temperature sensor
To input current temperature of the room/office [4]

(b) Four from:

Microprocessor receives temperature from temperature sensor


Microprocessor stores required temperature/19 as preset value
Compares temperature from sensor to pre-set temperature/19
If temperature is lower than preset value/19 microprocessor sends a signal to the actuator…
…to turn heater on
If higher than preset value/19 microprocessor sends a signal to turn heater off
Wait set period of time before looping/process is continuous [4]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

10 Three from:

Can act as a web server


Can act as a buffer between internet and LAN
Server passes on requests to the internet
Passes the requested web pages to individual computers
Can cache/store the webpages
Subsequent requests for that/those web page(s) are responded to more quickly
Can be used to monitor internet usage [3]

11 (a) Field
one item of information [1]
name/address/phone number/date of birth/tutor group/student id [1]

File
a collection of records [1]
all the students names, addresses, phone numbers, dates of birth, forms, student ids [1]

Record
A collection of fields [1]
All the information about one student/More than one of: name, address, phone number, date
of birth, tutor group of one student, student ids [1]

(b) Three from:

One mark for:


The key field in a database of student records would be the student id

Two from:
A field which contains unique data
It is used to identify the record
Used to create relationships between tables [3]

12 (a) Range check – two from:


Checks that data lies within a set range
In this database a range check could be performed on the Number_of_passengers or
Ticket_prices fields
Number_of_passengers should be in the range 135 to 375/Ticket_prices have to be in the
range $500 to $1200

Format check – two from:


Checks that data follows a set format
The Flight_number is in a specific format
The Flight_number must be two letters followed by three digits

Length check – two from:


Data must be a specific length – no more no less
Length check could be carried out on Departure_ Airport_Code or Destination_Airport_code,
Departure_ Airport_Code/Destination_Airport_code must be exactly three characters [6]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

(b) Text data- Flight_number/Departure_ Airport_Code/Destination_Airport_code [1]


Numeric data - Number_of_passengers/Ticket_prices [1]

13 (a) Four from:

This formula searches for values in the range A1:A6…


…which match the criterion >29
It totals the values…
…in the corresponding cells of the SUM range…
…B1:B6. [4]

(b) >31<35 is not a valid logical test [1]

=SUMIF(D2:D10,">31",F2:F10) [1]
– (minus sign) [1]
SUMIF(D2:D10,">=35",F2:F10) [1]

14 (a) Six from:

Biometric methods use unique data


User ids and passwords can be copied/stolen/forgotten
Cannot copy biometric data
Only the person with particular biometric features can access the network
Anybody who has the password can access a network

Max three from


Fingerprints can be used to identify an individual
Retina scans can be used to identify an individual
Facial characteristics can be used to identify an individual
Voice recognition software can be used to identify an individual [6]

(b) Three from:

The necessary software/equipment is more expensive to purchase


Takes longer to match data
If individual gets ill/background noise can make voice unintelligible to system
With certain illnesses retina scans stop working
Injuries to fingers can cause biometric device to fail to recognise you.
Could be wearing contact lenses which would stop retina scan working [3]

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2015 0417 13

15 Six from:

Advantages
Less likely to trip over cables
Easier to relocate computers
Cheaper as you don’t have to buy cables
Adding devices/computers to network is easier

Disadvantages
Limited area of network
Strength of signal is weaker
Physical obstacles can interfere with signal/can cause disconnection

One mark is available for a reasoned conclusion. [6]

16 (a) Six from:

Computer database is searched for matching departure airport


Computer database is searched for matching arrival airport
If flight on correct date found
Search if seats/tickets available
If so flags seat as booked
Reduces number of seats/tickets available by one
e-ticket details are output
e-ticket details sent by travel agent to customer [6]

(b) Three from:


e.g.:
Theatres
Cinemas
Football clubs/stadia
Holiday booking company [3]

17 Three matched pairs from:

Sound
Spoken introduction by head/voiceover the presentation/background music/school
choir/band/orchestra

Animation
Text effects/cartoon representing school activities

Video
Introduction by head/school play/choir/band/orchestra/sports activities

Hyperlinks
Move to another page in the website [6]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 5 9 4 1 0 0 7 6 8 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 October/November 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/FD) 101066/3
© UCLES 2015 [Turn over
2

1 These printouts show a document before and after it was finalised.

Write down six editing techniques which have been used on the image and the text.

This is a flower pot with two


flowers. One is growing
Printout before

Printout after
This is a flower pot with two flowers. One
is growing straight up and the other is
growing at an angle.

straight up and the other is


growing at an angle.

1 ........................................................................................................................................................

2 ........................................................................................................................................................

3 ........................................................................................................................................................

4 ........................................................................................................................................................

5 ........................................................................................................................................................

6 ........................................................................................................................................................
[6]

2 For each use, tick the most appropriate type of application software.

Modelling Database Word processing


Use
✓ ✓ ✓
Writing a letter

Flight simulation

Storing student records in a school

Producing a business card


[4]

© UCLES 2015 0417/12/O/N/15


3

3 Tick the type of computer which would be most appropriate for each use of ICT.

Mainframe Laptop Desktop


Use
✓ ✓ ✓

Entering data from a Biology survey while out of


school

Massive transactions which need the use of many


CPUs

Students who need to transport their computer


from home to use in school

Personal use with better performance at lower cost

[4]

4 Tick the most appropriate method of implementing a new system for each company.

Parallel Pilot Direct


Company running running changeover
✓ ✓ ✓

A company with several branches wishes to test


the new system in one branch only.

A small company that can only afford to spend a


small amount of money on implementing the new
system.

If the whole system fails, the company wishes to


return to the original existing system.

A company that wants the quickest method of


implementation.

[4]

© UCLES 2015 0417/12/O/N/15 [Turn over


4

5 There are a number of methods of direct data entry.

Complete each sentence using the most appropriate words from the following list.

a bar code reader a touch pad OCR

a magnetic stripe reader a trackerball a graphics tablet

a touch screen a PIN pad

(a) The inbuilt device which moves the cursor when using a laptop is called

............................................................[1]

(b) The device used for selecting an icon so a bar code label can be printed in a supermarket is
called
............................................................[1]

(c) The device used for controlling a pointer on a screen when the user has limited motor skills is
called
............................................................[1]

© UCLES 2015 0417/12/O/N/15


5

6 A student wishes to use a floor turtle to draw this regular shape.

The pen is already lowered and does not need to be lifted.


This turtle can only move in one direction and turn one way.

Give three instructions which the turtle graphics software could use to draw the shape. For each
one, explain the meaning of the instruction.

Instruction 1 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................

Instruction 2 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................

Instruction 3 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2015 0417/12/O/N/15 [Turn over


6

7 Scientists want to find the level of pollution in a river running past a chemical factory. They will use
sensors connected to a computer to do this.

(a) Name three sensors that the scientists would place in the river.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Explain why it is so important to carefully consider the position of sensors placed in the river.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe how the computer would monitor the level of pollution in the river.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2015 0417/12/O/N/15


7

8 A school has introduced a system so that parents of its students can access data about their
children.

(a) Give three reasons why the school has introduced this system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) In order to access this data, parents will need to log on to the school’s website.

Describe the purpose of the following two items of data they will need to enter.

User id .......................................................................................................................................

...................................................................................................................................................

Password ...................................................................................................................................

...................................................................................................................................................
[2]

9 Describe four items which can be provided by an ISP.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 0417/12/O/N/15 [Turn over


8

10 A video shop owner uses a spreadsheet to calculate his costs.

This is part of the spreadsheet.

A B C D

1 Book title Number in stock Cost price Total cost

2 The Wolf Of Wall Street 4 $18 $72

3 Thinking Fast And Slow 5 $17 $85

4 Be Careful What You Wish For 8 $15 $120

5 The Fell Sword 4 $20 $80

6 Metro 2034 2 $15 $30

8 Overall cost $387

(a) Give the cell reference of the cell that contains $20.

...............................................................................................................................................[1]

(b) Give the number of rows shown in the spreadsheet.

...............................................................................................................................................[1]

(c) Write down the formula which should go in cell D2.

...............................................................................................................................................[1]

(d) Write down the formula which should go in cell D8. Make the most efficient use of a function.

...............................................................................................................................................[2]

(e) Explain why financial models are often used to predict future profitability.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 0417/12/O/N/15


9

11 Explain why encryption is needed when transmitting data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

12 Many database software packages have a report generation feature.

The following is part of a video hire shop database showing films available in Blu-ray format.

Film_name Director Price ($) Regions Length (min)

Rush Ron Howard 12.99 A 122

Last Vegas Jon Turtletaub 17.72 B 105

Captain Phillips Paul Greengrass 14.99 Free 134

Saving Mr Banks John Lee Hancock 15.00 C 125

(a) Each of the following fields contains data that is numeric. Give a more precise data type for
each of these fields.

Price .........................................................................................................................................

Length .......................................................................................................................................
[2]

(b) Blu-ray discs have one of three region codes or are region-free.

Describe how the field Regions could be set up to reduce the possibility of inaccurate data
entry.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 0417/12/O/N/15 [Turn over


10

(c) Describe, in detail, how you would create a formatted report which does not show regions
and only shows films which are longer than 110 minutes.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

13 (a) Tick three components of an expert system.

Word processor

Spreadsheet

Rules base

Search engine

Inference engine

Control software

Knowledge base

Presentation software
[3]

(b) Give three examples of applications which use expert systems other than diagnosis systems.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


11

14 A large company has asked a systems analyst to research the current system.

(a) Describe how this will take place.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe what information will be identified as a result of this research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

15 There are many safety issues associated with the use of computers.

Describe three of these issues.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15 [Turn over


12

16 Ajit has been set homework by her Geography teacher. She has the choice of using her text book
or the internet to find the necessary information.

Discuss the advantages and disadvantages to Ajit using the text book rather than the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[7]

17 Give three reasons why some companies have intranets.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


13

18 Give three reasons why files are backed up.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

19 Give three specific examples of work that are carried out by a robot in the car industry.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


14

BLANK PAGE

© UCLES 2015 0417/12/O/N/15


15

BLANK PAGE

© UCLES 2015 0417/12/O/N/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 0417/12/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the October/November 2015 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/12 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

1 Flip
Crop
Resize
Use of word/text wrap
Change of font type/face
Change of font size [6]

2
Modelling Database Word Processing
Use
  

Writing a letter  [1]

Flight simulation  [1]

Storing student records in a school  [1]

Producing a business card  [1]

3
Mainframe Laptop Desktop
Use
  

Entering data from a Biology survey while [1]



out of school

Massive transactions which need the use of


 [1]
many CPUs

Students who need to transport their [1]



computer from home to use in school

Personal use with better performance at [1]



lower cost

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

4
Parallel Pilot Direct
Company running running changeover
  
[1]
A company with several branches wishes to

test a new system in one branch only.

A small company that can only afford to [1]


spend a small amount of money on 
implementing the new system.
[1]
If the whole system fails, the company wishes

to return to the original existing system.
[1]
A company that wants the quickest method of

implementation.

5 (a) The inbuilt device which moves the cursor when using a laptop is called
a touch pad [1]

(b) The device used for selecting an icon so a bar code label can be
printed in a supermarket is called a touch screen [1]

(c) The device used for controlling a pointer on a screen when the user
has limited motor skills is called a trackerball [1]

6 Three matched pairs from:

FORWARD n/BACKWARD n
Move n units forward/Move n units backward

RIGHT t/LEFT t
Turn right t degrees/Turn left t degrees

REPEAT n
Repeat the following instructions n times

END REPEAT
Finish the REPEAT loop [6]

7 (a) Three from:

Temperature sensor
Light sensor
pH sensor
O2 sensor
CO2 sensor [3]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

(b) Two from:

Need to know values in unpolluted part of river


Need to know values in polluted part of river
Need to place sensors in river above factory
Need to place sensors in river below factory [2]

(c) Five from:

The sensors feed back/send data to microprocessor/computer


Data is converted from Analogue to Digital/sent through an ADC
Readings from above the factory are compared with those from below factory…
...by the computer/microprocessor
Differences/results are printed out
Graphs are automatically produced by computer showing values from below and above
factory…
...plotted against time
Process is continuous [5]

8 (a) Three from:

To save printing costs of reports


To ensure test results, etc. are received by parents
To allow immediate feedback to parents after tests/exams
To keep parents up to date with child’s progress/targets [3]

(b) User id – in order to identify the user to the system/in order for system to assign privileges [1]

Password – in order to allow access to the system if it matches user name [1]

9 Four from:
Access to the internet
Email address
Router to connect to the internet
Domain name to have own website
Email security software
Web space to create own website
Storage space to save data in the cloud
DNS service to convert URLs to IP addresses
Firewall to block unauthorised traffic [4]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

10 (a) C5 [1]

(b) 8 [1]

(c) =b2*c2 [1]

(d) =sum(d2:d6)
Sum() [1]
D2:D6 [1]

(e) Three from:

Easier to modify/change data/variables


Costs less to change data/variables
The real thing may be impossible to create
You can test predictions more easily/model can make predictions more accurately
You can ask many what if questions which would be impractical in real life
Results are obtained more quickly [3]

11 Three from:

To cause data to be scrambled/encoded


Protects sensitive data…
…from being understood if it falls in to the wrong hands
Only user/computer with key can understand data [3]

12 (a) Price – currency/fixed point decimal [1]


Length – integer [1]

(b) Two from:

Set it up as a text field


With drop-down menu/lookup table…
…containing A, B, C and Free

OR

Create/Set up a validation rule


Set parameters to A OR B OR C OR Free [2]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

(c) Six from:

Create a query using data in table


Select fields to be printed…
…select Film_name, Director, Price ($) and Length (min)
Set up query design
Length (min) > 110
Save the query
Create report using this query
Insert header/footer
Select appropriate font/font size for heading
Select appropriate font/font size for field names
Select appropriate font/font size for field contents [6]

13 (a)
Word processor

Spreadsheet

Rules base 

Search engine

Inference engine 

Control software

Knowledge base 

Presentation software
[3]

(b) Three from:

Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [3]

14 (a) Four from:

Users of the current system will be interviewed


Users of the current system will be asked to complete questionnaires
Users of the current system will be observed using the system
Existing documents will be examined
Management will be interviewed
Management will be asked to complete questionnaires [4]

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

(b) Four from:

Inputs of the current system


Outputs from the current system
Processing in the current system
Problems/limitations with the existing system/improvements required
The user requirements
The information requirements [4]

15 Three from:

Electrocution by touching loose/bare wires/spilling liquids on electrical contacts


Tripping and falling over trailing wires or cables
Physical injury to feet/legs, etc. caused by heavy equipment falling
Fire caused by too many plugs in multisocket and thereby overheating/overheating of
equipment [3]

16 Seven from:

Advantages
No danger of accessing inappropriate information
Relevant information can be found quite quickly
Don’t have to worry about having to have internet connectivity/computer/phone line/modem
Book will be less biased/more reliable as teacher has recommended it
Index makes searching more efficient

Disadvantages
Book has limited amounts of information
Can be slower to find relevant information than using a search engine
Books can go out of date quickly/difficult to update a book
Books don’t have multimedia to help explain information
Easier to detect plagiarism

A mark is available for a reasoned conclusion [7]

17 Three from:

It is possible to prevent employees accessing undesirable websites


They can ensure that available information is specific to their needs
It is easier to make sure confidential messages stay within the company
There is less chance of company computers being hacked [3]

18 Three from:

In case original data is accidentally deleted


In case data is maliciously deleted
In case original data is corrupted
To recover a previous version of a file [3]

© Cambridge International Examinations 2015


Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 12

19 Three from:

Putting wheels on cars


Painting car bodies
Welding parts on a car body
Carrying car windscreens/doors
Moving goods in an automatic warehouse
Placing engine block into body
Installing transmission system [3]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 9 9 8 2 2 2 3 4 2 0 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 October/November 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

DC (LK) 101049/3
© UCLES 2015 [Turn over
2

1 Many word processing packages have a number of formatting features.

Write down six of these features which have been used in the following passage.

The boiling point of water, H2O, at normal atmospheric pressure is 100° C. The two
elements which make up water are Hydrogen and Oxygen. Water covers seventy percent of
the surface of the earth. In different parts of the world, water can be found in liquid, solid, and
gaseous forms. In its liquid form it is tasteless and odourless and more or less colourless. Many
substances dissolve in water and because of this it is commonly referred to as the universal
solvent.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................

4 .......................................................................................................................................................

5 .......................................................................................................................................................

6 .......................................................................................................................................................
[6]

2 Tick the most appropriate method of inputting data for the following uses.

Web cam Keyboard Scanner


Use
  
Applications where text has to be created rather than
copied

Inputting hard copy documents directly into a computer

Inputting moving pictures from a fixed position into a


computer

Entering text directly into a word processing document

[4]

© UCLES 2015 0417/13/O/N/15


3

3 Explain what is meant by the following terms, giving examples of their use.

MICR ................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

OMR ..................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

4 When creating a database, it is important to assign the correct data type to each field.

Tick the most appropriate data type for each of the following items of data.

Text
Numeric Date
(alphanumeric)
 

A student’s name

How many times a student has been late to a lesson

The amount of money it costs to travel to school

When the end of term is

[4]

5 Complete each sentence using the most appropriate words from the following list.

a word processor a control program a spreadsheet

an inference engine a web authoring package a search engine

a measuring program a DTP package

(a) The software used to find information on the internet is ............................................................


[1]

(b) The software which is a component of an expert system is .....................................................


[1]

(c) The type of software used to create financial models is ...........................................................


[1]

© UCLES 2015 0417/13/O/N/15 [Turn over


4

6 Explain, using examples, what is meant by authentication techniques.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

7 Give three reasons why it would not be sensible to use batch processing in an online theatre
booking system.

1 ........................................................................................................................................................

..........................................................................................................................................................

2 ........................................................................................................................................................

..........................................................................................................................................................

3 ........................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/13/O/N/15


5

8 A floor turtle can use a number of instructions.

For each of the following instructions give the correct meaning.

FORWARD n .....................................................................................................................................

..........................................................................................................................................................

REPEAT n .........................................................................................................................................

..........................................................................................................................................................

LEFT t ...............................................................................................................................................

..........................................................................................................................................................

RIGHT t .............................................................................................................................................

..........................................................................................................................................................

PENUP ..............................................................................................................................................

..........................................................................................................................................................

PENDOWN .......................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2015 0417/13/O/N/15 [Turn over


6

9 A chemistry student wants to measure how quickly a liquid cools after it has boiled. She will use a
sensor connected to a computer to do this.

(a) Identify two variables which will need to be recorded.

1 .................................................................................................................................................

2 .................................................................................................................................................
[2]

(b) Describe how the computer would process the data into a form the student could use to
analyse the results.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[5]

10 Describe the differences in use between WiFi and Bluetooth.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 0417/13/O/N/15


7

11 Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

12 Most supermarkets now operate online shopping.

Discuss the advantages and disadvantages to supermarkets of this development.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 0417/13/O/N/15 [Turn over


8

13 A company is going to introduce a new computer system.


The company employs drivers to deliver orders and they are rarely in the office for more than a few
minutes. The office secretaries process the orders and dislike being interrupted. A manager is in
charge of the current system and appointments can be made to see her.

(a) Name three methods of researching the current system other than from examining documents.

Identify the workers that each method would be most suitable for. Each method will be used
with a different type of worker.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) After the current system has been researched, the new system will be designed. This means
that the file structure will be designed.

Identify three items of a flat file structure which will form part of this activity.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2015 0417/13/O/N/15


9

14 A student types in the formula =IF(A1>12,"strong",IF(A1>6,"medium","weak")) into a spreadsheet.

(a) Explain, using the terms ‘condition’, ‘true’, ‘false’, how this nested IF function works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Another student wishes to reverse the formula to get the same result.
She types in the formula IF(A1<6,"weak",IF(A1<12,"medium","strong)

Identify four errors she has made.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/13/O/N/15 [Turn over


10

(c) Financial models and scientific experiments are examples of different types of modelling
applications.

Give three other examples of types of modelling.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

15 Students at a school visit a variety of websites on the internet to get information about a topic.

(a) Describe four features of a website that will prove that the information found on it is reliable.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(b) Describe three other features of a website that may indicate that the information found on it is
not likely to be reliable.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2015 0417/13/O/N/15


11

(c) In order to make reliable information available to all students, schools often put the information
on their intranet.

Describe what is meant by an intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

16 Give four benefits of using social networking sites.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 0417/13/O/N/15 [Turn over


12

17 There are many health issues associated with the use of computers.

Name three of these health issues and for each one describe, in detail, a different cause.

Health issue 1 ..................................................................................................................................

Cause ...............................................................................................................................................

..........................................................................................................................................................

Health issue 2 ..................................................................................................................................

Cause ...............................................................................................................................................

..........................................................................................................................................................

Health issue 3 ..................................................................................................................................

Cause ...............................................................................................................................................

..........................................................................................................................................................
[6]

18 Tick three features of wikis.

A wiki is an example of a spreadsheet.

A wiki is quicker to search than a database.

Wiki entries are in chronological order.

A wiki can have several contributors.

Wikis are always a reliable source of information.

Wikis can be edited using a web browser.

Anybody can create a wiki.

Wikis never contain hyperlinks.


[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 0417/13/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International General Certificate of Secondary Education

MARK SCHEME for the October/November 2015 series

0417 INFORMATION AND COMMUNICATION


TECHNOLOGY
0417/13 Paper 1 (Written), maximum raw mark 100

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 13

1 Six from:
Indent
Bold
Subscript
Superscript
Underline
Text highlight
Italic
Fully justified
Border [6]

2
Web cam Keyboard Scanner
Use
  

Applications where text has to be created


 [1]
rather than copied

Inputting hard copy documents directly into a


 [1]
computer

Inputting moving pictures from a fixed


 [1]
position into a computer

Entering text into a word processing


 [1]
document

3 MICR –
Magnetic Ink Character Recognition/Reader [1]
Used for processing bank cheques/Reads the characters at the bottom of bank cheques [1]
OMR –
Optical Mark Recognition/Reader/position of pencil/pen marks are read by scanner/Reader [1]
Used for processing exam papers/school registers/lottery/multiple choice questionnaires/positions
of marks identified on exam papers/school registers/lottery/multiple choice questionnaires [1]

4
Text
Numeric Date
(alphanumeric)
 


A student’s name  [1]

How many times a student has been late to


 [1]
a lesson

The amount of money it costs to travel to


 [1]
school

When the end of term is  [1]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 13

5 (a) The software used to find information on the internet is a search engine [1]

(b) The software which is a component of an expert system is an inference engine [1]

(c) The type of software used to create financial models is a spreadsheet [1]

6 Three from:

Is a means of identifying yourself to a system


Something you know such as PIN/password
Something belonging to you such as a bank card
Something unique about you such as a biometric feature [3]

7 Three from:

It might lead to double booking


Customer would not be sure booking has been successful
Would take a long time to receive confirmation/ticket
Processing would take a long time which would cost company money [3]

8 Move n units forward [1]

Repeat the following instructions n times [1]

Turn left t degrees [1]

Turn right t degrees [1]

Lift the pen [1]

Lower the pen [1]

9 (a) Temperature [1]


Time [1]

(b) Five from:

The sensor feeds back data to computer


Data is converted from Analogue to Digital
Readings are stored in a spreadsheet/software package
Graphs are automatically produced by computer…
...plotted against time
Calculations performed on spreadsheet to show rate of cooling
Graphs examined to see general overview of rate of cooling [5]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 13

10 Four from:

WiFi technology enables local area network…


… and Internet connections
Using WiFi, a laptop or desktop computer can connect to a network's wireless router
Bluetooth connects two devices together
Usually Bluetooth peripherals are powered by batteries that need to be charged or replaced
WiFi covers a larger distance than Bluetooth
WiFi requires more than ten times more bandwidth than Bluetooth [4]

11 Six from:

Optical discs such as CDs DVDs and Blu-ray discs…


…are read from and written to using a laser beam
Magnetic disks are read from and written to using read/write heads
Optical discs are more portable
Magnetic disks are more likely to spike
Optical discs are cheaper to buy
Magnetic disks store more data
Optical discs have slower access times
Optical discs have slower transfer rates
Optical discs can be more easily lost/stolen
Optical discs can be more easily scratched
Both store videos, music
Both use direct access [6]

12 Six from:

Initial cost of hardware/software is expensive


Fewer staff needed – less spent on wages
Fewer shops needed – less spent on rates/rent/utilities
Potentially larger customer base
Need to retrain staff
Less customer loyalty/loss of customers/more difficult to sell other services/products due to lack
of personal touch
Costs of system maintenance
Greater costs due to more delivery staff/vans [6]

13 (a) Three matched pairs:

Interview
Manager

Questionnaire
Drivers

Observation
Secretaries [6]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 13

(b) Three from:

Data type for each field


Appropriate field names
Validation rules
Field lengths
Field descriptions [3]

14 (a) Four from:

Tests to see whether the condition A1>12 is true or false


If the condition A1>12 is true the function will return “strong”
If the condition A1>12 is false, the function will test if A1>6 is true or false
If the condition A1>6 is true the function will return “medium”
If the condition A1>6 is false the function will return “weak” [4]

(b) Should be A1<=6 [1]


Should be A1<=12 [1]
Should be “strong” (second speech mark missing) [1]
Should be two right-hand brackets [1]

(c) Three from:

Simulations
Mathematical models
Civil engineering models
Flight/pilot simulation/training
Design of fairground rides
Traffic control
Building fire simulation
Weather forecast models
Population modelling [3]

15 (a) Four from:

Can use the final part of a URL to identify reliability


.ac, .gov, .org are usually fairly reliable
If information matches that from reliable sites or reliable/authenticated text books
If responsible bodies have endorsed the site information will be reliable
If it has links to other reliable sites then information will be reliable
If site has testimonials it is likely to be reliable
If the author’s credentials are good it is likely to be reliable [4]

(b) Three from:

If site has excessive advertising it could be unreliable


If the advertising is related only to its own products it could be unreliable
If the date of the last update was a long time ago it is likely to be unreliable
If it has links to other unreliable sites it could be unreliable [3]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2015 0417 13

(c) Four from:

An intranet is a computer network


Exists usually within one organisation/school
Meets the internal needs of an organisation/school
Can be expanded to become an extranet
Intranet is private
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more relevant to the students’ needs [4]

16 Four from:

Easy to keep in immediate contact with friends/make new friends


Easy to communicate to more than one friend/to communicate with people overseas
Can search for people who you’ve fallen out of touch with
Easy to arrange meetings/visits to cinemas/theatre
Can share photographs/videos/images/opinions/views [4]

17 Three matched pairs from:

Headaches/eyestrain
From staring at screen continuously

RSI in fingers
From continual typing/repetitive clicking of mouse

RSI in wrists
From repetitive clicking of mouse/continual typing

Backache
From sitting in same position all day [6]

18


A wiki is an example of a spreadsheet.

A wiki is quicker to search than a database.

Wiki entries are in chronological order.

A wiki can have several contributors.  [1]

Wikis are always a reliable source of information.

Wikis can be edited using a web browser.  [1]

Anybody can create a wiki.  [1]

Wikis never contain hyperlinks.

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written May/June 2016
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 9 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

1 (a) Touchpad [1]

(b) Joystick/trackerball [1]

(c) Keyboard [1]

(d) scanner [1]

2
TRUE FALSE
() ()

A mouse is an output device 

The Control Unit is part of the Central Processing Unit 

The Arithmetic and Logic Unit is part of the Central 


Processing Unit

A temperature sensor is an input device 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

3
Internet Intranet
() ()

A public computer network 

It is easier to protect sensitive data from hackers 

The content is more easily controlled 

Exists within a single organisation only 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

4 (a) a (computer) virus [1]

(b) encryption [1]

(c) https/SSL/TLS [1]

(d) a digital certificate [1]

5 Four from:

Use a spam filter/anti-spam software


Do not reply to spam/suspicious messages
Do not click on any links/attachments in a spam/suspicious message
Use a disposable email address
Use a complex email user name
Do not give out your email address online/do not register using email on untrusted websites/opt
out of marketing
Read messages as text
Do not use your email address as an online username
Changing to an email provider who filter spam [4]

6 (a) A WLAN [1]

(b) (i) A (Wireless) Access Point/wireless node [1]

(ii) It is connected to a switch/hub [1]

(c) Can get interference from another radio signal/speed of data transmission can be slower
Other valid answers like physical obstacles/walls [1]

7 (a) Two from:

Voice over Internet Protocol


A set of rules that enable people to use the Internet to make telephone calls/talk each other
Sends voice data in packets using IP [2]

(b) Two from:

Microphone
Speakers/headphones
Headset [2]

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

8 Two from:

Can lead to unhealthy eating due to dependency on ready meals


Can lead to laziness
Lack of fitness/exercise
Manual household skills are lost [2]

9 (a) Four from:

The bank account details are read from the chip


The (ATM) checks to see if the card is valid
The customer is asked which language/currency they require
The customer is asked to type in their PIN
The typed PIN number is compared with that stored in the chip…
…if they are the same the transaction proceeds
…if they are not the same the customer is asked to re-enter PIN
If three failed attempts transaction rejected and card withheld
The customer is asked which service is required
Customer is asked if they want a printed balance/onscreen balance
If yes, signal sent to print balance/message sent to screen giving balance
The customer is asked if further services are required [4]

(b) Three from:

Checks whether card is stolen/account number exists


Customer account number is searched
Balance field is read/is calculated
Message sent to ATM giving balance [3]

10 (a) (i) Account number [1]


Bank/branch sort code [1]
Cheque number [1]

(ii) Three from:

Requires a special Magnetic Ink Character reader/scanner/Details are scanned


The magnetic ink on the cheque passes over a magnet in the reader/scanner which
charges/magnetises the ink
The MICR reader/scanner then reads the magnetic signal given out by the magnetic ink
characters on the cheque.
Each character produces a unique signal which is read and translated by the MIC reader
[3]

(b) Two from:

More difficult to forge


Even if overwritten/damaged can still be read by computer
Information is human readable [2]

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

11 Three matched triples from:

Direct changeover [1]


New system replaces existing system immediately/overnight [1]
A small organisation which can afford to lose data/where system needs to be up and running
very quickly/where the new system has been thoroughly tested [1]

Parallel running [1]


New system runs alongside/together with existing system [1]
An organisation with large amounts of data which would take too long to re-enter / cannot
afford to lose data/where time taken/cost to implement is not an issue/where the new system
needs to be thoroughly tested [1]

Phased implementation [1]


New system is implemented part by part [1]
An organisation where there are clearly defined separate processes/where the new system
needs to be thoroughly tested [1]

Pilot running [1]


(Whole) system is implemented in one branch/one office (at a time) [1]
An organisation where there are several branches all doing the same work)/where the new
system needs to be thoroughly tested [1]

[9 max]

12 (a)
Field name Data type

Name Text/alphanumeric [1]

Studentid Text/alphanumeric [1],[1]

Gender Boolean [1]

Height Integer [1]

Staying on/Leaving Boolean/Logical [1],[1]

(b) Two matched pairs:

Gender
M for male, F for female

Staying on to 6th form /Leaving


S/6 for Staying on to 6th form, L for Leaving [4]

(c) Studentid… – 1 mark


…Ascending – 1 mark [2]

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

13 FTP
File Transfer Protocol/is used to transfer files from one computer to another (1 mark)

Differences
Three from:
HTTP is used to access the world wide web/web sites
FTP is used to download from file servers whereas http is used to download from web servers
FTP – files are transferred from one device to another and copied into memory
HTTP transfers the contents of a web page into a browser for viewing.
FTP upload is used in cases when the file size is very large
HTTP upload is used for smaller files. [4]

14 (a) Three from:

Looks through the (contents of cells) H4 to H24


See if they are equal to (the contents of cell) B4/’AF’
It totals the contents of the corresponding cells from I4 to I24
Produces the result 65 [3]

(b) =SUMIF($H$4:$H$24,B8,$I$4:$I$24)

= SUMIF($H$4:$H$24, – 1 mark
B8, – 1 mark
$I$4:$I$24) – 1 mark [3]

(c) =COUNT(I4:I24)

COUNT – 1 mark
(I4:I24) – 1 mark

OR

=COUNTA(I4:I24)
COUNTA – 1 mark
(I4:I24) – 1 mark [2]

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

15 Six from:

avoid using information from sites that have excessive advertising


avoid using sites where the information from sites where advertising is related only to its own
products…
avoid sites where the date of the last update was a long time ago…
avoid using wikis/sites which the user can edit
avoid using blogs/sites which are clearly the owner’s point of view/social networking sites
Avoid using sites which have grammatical/spelling mistakes
Don’t just rely on using first website you come to in the results of using a search engine

use information from sites where responsible bodies have endorsed the site/sites which have
links to other reliable sites/sites which have testimonials
use sites where the author’s credentials are good
use sites which have .ac… , .gov, .edu as the final part of the URL/only use
government/academic sites
Compare information from different sites/ reliable/authenticated text books to see if the results are
similar
Ask teachers for advice on a site

In order to obtain full marks candidates must have at least one mention of things they should do
and things they should avoid doing [6]

16 (a) .txt

Two from:
Text file with very little/no formatting/used by a variety of text editors
Can be opened by any software package that reads text/generic text format
Any formatting is lost when saved [2]

(b) .gif

Two from:
Graphic interchange format
Bitmap graphic format/GIF files use data compression to reduce the file size
Image format that will allow still or moving images to be stored [2]

(c) .pdf

Two from:
Portable document format
Makes it possible to display text and graphics in the same fixed layout on any computer
screen
Reduces file size of read only document for transmission [2]

© Cambridge International Examinations 2016


Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

17 Five from:

In h1 colour should be color


In h1 sans serif should be sans-serif
In h1 18 px should be 18px (no space)
In h2 color: 000000 should be color: #000000/color: #000
In h2 Times New Roman should be “Times New Roman”/’Times New Roman’
In h2 centre should be center [5]

18 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will describe in detail at least two types of user interface
Detailed reasons why a keyboard is used with CLI systems will be given
Detailed reasons why pointing devices are used with GUI systems
Detailed reasons why different input devices relating to other different types of user interface are
used may be given
Descriptions of different types of pointing device
The information will be relevant, clear, organised and presented in a structured and coherent
format
Specialist terms will be used correctly and appropriately

Level 2 (4–6 marks)


Candidates will describe at least two types of user interface
Reasons why a keyboard is used with CLI systems will be given
Reasons why pointing devices are used with GUI systems
Reasons why different input devices relating to different types of user interface are used may be
given
Different types of pointing device will be listed
For the most part, the information will be relevant and presented in a structured and coherent
format
Examples will be given and will be mostly appropriate
Specialist terms will be used appropriately and for the most part correctly

Level 1 (1–3 marks)


Candidates will identify at least one user interface
Input devices may be in the form of a list
There will be little or no use of specialist terms
Errors of grammar, punctuation and spelling may be intrusive

Level 0 (0 marks)
Response with no valid content

Examples

Command Line Interface


With a CLI Instructions must be typed to get a computer to carry out an action
keyboard is used to type
Typing is key component of CLI
With CLI syntax has to be precise
Devices other than a keyboard would be less accurate when entering text

© Cambridge International Examinations 2016


Page 9 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 12

Graphical User Interface


With a GUI you just click on an icon
With a GUI icons represent applications
Separate windows are used for different pieces of work/software
With a GUI menus are offered to help choose an action
Moving a mouse enables users to manoeuvre a pointer around a screen
A mouse can be used to drag windows/icons around a screen
People with physical disabilities can use a trackerball to manoeuvre the pointer around a screen
Pointing devices are easier to control a pointer/menu selection/icon clicking
Joysticks can be used to mimic the behaviour of a mouse
Buttons on the mouse enable users to select icons
Buttons on a mouse enable users to see menus on a screen
Touchscreen can be used to directly select options from a screen [8]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2016
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

1 (a) Keyboard [1]

(b) Mouse [1]

(c) Temperature sensor [1]

(d) Joystick [1]

2
Email Fax
() ()
Transmission of messages is relatively slow 
When received can be edited using a word processor 
Can have attached sound files 
The message is basically an image 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

3
TRUE FALSE
() ()
WLAN stands for Wide Local Area Network 
A WAN often requires the use of a router 
The internet is a WAN 
A LAN usually covers a smaller area than a WAN 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

4 (a) Normal data [1]

(b) Abnormal data [1]

(c) Extreme data [1]

(d) Live data [1]

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

5 Four from:

Air flight tickets


Theatre tickets
Holiday booking
Cinema tickets
Rail tickets
Hotel room booking
Restaurant table/seat booking
Football match booking
Concert/performance booking [4]

6 Four from:

Microprocessor controlled devices do much of the housework


Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can encourage a healthy lifestyle because of smart fridges analysing food constituents
Do not have to leave home to get fit [4]

7 (a) As well as the recipient this sends a copy of the email to the email addresses listed after
cc [1]

(b) bcc is the same as cc except that the recipient is unaware that copies have been sent [1]

(c) This sends a message that has been received to another email address [1]

(d) This is a group of email addresses that are given a group name so that the sender only
needs to type in one name to send an email to several recipients at once [1]

(e) A file that is sent attached to/with the email [1]

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

8 (a) Three from:

The books database is searched to find the accession number


The fingerprint scan is converted into digital data patterns
The computer then maps points on the fingerprints and uses those points…
…to search for similar patterns in the (borrower) database.
Matching record is found
The membership number is retrieved
Record is checked to see if number of books allowed is not exceeded/are fines due?
The membership number is written to the file against the accession number in the books
database
The accession number is written against membership number in the borrower file. [3]

(b) Two from:

Accession number is compared with those on book file


Matching record is found
Record is flagged as returned/changed to returned
The accession number is deleted against membership number in the borrower file/borrower
is recorded as having borrowed one less book
Computer calculates if book has been returned overdue [2]

9 (a) Two from:

Sort code
Account/bank card number
3 digits from password/passcode
Memorable date/mother’s maiden name/favourite place/answer to security question/place
born
Date of birth [2]

(b) Three from:

Transfer money to a different account


Pay bills
Amend/create standing orders/direct debits
Order a new PIN
Stop a cheque
Can ask about recent/pending transactions
Can apply for a loan
Can check account balances
Can transfer funds between accounts
Can amend personal details [3]

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

10 (a) Two from:

Student id number/prompts for student number


date of birth
student name
Instructions on how to complete the form
Question numbers
Centre number
Centre name [2]

(b) Three from:

Dedicated scanner device shines a beam of light onto the form


Light is reflected back to sensors
Marks reflect less light so sensors used to identify position of marks
Computer compares these with correct answer positions [3]

(c) Three from:

If the marks don't fill the space completely they may not be read correctly/overfill the
space/smudged
If the marks are not in a dark enough pencil they may not be read correctly
If more than one lozenge shaded in result is invalidated
Only suitable for recording one out of a selection of answers, not suitable for text input
Have to use prepared forms which may be expensive
Examinations could consist of mainly multiple-choice questions changing the nature of what
is being tested [3]

11 (a) Two from:

Use a check digit


Single digit calculated from other digits appended to these,
Computer carries out fresh calculation on digits and compares answer with original check
digit. [2]

(b) Limit check/range check – 1 mark


Reorder_level <=100 – 1 mark
He probably omitted/forgot the = sign – 1 mark [3]

(c) Use a format check – 1 mark


Supplier_code should be 2 letters followed by 3 digits – 1 mark [2]

(d) Barcode – text/alphanumeric [1]


Supplier_code – text/alphanumeric [1]
Contents – text/alphanumeric [1]
Price – (number), currency [1]
Reorder_level – (number), integer [1]
Weight – (number), decimal [1]

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

12 (a) =Countif(B$2:B$23,D5)

Countif – 1 mark
(B2: – 1 mark
B23, – 1 mark
Absolute referencing – 1 mark
D5) – 1 mark [5]

(b) A24 – 1 mark


B24 – 1 mark
D15 – 1 mark [3]

13 Internet Service Provider/provides Internet access – 1 mark

Two from:

Often offers web space to create own website


Provides email address
Router to connect to the internet
Domain name to have own website
Storage space to save data in the cloud
DNS service to convert URLs to IP addresses [3]

14 Six from:

Internet is not policed so information is not necessarily reliable


Anybody can have a website so information is not necessarily reliable
Anybody can publish their understanding of a topic so information is not necessarily reliable
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
The final part of a URL can help to identify reliability…
… .ac…, .gov, .org government/academic sites are usually fairly reliable
If site is endorsed by reliable/reputable people/organisations it can be accepted as being
reliable/If it has links to other reliable sites/ sites which have testimonials it is usually reliable/If it
has testimonials it is likely to be reliable
If the author’s credentials are good it is likely to be reliable
If information is comparable to information from reliable/authenticated text books it is likely to be
reliable
If the date of the last update was a long time ago it is likely to be unreliable
Sites which have grammatical/spelling mistakes are likely to be unreliable
Compare information from different sites/text books to see if the results are similar
If it has been recommended by teachers it is likely to be reliable [6]

15 (a) Jpeg –

Joint photographics experts group – 1 mark


Commonly used for lossy compression for digital images/Used for complex
images/photographs/used for saving storage space/used for increasing transmission
speed/reduced download time (particularly with web pages) – 1 mark [2]

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

(b) Png

Portable network graphics/raster graphics file format – 1 mark


Uses lossless data compression/Used for transferring logos or images with no colour
gradient – 1 mark [2]

16 The shape has been filled with black/dark colour – 1 mark


It’s height has been increased whilst leaving the width as the original – 1 mark
It has been rotated through 180°/reflected about the base – 1 mark [3]

17 Six from:

Missing </a> on fourth line


Missing </td> on fourth line
Missing a in <href> on sixth line
. instead of : after mailto
, instead of ? in front of subject
Extra > in subject line of email
<a> instead of </a> on eighth line [6]

18 Six from:

Make images more mature


Make font type more appropriate
Plain background
Insert a heading
Make language more appropriate
Include slide numbers
Consistency of display through use of master slide
Images not overlapping with the text [6]

© Cambridge International Examinations 2016


Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – May/June 2016 0417 13

19 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will address both aspects of the question and discuss/consider different
advantages/disadvantages.
The issues raised will be justified. There will be a reasoned conclusion.
The information will be relevant, clear, organised and presented in a structured and coherent
format.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will address both aspects of the question and
discuss/consider different advantages/disadvantages although development of some of the points
will be limited to one side of the argument.
There may be a conclusion.
For the most part, the information will be relevant and presented in a structured and coherent
format.
Examples will be given and will be mostly appropriate.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only address one side of the argument, and give
basic advantages or disadvantages.
Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content

Examples

Filters are easier to create using database software…


…such as names of students matching a criterion…
…e.g. passing an exam/born in a certain year
Queries can be saved using database software…
...for ease of use with updated data such as new students attending school
Calculated fields can be difficult to create using database software…
…such as calculating ages from date of birth
Easier to create complex formulae in spreadsheets…
…such as nested ifs for determining if a student has passed a number of modules in a course
Can use more functions in spreadsheets…
…such as countif to count the number of students passing an exam
Charts are easier to produce using spreadsheet software…
…to show progress of students
Repeated data can be easier to enter using spreadsheet software
Fields easier to name and query using database software
Spreadsheets are easier to use to model different scenarios…
…such as number of students passing an exam
Can only create a relational database using database software
Allow justified examples of use of database or spreadsheet software [8]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*9659398909*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2016
2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

06_0417_12_2016_1.19
© UCLES 2016 [Turn over
2

1 Write down the most appropriate input device which matches the following descriptions:

(a) This is provided with a laptop to imitate the functions of a mouse.

........................................................................................................................................... [1]

(b) This is not a mouse but is used to manoeuvre objects around the screen in computer video
games.

........................................................................................................................................... [1]

(c) This is used to type in text.

........................................................................................................................................... [1]

(d) This is used for direct input of hard copy images.

........................................................................................................................................... [1]

2 Tick whether the following statements are true or false.

true false
(✓) (✓)

A microphone is an output device.

The Control Unit is part of the Central Processing Unit.

The Arithmetic and Logic Unit is part of the Central Processing Unit.

A temperature sensor is an input device.

[2]

3 Tick whether the following statements would most appropriately apply to the internet or an intranet.

internet intranet
(✓) (✓)

A public computer network.

Is easier to protect sensitive data from hackers.

The content is more easily controlled.

Exists within a single organisation only.

[2]

© UCLES 2016 06_0417_12_2016_1.19


3

4 Complete the following sentences.

(a) A piece of programming code which maliciously deletes files is called

........................................................................................................................................... [1]

(b) The scrambling of data to make it unreadable by unauthorised users is called

........................................................................................................................................... [1]

(c) An internet protocol for delivering private messages using cryptography is called

........................................................................................................................................... [1]

(d) An attachment to an electronic message used to verify the identity of the sender is called

........................................................................................................................................... [1]

5 Describe four methods you could use to minimise the likelihood of receiving spam emails.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


4

6 A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.

(a) Write down the name of this type of network.

........................................................................................................................................... [1]

(b) In order to access the network the laptop must be within range of a type of WiFi network device.

(i) Write down the name of this type of device.

................................................................................................................................ [1]

(ii) Describe how this device is connected to the network using an ethernet cable.

................................................................................................................................

................................................................................................................................ [1]

(c) WiFi networks can be limited in their range.

Describe one other disadvantage of a WiFi network compared to a cabled network.

...........................................................................................................................................

........................................................................................................................................... [1]

7 (a) Explain what is meant by VOIP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2016 06_0417_12_2016_1.19


5

8 There are many microprocessor controlled devices used in the modern home.

Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

9 A customer wishes to check the balance of their bank account and inserts their card into the ATM.

(a) Describe the computer processing which takes place at the ATM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe the computer processing which takes place at the bank’s computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


6

10 When a bank cheque is presented to a bank it is sent off to a cheque clearing centre.

(a) (i) Give three items of information that are pre-printed on the cheque in magnetic ink.

1 .............................................................................................................................

................................................................................................................................

2 .............................................................................................................................

................................................................................................................................

3 .............................................................................................................................

................................................................................................................................

[3]

(ii) Describe how MICR is used to read these details from the cheque.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

(b) Explain why magnetic ink is used rather than bar codes on a cheque.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


7

11 Name and describe three methods of implementing a new computer system. For each one describe
the type of situation where each method might be used.

1 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

[9]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


8

12 Maria is the principal of the International Municipal school. She has employed Paulo, a systems
analyst, to create a new database system to store records of her final year IGCSE students.

Examples of the details of the students which will be stored are:

Velia Grimaldi, A3058, Female, 161, Leaving

Giuseppe Campo, A3072 , Male, 177, Staying on to 6th form

Nicola Donati, B3085, Female, 173, Staying on to 6th form

Giovanni Agnelli, C3102, Male, 172, Leaving

(a) Complete the following table by entering the field names and most appropriate data type for
each field.

For any numeric field, specify the type of number.

Field name Data type

Name

Boolean

Height

[7]

(b) Paulo wishes to save storage space. He does not change the Name field, but decides that two
other fields could have their data shortened.

Apart from the Name field, identify the two other fields and describe how the contents will be
shortened.

Field 1................................................................................................................................

Shortened form 1...............................................................................................................

Field 2................................................................................................................................

Shortened form 2...............................................................................................................

[4]

© UCLES 2016 06_0417_12_2016_1.19


9

(c) There is no key field set. Maria’s secretary typed in the data to the database in this order:

Giuseppe Campo, A3072, Male, 177, Staying on to 6th form

Giovanni Agnelli, C3102, Male, 172, Leaving

Nicola Donati, B3085, Female, 173, Staying on to 6th form

Velia Grimaldi, A3058, Female, 161, Leaving

Maria can get the database back in to the original order by sorting the data using one field.

Write down the name of this field and the order in which it will need to be sorted.

Field...................................................................................................................................

Order.................................................................................................................................

[2]

13 FTP is an internet protocol.

Explain what is meant by FTP and how it differs from HTTP.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


10

14 Below is a spreadsheet showing contributions to a charity from different regions.

A B C D E F G H I

1 The Manta Conservaon Project


2 Regional analysis
3 Region RCode Currency Regional income Date Rcode Amount
4 Africa AF Rand ZAR 65.00 20/01/2016 AF 15.00
5 Asia AS Yuan ¥3,752.50 20/01/2016 AS 150.00
6 Australasia AU Dollar $142.50 20/01/2016 NA 2000.00
7 Europe EU Euro €1,076.00 20/01/2016 EU 25.00
8 North America NA Dollar $2,240.50 21/01/2016 NA 120.50
9 South America SA Real R$75.75 21/01/2016 SA 50.00
10 21/01/2016 AF 50.00
11 21/01/2016 AS 25.00
12 21/01/2016 EU 15.00
13 22/01/2016 AU 140.00
14 22/01/2016 EU 1000.00
15 22/01/2016 NA 20.00
16 23/01/2016 SA 25.75
17 23/01/2016 EU 16.00
18 23/01/2016 NA 100.00
19 23/01/2016 AS 55.00
20 24/01/2016 AS 12.50
21 25/01/2016 AS 10.00
22 25/01/2016 AU 2.50
23 26/01/2016 EU 20.00
24 26/01/2016 AS 3500.00
25
26 Number of donaons 21

(a) Cell E4 contains the formula =SUMIF($H$4:$H$24,B4,$I$4:$I$24)

Using cell references explain what this formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) What formula would you expect to see in cell E8?

........................................................................................................................................... [3]

(c) The formula in I26 only refers to the values in column I. Write down the formula you would
expect to see in cell I26

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


11

15 Information on the internet can sometimes be unreliable. Discuss ways you could minimise the
chance of finding unreliable information when searching the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


12

16 Describe what is meant by the following file formats.

(a) .txt

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) .gif

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) .pdf

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


13

17 The following is an external stylesheet which contains a number of mistakes.

h1 {
colour: #000040;
font-family: Arial, sans serif;
font-size: 18 px;
text-align: center;
}
h2 {
color: 000000;
font-family: Times New Roman, serif;
font-size: 15px;
text-align: centre;
}
body {
background-image: url('j12backgd2.jpg');
background-color: #025fb4;
}
table {
border-collapse: collapse;
border-width: 4px;
border-style: solid;
border-color: #000000;
}

td {
border-width: 2px;
border-style: solid;
border-color: #000000;
}

Write down five mistakes which would prevent this stylesheet from working properly and, for each,
give the correction.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

5 ...............................................................................................................................................

..................................................................................................................................................

[5]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


14

18 Discuss why different user interfaces require the use of different types of input device.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2016 06_0417_12_2016_1.19


15

BLANK PAGE

© UCLES 2016 06_0417_12_2016_1.19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 06_0417_12_2016_1.19


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*1155407167*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2016
2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

06_0417_13_2016_1.20
© UCLES 2016 [Turn over
2

1 Data can be input to a computer using different devices.

Write down the most appropriate input device which will enable you to:

(a) type an essay

........................................................................................................................................... [1]

(b) select options from a drop down menu whilst moving the device

........................................................................................................................................... [1]

(c) read the temperature

........................................................................................................................................... [1]

(d) fly an aircraft in a video game.

........................................................................................................................................... [1]

2 Tick whether the following are features of emails or traditional faxes.

email fax
(✓) (✓)

Transmission of messages is relatively slow.

When received data can be edited immediately using a word


processor.

Can have attached sound files.

The message is basically an image.

[2]

3 Tick whether the following statements are true or false.

true false
(✓) (✓)

WLAN stands for Wide Local Area Network.

A WAN often requires the use of a router.

The internet is a WAN.

A LAN usually covers a smaller area than a WAN.

[2]

© UCLES 2016 06_0417_13_2016_1.20


3

4 Different types of test data are used to test a newly developed system.

Complete the following sentences.

(a) Data which is of the correct type is called

........................................................................................................................................... [1]

(b) Data which is outside a given range is called

........................................................................................................................................... [1]

(c) Data which is at the boundaries of a given range is called

........................................................................................................................................... [1]

(d) Data which has been used with the current system and the results are known is called

........................................................................................................................................... [1]

5 Identify four uses of online booking systems.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


4

6 There are many microprocessor-controlled devices used in the modern home.

Describe four benefits in terms of lifestyle for users of such devices.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

[4]

7 Explain the meaning of the following email terms:

(a) cc

...........................................................................................................................................

........................................................................................................................................... [1]

(b) bcc

...........................................................................................................................................

........................................................................................................................................... [1]

(c) forward

...........................................................................................................................................

........................................................................................................................................... [1]

(d) group

...........................................................................................................................................

........................................................................................................................................... [1]

(e) attachment

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2016 06_0417_13_2016_1.20


5

8 A school library uses a computer system where there is a book file and a borrower file.

Each student has a unique membership number and each book has a unique accession number.
The accession number is the number given to a book when it is first bought by the library.

When a book is borrowed, the student has their thumbprint read by a special input device.

(a) Describe the computer processing involved when a book is borrowed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Describe the computer processing involved when a book is returned. There is no need for the
borrower to have their thumbprint read during this process.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


6

9 When customers use phone banking they are connected to an automated system.

(a) Give two items of data they are asked to key in to identify themselves to the system.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) Identify three services that they can use in phone banking.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2016 06_0417_13_2016_1.20


7

10 A student exam answer sheet consists of boxes or lozenges which the student shades in to indicate
their choice of answer.

(a) Apart from the details of the test and the lozenges, give two items of information, essential to
the student, that are pre-printed on the answer sheet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) Describe how Optical Mark Recognition is used to process the details from the form.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) Describe the drawbacks of using Optical Mark Recognition.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


8

11 Enrique has developed a new database system for a supermarket. Below is one record from
the database. He needs to test the validation checks that he has developed for the system.

Barcode Supplier_code Contents Price Reorder_level Weight(kg)

5012427141308 EZ123 Lobster Bisque £2.72 100 0.4

(a) He designed a length check for the Barcode field. However, when he entered the code
5012472141308 by mistake, the system still accepted it.

Describe the check he could have used to prevent this error.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) The Reorder_level for each item is never more than 100. He developed a validation check to
make sure this is the case.

However, when he entered the number 100 it was rejected.

Name and describe the validation check he should use and explain why the number could
have been rejected.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2016 06_0417_13_2016_1.20


9

(c) He also designed a length check for the Supplier_code field. However, when he entered
EZQ23 by mistake, the system still accepted it.

Describe how he could have prevented this error.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) For each field write down the most appropriate data type. For any numeric field specify the
type of number.

Barcode.............................................................................................................................

...........................................................................................................................................

Supplier_code....................................................................................................................

...........................................................................................................................................

Contents............................................................................................................................

...........................................................................................................................................

Price..................................................................................................................................

...........................................................................................................................................

Reorder_level....................................................................................................................

...........................................................................................................................................

Weight(kg).........................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


10

12 Here is a spreadsheet showing the countries which have been selected to host the Commonwealth
Games.

A B C D E
1
2 1930 Canada
3 1934 England
4 1938 Australia
5 1950 New Zealand Canada 4
6 1954 Canada England 2
7 1958 Wales Australia 5
8 1962 Australia New Zealand 3
9 1966 Jamaica Wales 1
10 1970 Scotland Jamaica 1
11 1974 New Zealand Scotland 3
12 1978 Canada Malaysia 1
13 1982 Australia India 1
14 1986 Scotland South Africa 1
15 1990 New Zealand
16 1994 Canada
17 1998 Malaysia
18 2002 England
19 2006 Australia
20 2010 India
21 2014 Scotland
22 2018 Australia
23 2022 South Africa
24

(a) Cells E5 to E14 contain the number of times each country has been selected to host the
Commonwealth Games.

Write down the formula which should go in cell E5 so that it can be replicated down to cell
E14.

........................................................................................................................................... [5]

(b) Papua New Guinea are interested in bidding to host the 2026 Commonwealth Games. If they
are successful the spreadsheet will need to be updated.

Apart from those in column E, write down the cell references of those cells which will need to
change.

........................................................................................................................................... [3]

© UCLES 2016 06_0417_13_2016_1.20


11

13 Describe what an ISP is and, apart from security measures, describe what it offers its customers.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

14 Explain how you would evaluate the reliability of information found on the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


12

15 Describe each of the file formats giving a different use for each.

(a) .jpeg

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) .png

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

16

Describe, in detail, the changes that have happened to make shape A into shape B.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

© UCLES 2016 06_0417_13_2016_1.20


13

17 In the following section of HTML markup there are a number of mistakes.

<td>
<p>Manta conservation workshops and holidays can be booked through
the Xtreme Adventure Holiday Company or by <a href="http://www.xahc.co.uk" target="_manta">
clicking here.</p>
<td>
<p><href="mailto:tmcp@cie.org.uk">Email</a> us for details of our
Manta Education Packs or <a href="mailto,tmcp@cie.org.uk,subject=Donation by
John>">click on this link<a> to discover how to donate to help us preserve
these disappearing species.</p>
</td>

Identify six mistakes which prevent this from working as intended.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

5 ...............................................................................................................................................

..................................................................................................................................................

6 ...............................................................................................................................................

..................................................................................................................................................

[6]

© UCLES 2016 06_0417_13_2016_1.20 [Turn over


14

18 The following are two slides from a presentation produced for young children.

Describe six improvements to the presentation that would make it more appealing to a typical adult
audience.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

5 ...............................................................................................................................................

..................................................................................................................................................

6 ...............................................................................................................................................

..................................................................................................................................................

[6]

© UCLES 2016 06_0417_13_2016_1.20


15

19 Discuss the use of spreadsheet software compared to database software to store and manipulate
student data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2016 06_0417_13_2016_1.20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 06_0417_13_2016_1.20


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 0 5 6 8 3 6 2 4 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (CW) 117035/4
© UCLES 2016 [Turn over
2

1 There are a number of different network devices associated with computers.

Give the most appropriate type of communication device that fits the following descriptions.

(a) This device connects a LAN to the internet.

...............................................................................................................................................[1]

(b) This device transmits data to specific computers in a network.

...............................................................................................................................................[1]

(c) This device broadcasts data to all computers in a network.

...............................................................................................................................................[1]

(d) This device connects one LAN to another LAN that uses the same protocol.

...............................................................................................................................................[1]

2 (a) A computer system consists of hardware and software.

Explain what is meant by software.

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Name the type of software from its description.

(i) This type of software lets you manage the hardware and software resources.

.......................................................................................................................................[1]

(ii) Give an example of this type of software.

.......................................................................................................................................[1]

(iii) This type of software lets you carry out tasks such as creating a document or an image.

.......................................................................................................................................[1]

(iv) Give an example of this type of software.

.......................................................................................................................................[1]

© UCLES 2016 0417/12/O/N/16


3

3 Tick whether the following devices are input, output or backing storage.

backing
input output
storage
(✓) (✓)
(✓)
Motor
CD-R
Web cam
Printer
[4]

4 Sending emails to someone involves netiquette.

Tick whether the following statements are true or false.

true false
(✓) (✓)
If capital letters are used in emails, it is considered as ‘shouting’.

You should always use coloured text and coloured backgrounds in emails.

You should reply to all spam emails.

bcc means blind carbon copy.


[2]

Question 5 begins on page 4

© UCLES 2016 0417/12/O/N/16 [Turn over


4

5 The directors of a multi-national car company need to communicate with each other. They have
decided that the best way to do this is through web-conferencing.

(a) Describe web-conferencing and how it could be used in this scenario.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The directors wish to have a conference with their managers in other countries and are
considering the use of video-conferencing.

Name three pieces of hardware that would be needed in order to hold a video-conference.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 0417/12/O/N/16


5

(c) Describe three drawbacks of setting up and using video-conferencing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

6 Tick the most appropriate storage medium for each of the following uses.

Fixed Magnetic Memory


Blu-ray
Hard Disk Tape Card
(✓)
(✓) (✓) (✓)
Storing a database of books in a school library
Storing photographs in a digital camera
Companies distributing HD movies
Storing the backup of a file server
[4]

© UCLES 2016 0417/12/O/N/16 [Turn over


6

7 A teacher has produced a piece of software and uses it to record exam marks. Each exam has a
total of 100 marks available. If a student does not take the examination then the mark awarded is 0.

A B C D
1
2 Name of Student Examination Mark Pass or Fail
3 Candidate A 20
4 Candidate B 70
5 Candidate C 45
6
7
8
9

(a) Write a formula that would be entered in cell C3 to display the word pass if the value in B3 is
more than 75 marks or the word fail if it is not.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/12/O/N/16


7

(b) The teacher wishes to test a formula on the spreadsheet and uses normal, abnormal and
extreme test data.

Describe each of the following terms.

Normal Test Data ......................................................................................................................

...................................................................................................................................................

Abnormal Test Data ..................................................................................................................

...................................................................................................................................................

Extreme Test Data ....................................................................................................................

...................................................................................................................................................
[3]

8 Biometrics have replaced user IDs and passwords in a large number of systems.

Discuss the advantages and disadvantages of using biometric systems rather than more traditional
security methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 0417/12/O/N/16 [Turn over


8

9 Many countries have copyright legislation which applies to the purchasing of software.

Give three actions that would break copyright.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

10 Members of a US Conservation Unit recently discovered a species of frog new to New York. They
identified the frog using an expert system called ARK.

(a) Describe how an expert system can be used to help identify a newly discovered type of
animal.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Identify two other applications which make use of expert systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2016 0417/12/O/N/16


9

(c) A developer has created a plan for a new database.

Field Name Data Type Length of Field Comment


Animal_ID Text 5 2 letters followed by
a 3 digit number
Name_of_animal Text 25
Animal_endangered? Boolean
Years_on_register Numeric

For each named field, give an appropriate validation check the developer should use.

Field Name Validation Check


Animal_ID
Name_of_animal
Animal_endangered?
Years_on_register
[4]

(d) A report is generated from the results. The report contains headers and footers.

Explain, using examples, why headers and footers are used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 0417/12/O/N/16 [Turn over


10

11 A manager of a computer store has created a relational database to keep track of its orders. She
has created two tables that are linked together.

Table A stores the products.


Table B stores the order details.

The following data shows some records from the database.

Table A: products

Product_ID Product_name Unit_price


1232 PC Base unit $300
1246 Monitor TFT $250
1678 Mouse $9
2314 Keyboard $9
3214 Laser printer $250

Table B: order details

Order_ID Product_ordered Quantity


1231 1232 1
1233 1246 10
1234 1678 15
1235 2314 4
1236 2314 16
1237 3214 20

(a) Name the most suitable primary key in the products table.

...............................................................................................................................................[1]

(b) Name a suitable foreign key in the order details table.

...............................................................................................................................................[1]

(c) On the data shown in the tables above, the following search is to be carried out:

(Unit_price>$250)

Write down the Order_ID resulting from this search.

...............................................................................................................................................[1]

© UCLES 2016 0417/12/O/N/16


11

(d) On the data shown in the tables at the start of question 11, the following search is to be
carried out:

(Product_ID>2000) AND (Quantity<20)

Write down the Order_ID(s) resulting from this search.

...............................................................................................................................................[2]

(e) The store has created a report with a new field called total_price to be calculated at run time.
This field will contain the number of units ordered multiplied by the price of each unit.

Write an expression to produce this result.

...................................................................................................................................................

...............................................................................................................................................[2]

12 Explain, using examples, the difference between a function and a formula in a spreadsheet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

13 A new system has been developed and documentation has been produced. There are two types of
documentation; user and technical.

(a) Explain what technical documentation is used for.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/O/N/16 [Turn over


12

(b) Give four examples of the items found in technical documentation.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

14 There are several security issues surrounding the use of smartphones. These include smishing
and pharming.

(a) Describe different security measures that can be put into place to stop smishing or pharming
attacks.

Smishing ...................................................................................................................................

...................................................................................................................................................

Pharming ..................................................................................................................................

...................................................................................................................................................
[2]

(b) Cookies are sometimes seen as a security threat when in reality they are only a nuisance.

Explain, using an example, what cookies are and why they are important to companies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/12/O/N/16


13

15 Explain the differences between a blog and a wiki.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

16 (a) Describe what is meant by an intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe what is meant by the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/O/N/16 [Turn over


14

17 It has been announced that the UK banking industry will not now remove the use of cheques.

As more and more people are using debit cards to pay for goods, the cheque was to be phased
out in the UK by 2018. The use of cheques for transactions is declining but still available.

Compare and contrast the use of debit cards and cheques to carry out transactions.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 0417/12/O/N/16


15

BLANK PAGE

© UCLES 2016 0417/12/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 0417/12/O/N/16


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written October/November 2016
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 9 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

1 (a) Router/Broadband modem [1]

(b) Switch [1]

(c) Hub [1]

(d) Bridge [1]

2 (a) Two from:

Software is programs/set of instructions.


Software controls/runs a computer system/hardware. [2]

(b) (i) System(s) (software) [1]

(ii) For example: Operating system, file management system, utilities [1]

(iii) Application(s) (software) [1]

(iv) For example: Word processor, spreadsheet, database [1]

3
input output backing storage
(9) (9) (9)

Motor 9

CD-R 9

Webcam 9

Printer 9 [4]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

4
true false
(9) (9)

If capital letters are used in emails, it is considered ‘shouting’. 9

You should always use coloured text and coloured


9
backgrounds in emails.

You should reply to all spam emails. 9

bcc means blind carbon copy. 9 [2]

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks

5 (a) Four from:

Real time collaboration/communication


Multiple users are connected to the internet.
See the same screen at all times in their web browsers
Allows: texting, for example of the car details
VOIP, for example, the delegates discussing the car range
Full motion video to show the car being test driven [4]

(b) Three from:

Webcams/cameras
Large monitors/projector
Microphones
Speakers/headphone [3]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

(c) Three matched pairs from:

Power cuts/load shedding…


…can lead to parts of the video-conference shutting down.
Lip sync problems/time lag…
…this means that the picture is not running at the same speed as the sound.
Need to consider time zone implications of when to hold the video-conference…
…some participants may be video-conferencing outside of work hours/in the night.
Initial cost of hardware/software…
…expensive to buy extra hardware and software
Needs reliable internet access…
…otherwise the video-conference will suffer interference/break down of signal.
Difficult to stop them all talking at once/manage contributions…
…if more than one person talks at once it is difficult to hear what is said.
Difficult to manage the video-conference starts on time…
…due to time differences/setting up issues.
Difficult to keep participants on task…
…they are not in the same room so could be doing other things/not concentrating.
Increased cost/time of training staff…
…The host of the conference would need training/participants may need training.
Cost/time of technician/support staff…
…the support staff will need to be on hand in case of problems.
Document cannot be signed…
…there will be only one copy of the document.
Physical objects cannot be examined…
…this would need to be set up before the conference which takes time. [6]

6
Fixed
Magnetic
Hard Blu-ray Memory card
Tape
Disk (9) (9)
(9)
(9)

Storing a database of books in a


9
school library

Storing photographs in a digital


9
camera

Companies distributing HD movies 9

[4]
Storing the back up of a file server 9

7 (a) = IF (B3>75, “pass”, “fail”)


1 mark IF ( )
1 mark parameter B3>75,
1 mark “pass”, “fail” [3]

Mark deducted for any additional elements down to 0 marks

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

(b) Normal data is data that is within the range/right data type. [1]

Abnormal data is data that is outside the range/wrong type. [1]

Extreme data is data that is on the edge of acceptability. [1]

8 Six from:

Examples

Advantages
Biometrics are unique…
…so others cannot sign people in/whereas with password/card systems someone else can sign
you in.
Fingerprints/eyes are always with you…
…but a password/card can be lost.
Cannot be forgotten passwords can be forgotten
The user has to be present therefore more secure.
Typing in passwords can lead to errors on data entry…
…biometrics tend to be more reliable.
More difficult to forge…
…passwords can be copied/cards can be stolen.

Disadvantages
Personal liberty infringement…
…fingerprints/biometric must be stored.
Method is slower to enter system than passwords.
Equipment and setup is more expensive than producing cards.
The time taken to set up a store of fingerprints/eye prints can be a long time…
…quicker to set up a database of passwords.
If the finger is damaged/dirty it cannot be read passwords can be more reliable.
If dark glasses are worn retina cannot be read passwords are more reliable
If a voice is not understandable on a voice recognition system may not work.
Facial hair can stop facial recognition passwords are more reliable

A mark can be awarded for a reasoned conclusion


If one side of the argument i.e. all advantages/disadvantages then 3 marks max.
If both sides have been addressed but without expansions/differences then 4 marks max [6]

9 Three from:

Making a copy and giving it away to a friend or colleague without permission


Making a copy and lending it without permission
Making a copy and selling it without permission
Making a copy without permission from the author/licence holder
Using a single copy with multiple simultaneous use on a network
Using coding/images from the original copy in your own programs/modifying the original code
Renting out the original copy without permission [3]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

10 (a) Four from:

Enter data into/use the interactive user interface


Questions are asked by the system
The user answers the questions
With yes or no answers
Further questions are asked based on the previous answers
The inference engine compares data
Compares data with that held in the knowledge base…
…using the rules base/set of rules
System produces probabilities/possible types of animal [4]

(b) Two from:

Oil prospecting/rock classification


Medical diagnosis
Car engine fault diagnosis
Chess
Tax systems [2]

(c)
Field Name Validation Check

Animal_ID Format check/Presence check

Name_of_animal Presence check/type check/character check

Animal_endangered? Character check/type check

Years_on_register Range check [4]

(d) Four from:

Three max
A header and footer may be on every page to show consistency.
Don’t have to type it in on every page…
…saves time
…reduces errors

Three max
What is in that section of document/title of the sub-section
Author of the document
The page number
The version
The date
File name/path
Company logo/name

To gain full marks candidates must have an example and explanation. [4]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

11 (a) Product_ID [1]

(b) Product_ordered [1]

(c) 1231 [1]

(d) 1 mark for each correct answer


1235, 1236 [2]

(e) Two from:

(=)[Quantity]*[Unit_price]
1 mark for [Quantity] *
1 mark for [Unit_price] [2]

12 Four from:

A formula is a statement written by the user to be calculated.


An equation
A formula can contain values/references to cells/defined names.
Examples =A1+B1 etc.

A function is a piece of code designed to return specific values.


Pass parameters/variables to functions
Function has a pre-defined names in the software/reserved word.
They are used inside formulas.
A built in operation
Examples SUM()/AVERAGE()/ NOW() etc.

To gain full marks candidates need to mention both a function and formula. [4]

13 (a) Two from:

Designed to help programmers/systems analysts…


…to improve a system.
…to maintain a system.
…to upgrade a system. [2]

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

(b) Four from:

Program coding/listing/piece of code


Name of program language
System flowchart
Program flowchart/algorithm/pseudocode/DFD
List of variables
File structure
Purpose of the program
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Known bugs
Validation routines [4]

14 (a) Smishing

One from:

Never text back to unknown sender


Never respond to any of these types of texts
Never click on any links within the text message
Never give out personal information in a text
Don’t allow your mobile phone number to be included in call lists
Blocking unfamiliar texters/numbers [1]

Pharming:

One from:

Use up to date anti-virus/anti-pharming/anti-spyware software


Check address bar for strange web addresses
Keeping DNS servers patched and up to date
Use up to date firewall services on DNS servers [1]

(b) One from:

A small text file sent/downloaded to a user’s web browser when they visit a web site [1]

Two from:

Store information about the visit and are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users [2]

© UCLES 2016
Page 9 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12

15 Four from:

Blog is website/Wiki is software or a website.


Blog is a personal journal or someone’s opinion/A wiki is usually objective.
Blog has a single author/A wiki has many authors.
Blog is based on the author’s personal observations.
Both use links to websites.
Blogs are written in reverse date order/Wiki has a structure determined by content and users.
Only an author can edit a blog or readers can only add comments to a blog/A wiki can be edited
by any member of the group. [4]

16 (a) Two from:

Internal restricted access network/secure network


Uses same protocols as the internet
Private network
Used within an organisation eg school
Limited resources [2]

(b) Two from:

Public network/not policed


International network of networks
WAN/wide area network
World wide/global/international
Public information system
web/email/gophers/social networking/video conferencing is part of the internet [2]

17 To be marked as a level of response:

Level 3 (7–8 marks):


Candidates will address both the similarities and the differences between cheques and debit
cards and discuss/consider different benefits/drawbacks.

The issues raised will be justified. There will be a reasoned conclusion. The information will be
relevant, clear, organised and presented in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will address both the similarities and the differences between cheques and debit
cards and discuss/consider different benefits/drawbacks although development of some of the
points will be limited to one side of the argument.

There may be a conclusion. For the most part the information will be relevant and presented in a
structured and coherent format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic benefits and
drawbacks. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content [8]

© UCLES 2016
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 9 6 9 8 6 5 5 3 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (RW/JG) 115300/3
© UCLES 2016 [Turn over
2

1 Tick whether the following statements are true or false.

true false
(✓) (✓)
Tablet computers have touch screens.
Smartphones will only connect to the internet through WiFi.
A tablet computer has a separate keyboard.
Smartphones use a touchpad.
[2]

(a) Give the type of interface shown above.

...............................................................................................................................................[1]

(b) Give a disadvantage of using this type of user interface.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Another type of interface is a graphical user interface (GUI).

Tick whether the following statements are true or false.

true false
(✓) (✓)
A GUI involves the use of windows and menus.
User interaction with a GUI is intuitive.
A GUI takes up a lot of memory and resources.
Users have to learn a list of system commands in order to use a GUI.
[2]

© UCLES 2016 0417/13/O/N/16


3

3 Tick whether the following statements are true or false.

true false
(✓) (✓)
ROM is Real Optical Memory.
RAM stores the instructions you are currently working on.
ROM stores the BIOS.
RAM allows the user to read and write data.
[2]

4 Different devices connected to the computer have a number of different characteristics.

(a) Name the type of printer that is best suited to operate in harsh conditions.

...............................................................................................................................................[1]

(b) Name a type of monitor that can reduce the effects of eye strain.

...............................................................................................................................................[1]

(c) Name the type of printer that produces a solid object.

...............................................................................................................................................[1]

(d) Name the type of monitor that is an input device on which output can be seen and is found in
a public information system.

...............................................................................................................................................[1]

5 A new system is being implemented in a company. The systems analyst has a number of ways
that the system can be implemented.

For each named method, give an advantage of using the implementation over the others.

Parallel running ................................................................................................................................

..........................................................................................................................................................

Direct changeover ............................................................................................................................

..........................................................................................................................................................

Phased implementation ....................................................................................................................

......................................................................................................................................................[3]

© UCLES 2016 0417/13/O/N/16 [Turn over


4

6 In many countries, hacking of computer systems is an offence.

(a) Explain, using examples, the term hacking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Describe the measures that should be taken to help protect data from being hacked.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/13/O/N/16


5

7 This email has been received by a bank customer who believes it may be fraudulent.

Give three reasons why the customer may be suspicious.

From: no_reply@manger.tawarabank.com
Subject: Account Status

Dear Costumer,

Due to resent activity on account, we have reason to believe that your account has been
compromised . For your security, we have temporariley prevented access to your account.
Tawara Bank safeguards your account when there is a possibility that someone other than you
tried to log in. You may be getting this message because you signed in from a different location
or device. If this is the case, your access may be restored when you log in your username and
passward.. For immediate access, you are required to follow the instruction below to confirm
your account in order to secure your personal account information.

Click here to log In to your Account


If you have any problems trying to log in to your account, please reply to this email giving your
username and passward and we will check your setting.
Regards, Paige Turner
Chief Customer Officer
CardHolder Services

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2016 0417/13/O/N/16 [Turn over


6

8 Uniform Resource Locators (URL) are used to locate web addresses and resources. In order to
get to the weather forecast for Auckland, New Zealand, you would enter:

http://www.bbc.com/weather/2193733

(a) Describe each of the following elements in the web address.

http:// .........................................................................................................................................

...............................................................................................................................................[1]

www.bbc.com ............................................................................................................................

...............................................................................................................................................[1]

weather .....................................................................................................................................

...............................................................................................................................................[1]

2193733 ....................................................................................................................................

...............................................................................................................................................[1]

(b) The 2016 CIE IGCSE ICT syllabus can either be found using a web browser or a search
engine.

Describe two advantages of using a web browser rather than a search engine.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

9 You have completed a word processed report for a History project on the First World War. You set
the computer to check the grammar and spelling.

Explain why you still need to check the spelling and grammar visually.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

© UCLES 2016 0417/13/O/N/16


7

10 There are several ways in which members of an organisation can organise meetings. These
include video-, audio- or web-conferencing.

(a) An organisation is planning an important meeting with the Directors of the three main offices.
They are going to set up an audio-conference.

Describe the process of setting up this type of conference.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The organisation has a computer network which is connected to the internet. The router
contains a firewall.

Explain why a firewall is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 0417/13/O/N/16 [Turn over


8

11 The headteacher of a school has decided to allow all data about the students to be backed up
onto the cloud.

(a) Explain the ICT term cloud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Even though the cloud appears to be an excellent resource, it has many problems.

Discuss the benefits and drawbacks of storing data in the cloud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 0417/13/O/N/16


9

12 A householder has installed a computer controlled burglar alarm.

Describe the processing involved in a computer controlled burglar alarm.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

13 Name three components of an expert system.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................
[3]

14 Car production lines use robots to manufacture the vehicles. The robots have devices attached to
their arms to help in the manufacturing process.

(a) For each of the named devices, describe their use on a car production line.

Video camera ............................................................................................................................

...............................................................................................................................................[1]

Light sensor ..............................................................................................................................

...............................................................................................................................................[1]

Pressure sensor ........................................................................................................................

...............................................................................................................................................[1]

© UCLES 2016 0417/13/O/N/16 [Turn over


10

(b) Give three advantages to the company of using robots rather than humans to manufacture
cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) Give three disadvantages to the company of using robots rather than humans to manufacture
cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) Cars have to be designed before they can be manufactured. 3D printers can be used to
produce models of a car.

Describe the process involved in producing the models.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/13/O/N/16


11

15 (a) A router is connected to a LAN.

Describe the function of a router.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Different methods can be used to connect computers to networks.

Describe two advantages for each of the following methods.

WiFi ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

Satellite .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

3G / 4G ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/13/O/N/16 [Turn over


12

16 The following is part of a household budget spreadsheet. Cells B9 and B14 contain formulas. The
owner wishes to test the spreadsheet which must follow the following rules:

• No individual outgoings can be greater than $100


• The balance can be negative or positive

A B C
1 Household budget
2
3 Outgoings
4 Heating $45.00
5 Food $80.00
6 Travel $35.00
7 Utilities $61.00
8 Clothes $40.00
9 $261.00
10 Income
11 Total Salary $280.00
12
13
14 Balance $19.00
15

(a) Describe four testing strategies you could use to test the model.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2016 0417/13/O/N/16


13

(b) Describe how you would change the spreadsheet so that it alerts the user if any outgoing is
greater than $100.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

17 A new toll road that drivers pay to use has just opened. The company that owns the road uses
Electronic Number Plate Recognition Systems to collect payments from drivers automatically.

Describe how an Electronic Number Plate Recognition System works.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

18 For each of the following safety issues suggest a possible strategy for preventing the problem.

Electrocution ....................................................................................................................................

......................................................................................................................................................[1]

Fire ...................................................................................................................................................

......................................................................................................................................................[1]

Tripping over trailing leads ...............................................................................................................

......................................................................................................................................................[1]

Heavy equipment falling ...................................................................................................................

......................................................................................................................................................[1]

© UCLES 2016 0417/13/O/N/16 [Turn over


14

19 The director of a major electronics company announced that ‘homes are about to become much
smarter’. He was talking about the use of home appliances that could connect to the internet.
These include central heating systems, ovens, televisions and fridges.

Devices like these need to connect to the internet. Discuss the advantages and disadvantages of
connecting them to the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 0417/13/O/N/16


15

BLANK PAGE

© UCLES 2016 0417/13/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 0417/13/O/N/16


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written October/November 2016
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

1 Tick whether the following statements are true or false.

true false
(3) (3)

Tablet computers have touch screens. 3

Smartphones will only connect to the internet through Wi-Fi. 3

A tablet computer has a separate keyboard. 3

Smartphones use a touchpad. 3

[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

2 (a) Command line interface/CLI


[1]

(b) One from:

more difficult to edit entered commands


need to know the commands
Incorrect commands can affect the operation of the computer.
Syntax needs to be exact for the program to work. [1]

(c) Tick whether the following statements are true or false.

true false
(3) (3)

A GUI involves the use of windows and menus. 3

User interaction with a GUI is intuitive. 3

A GUI takes up a lot of memory and resources. 3

Users have to learn a list of system commands in order


3
to use a GUI.
[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

3 Tick whether the following statements are true or false.

true false
(3) (3)
ROM is Real Optical Memory. 3

RAM stores the instructions you are currently working on. 3

ROM stores the BIOS. 3

RAM allows the user to read and write data. 3


[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

4 (a) Dot matrix [1]

(b) TFT/LED/LCD (allow full names such as Thin-Film-Transistor) [1]

(c) 3D printer/3D inkjet printer [1]

(d) Touchscreen [1]

5 Parallel running

Any one from:

If the new system fails then the old system is still running.
There is always a backup of the whole system. [1]

Direct Changeover

Any one from:

Saves on the costs as less personnel


Saves the time of implementing the new system
Advantages are immediate [1]

Phased Implementation

Any one from:

If the new system fails then most of the old system still in place.
Possible to see if part of the new system works before proceeding [1]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

6 (a) Unauthorised access to computer systems with the intention of causing harm [1]

Two examples from:

Editing files/data
Deleting files/data
Installing viruses
Exposing weaknesses of the system [2]

(b) Three from:

Usernames and strong passwords to stop remote and local logins


Use different passwords for different accounts
Biometric systems to ensure the official user is present
Electronic dongles which only allow login when the dongle is plugged in
Dedicated computers which are the only ones allowed to log in [3]

7 Three from:

Spelling errors
Information requested that the bank would not ask for e.g. password and username/personal
information
Not personalised – name or part of account number
Hyperlink not usually given
Inconsistency i.e. manager and Chief Customer Officer

Allow examples of the data from the email [3]

8 (a) http:// – this is a protocol/transfer protocol/hypertext transfer protocol [1]


www.bbc.com – this is the website address contains domain name, domain type and
country code/server [1]
weather – this is the folder name [1]
2193733 – this is the resource or the filename [1]

(b) Two from:

If using a web browser, only the URL is needed.


If a URL is typed in a web browser the website is found straight away.
Resource may not be on search engine index yet, therefore cannot be found.
In the search engine the user needs to know what is on the website for the keywords.
Not sharing information with a search engine if you type in a URL [2]

9 Three from:

The language/dialect used in checking the spelling/grammar could be different e.g. English(US).
Names/proper nouns might be highlighted as an error but are acceptable.
If no suggestions are given
Similar sounding words need to be checked, i.e. where, were, wear.
The grammar might be too complex for the grammar checker to cope with. [3]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

10 (a) Four from:

Agree the date and time of the conference

Either
Contact an audio conferencing provider …
…for organiser’s PIN
…for participant’s PIN
Give the PIN to each participant
at the start of the conference organiser types in his PIN
Each participant dials the number and enters the PIN

or
the organiser phones/contact the first participant
the organiser phones/contact subsequent participants
puts them on hold…
…until all participants have been contacted
joins the participants together/joins the conference [4]

(b) Four from:

It is needed for network security


It controls the incoming and outgoing network traffic.
A firewall establishes a barrier between a trusted, secure internal network and the Internet
It logs incoming and outgoing traffic
It stops malicious traffic
It prevents computers connecting to unwanted sites
It prevents untrusted/unrecognised computers accessing data on the system

11 (a) Cloud is large groups of remote networked servers


They allow centralised data storage [2]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

(b) Six from:

Disadvantages
Loss of control of the data…
…as the data is controlled by a data storage provider.
…the user needs to be able to trust the service provider and its staff.
…security issues with the storing of the data with the provider
…fire/flood/electricity spikes can affect data without the user knowing.
The data remains on the server for a length of time…
…easier to be hacked as more copies of it available…
…available for longer…
…users must use strong passwords/authentication methods as hackers have longer time to
be able to crack the password…
…as several copies of the data are available
If data is not encrypted…
…can lead to security issues due to loss of control/hacking.
If connection is lost then the cloud cannot be accessed…
…data could be lost due to this.
If there is a mass/lot of data the data could be split over several servers…
…may have problems retrieving the data.
…may lead to security issues.
…data may be lost during the saving process.
Cost of using cloud is more expensive than buying a hard disk/SSD…
…most computers come with a hard disk/SSD
Difficult to delete all copies of a file…
…as the data is stored/backed up several times.

Advantages
The data is accessible anywhere…
…helps to migrate data from one device to another.
…helps to synchronise data.
Don’t have to buy storage devices…
…some devices do not have hard disks/storage
…the cloud can be used for all storage requirements.
More storage space than using physical devices…
…the cloud has lots of storage
Don’t have to manage the storage…
…the service provider manages the storage
…user does not have to worry about security measures as service provider secures data.
Allows many users to access the data…
...as the data is stored centrally.
Only pay for the storage you use…
…much of the space on the hard disk may be wasted. [6]

A mark can be awarded for a reasoned conclusion.


If one side of the argument i.e. all advantages/disadvantages then 3 marks max.
If both sides have been addressed but without expansions/comparisons then 4 marks max.

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

12 Five from:

Computer checks the input from the user is authentic.


Computer is programmed with pre-set values.
Computer reads data from the sensors.
If the light sensor is activated…
If the contact switch is activated…
If pressure greater than pre-set value…
If sound greater than pre-set value…
If temperature greater than pre-set value…
If the movement sensor is activated…
Computer sends signal to sound the alarm.
Computer sends signal automatically to the police station/alarm company/security company.
Computer sends signal the flashing lights/house lights.
Computer sends message/text/calls automatically to the owner. [5]

13 Three from:

Knowledge base
Rules base
Inference engine
Interactive user interface [3]

14 (a) For example


Video camera to inspect the finished product [1]
Light sensors used to detect position of the car [1]
Pressure sensor to make sure the car part is gripped correctly [1]

(b) Three from:

Running costs are cheaper than paying humans a wage.


Robots can operate continuously.
Cars are built to a more consistent standard.
Robots are more accurate.
Can be used in hazardous conditions.
Greater productivity [3]

(c) Three from:

If a change is made in the manufacturing process the robot needs to be re-programmed.


If a robot makes a mistake it will continue to make the same mistake.
Expensive to set up/maintain
Robots are not capable of performing tasks autonomously without guidance from
humans/they cannot think for themselves.
If they break down then they are difficult/impossible to repair.
If the robot breaks down the whole process stops.
The abilities of robots are suitable only for simple activities in which no major difficulties are
met. [3]

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

(d) Three from:

3D digital copy is made and put in the software.


Software slices the model into hundreds of layers.
Printer creates the model layer by layer.
Binds them together [3]

15 (a) Two from:

Routers inspect/read the IP address of the data packets sent to it


Sends the data packet to a switch with that IP address
It may use the MAC address of the switch to do that by converting the IP to a MAC using
ARP…
…until it finds the corresponding switch [2]

(b) WiFi

Any two from:

Can connect to the internet from any room in a house


No cables
Can be used on multiple devices [2]

Satellite

Any two from:

This is broadband
Useful for general use of the internet
(Connects via satellites so) better coverage
Can be used almost anywhere in the world [2]

3G/4G

Any two from:

Used in mobile devices laptops/tablets/smartphones


Connects wireless through the 3G or 4G network
Allows access on the move
Allows access even if no WiFi available
Not affected by rain or snow as satellite communication [2]

© UCLES 2016
Page 9 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

16 (a) Four from:

To test the balance is negative change the values in the outgoings so the total is larger than
the total income
Test each individual outgoing so it is larger than 100/abnormal testing
Test each individual outgoing so it is equal to 100/extreme testing
Test so the total outgoing is equal to total income
Type in a negative income
Type in a negative outgoing
Test each individual outgoing so it is less than 100/normal testing
Test using live data [4]

(b) Three from:

Use conditional formatting…


…to check cell content greater than 100
…in the range B4 to B8
Use shading/highlighting cells…
Set up a validation check…
…range check 0–100
If outside the range displays an error message [3]

17 Four from:

the system has cameras/CCTV


The images and the text from the number plate are captured by the camera
Infrared lighting is used so it can be used in all weathers/at night
The system uses optical character recognition
The licence/number plate is checked against its database to find the car owner’s details [4]

© UCLES 2016
Page 10 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13

18 One from each section:

Electrocution – for example:


No liquids or drinks allowed near computers
Check insulation regularly
Use RCB (residual circuit breakers)
Insulate wires [1]

Fire – for example:


Have a CO2 fire extinguisher
Don’t cover equipment
Good ventilation
Don’t overload sockets [1]

Tripping over trailing leads – for example:


Use cable ducts/place cables under carpets/fasten cables to walls
Use wireless devices
Organise cables [1]

Heavy equipment falling – for example:


Place devices in the middle of a table/not near the edge
Use large desks
Use sturdy desks
Make sure wires are tucked out of the way to stop device being dragged off [1]

19 To be marked as a level of response:

Level 3 (7–8 marks):


Candidates will address both aspects of the question and discuss/consider different
advantages/disadvantages. The issues raised will be justified. There will be a reasoned
conclusion. The information will be relevant, clear, organised and presented in a structured and
coherent format.

Level 2 (4–6 marks):


Candidates will address both aspects of the question and discuss/consider different
advantages/disadvantages although development of some of the points will be limited to one side
of the argument. There will be a conclusion. For the most part the information will be relevant and
presented in a structured and coherent format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic advantages and
disadvantages. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content. [8]

© UCLES 2016
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*8606559575*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2017
2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

06_0417_12_2017_1.2
© UCLES 2017 [Turn over
2

1 When a person buys goods in a supermarket they have to pay at the checkout.

(a) Identify two input devices used at the checkout.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) Identify two output devices used at the checkout.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

2 Tick whether the following statements are true or false.

true false
(✓) (✓)

A router is required to allow a LAN to connect to the internet

A web browser displays a web page

An intranet has restricted access

ISP means Internal Service Provider

[2]

© UCLES 2017 06_0417_12_2017_1.2


3

3 Tick whether the following items are found in technical documentation or user documentation or
both.

technical user both


(✓) (✓) (✓)

Error messages

Hardware requirements

Program listing

Purpose of the system

[4]

4 Identify the image editing techniques described in the following statements.

(a) Remove unwanted parts of an image.

........................................................................................................................................... [1]

(b) Make an image larger or smaller.

........................................................................................................................................... [1]

(c) Format the text so that it flows around an image.

........................................................................................................................................... [1]

(d) Turn an image a number of degrees clockwise or anti-clockwise.

........................................................................................................................................... [1]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


4

5 The managers of a nuclear power plant need to check the radioactivity levels in a chimney stack
which needs to be demolished. They intend to use a robot. This device has sensors to read the
radioactivity levels.

(a) Explain why the data from the sensors cannot be read directly by the microprocessor and
name the device needed to change the data into a form that the microprocessor can understand.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The managers have been told they can use this robot for other tasks by replacing the existing
sensors with different ones.

Give three advantages of using an existing robot device rather than developing a new one.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

6 A student has completed some work at school and wishes to take it home. He could use a pen
drive or a CD R disc to transport the files.

(a) Give two error messages that could appear to stop him saving his work.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2017 06_0417_12_2017_1.2


5

(b) Compare and contrast the use of a pen drive rather than a CD R.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

7 Driverless automobiles use a number of different methods to drive between two points.

(a) Name a sensor that could be used on the automobile to detect a person walking in front of it.

........................................................................................................................................... [1]

(b) Modern automobiles contain electronic devices designed to help the driver.

Suggest three examples of labour-saving or safety devices in a modern automobile that use
sensors.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


6

(c) Discuss the advantages and disadvantages of these devices in relation to automobile journeys.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

8 Expert systems are used in medical applications.

(a) From the list below, tick two components of an expert system.

tick
(✓)

Control unit

Graphics program

Inference engine

RFID

Rules base

Search engine

[2]

© UCLES 2017 06_0417_12_2017_1.2


7

(b) Describe three benefits of the doctor using an expert system to help diagnose a patient’s
illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

9 A school’s examinations officer has decided to develop a database to store pupil details and the
examinations they are due to sit next summer. They are going to use a relational database.

(a) Describe the steps involved in creating the database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


8

(b) Some of the records stored in the database are given below.

Examination_ID Name_of_subject Examination_level Date_of_exam

041731 ICT IGCSE 12/04/2018

047822 Computer Science IGCSE 11/06/2018

604312 Design and Technology O Level 01/06/2018

301532 French O Level 28/06/2018

Based only on the examination details above, complete the table below, stating the most
appropriate data type for each field.

Field name Data type

Examination_ID

Name_of_subject

Examination_level

Date_of_exam

[4]

(c) Write the search criteria to search for all examinations which will be sat after 26/06/2018, using
at least one of the following operators >, >=, <, <=, = .

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Apart from presence check, name and describe a suitable validation check for each of the
following fields in the database, based on the data shown in part (b).

Examination_ID.................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Date_of_exam...................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2017 06_0417_12_2017_1.2


9

10 A leisure centre is creating membership cards for all its members. The membership card must
include a photograph of the member, the member’s name and membership number, the type of
member (Senior or Junior), their date of birth and gender.

(a) Use the space below to design the membership card.

[5]

(b) Describe all the steps involved in carrying out a mail merge to create the membership cards.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


10

11 The Xtreme Adventure Holiday Company are setting up a spreadsheet for their payroll. They have
job codes for each of their employees. Below is part of the payroll spreadsheet.

A B C D E F G
1 The Xtreme Adventure Holiday Company
2
3
4
5 Job codes
6 A Administration/Office
7 B Snowboard Instructor
8 H Host/Hostess
9 S Ski Instructor
10 SA Senior Administrator
11 TA Transport Assistant
12 TB Trainee Snowboard Instructor
13 TM Transport Manager
14 TS Trainee Ski Instructor
15
16 Employees
17 Name Job code Job description
18 Luca Gisi B
19 Livio Stager S
20 Nico Gantert B
21 Fabian Ging S
22 Mattia Polt S
23 Sofia Walp H
24 Laura Haener S
25 Alessandro Messerli S
26 Lara Forrer B
27 Arda Hegler S
28 Simone Aebi B

(a) Describe, giving a suitable name for the range (A6:B14), how the payroll manager could name
this range.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2017 06_0417_12_2017_1.2


11

(b) Write a formula for cell C18 to display the job description, using the named range from part (a).

...........................................................................................................................................

........................................................................................................................................... [4]

12 When a new system is being developed analysis takes place. One method of researching the
current system is interviewing.

(a) List three other methods of researching the current system.

1.........................................................................................................................................

2.........................................................................................................................................

3.........................................................................................................................................

[3]

(b) Describe two drawbacks of using interviews.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


12

13 The introduction of computers in an organisation can both increase or decrease employment.

(a) Tick the jobs below for which the introduction of computers will increase the number of workers.

Job description tick


(✓)

Car production workers

Delivery drivers

Payroll workers

Programmers

Typists

Website designers

[3]

(b) Describe what is meant by the following types of working.

Compressed hours............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Flexible hours....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

14 There are different ways to check the data that you have entered into a computer system. One of
these ways is verification.

(a) Name two types of verification.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2017 06_0417_12_2017_1.2


13

(b) Proofreading is sometimes thought to be verification.

Explain the differences between verification and proofreading.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

15 Email systems can receive spam emails.

Explain why spam should be prevented.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


14

16 Bluetooth and WiFi can connect devices together.

Discuss the advantages and disadvantages of using Bluetooth or WiFi.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2017 06_0417_12_2017_1.2


15

BLANK PAGE

© UCLES 2017 06_0417_12_2017_1.2


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 06_0417_12_2017_1.2


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECNOLOGY 0417/12


Paper 1 Written May/June 2017
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages.

© UCLES 2017 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Any two from: 2


− Weighing scales
− Keyboard/key pad
− Bar code scanner/reader
− Chip reader/card reader
− Magnetic stripe reader
− Pin pad
− Light sensor (on conveyor belt)
− Touch screen

1(b) Any two from: 2


− Printer
− Screen/monitor
− Speaker/buzzer
− Warning light/lamp

Question Answer Marks

2 2
true false
(✓) (✓)
A router is required to allow a LAN to connect to the internet ✓
A web browser displays a web page ✓
An intranet has restricted access ✓
ISP means Internal Service Provider ✓

4 correct answers 2 marks


2 or 3 correct answers 1 mark
1 or 0 answers no marks

© UCLES 2017 Page 2 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3 4
technical user both
(✓) (✓) (✓)
Error messages ✓
Hardware requirements ✓
Program listing ✓
Purpose of the system ✓

Question Answer Marks

4(a) Crop 1

4(b) Resize 1

4(c) Text Wrapping 1

4(d) Rotate 1

Question Answer Marks

5(a) The sensor reads analogue data 3


The microprocessor can only process digital data
Analogue to Digital Converter is needed to convert the data

5(b) Any three from: 3


− More likely to be reliable as it is known that the device will work
− It is cheaper than paying full development costs
− It is quicker to get into operation as the device has been built
− Lower maintenance costs as faults will be known
− Lower costs for training staff

© UCLES 2017 Page 3 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) Any two from: 2


− Scan the pen drive for errors
− Medium is full
− Virus found on the file
− Bad sector/unable to save
− Device not recognised
− Read error

6(b) Differences 4

Max three from:


− Not every computer has a CD drive, but most PCs have a USB port
− A CDR can slip between papers and can be easily lost
− Pen drive are small and can easily slip out of a pocket
− Pen drive stores more data
− Pen drive is more robust
− Pen drive can be overwritten/edited/data erased
− Pen drive is solid state whereas CDR is optical

Similarities
− Pen drive and CDR are storage devices
− CDR and pen drive are portable

© UCLES 2017 Page 4 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7(a) proximity sensor 1

7(b) Any three from: 3


− Sat nav/GPS to help the driver travel between two points
− Auto-parking systems
− Automatic windscreen wipers that operate automatically
− Cruise control
− Lane drift systems
− Automatic braking systems/ABS
− Tyre deflation alert
− Automatic lights/lights that shine round corners
− Frost warning system
− Fuel level indicator
− Hand-brake alert
− Airbag systems
− Automatic maintenance alert
− Expert diagnostic systems
− Auto-gear change systems

7(c) Advantages 6

Max four from:


− The journey becomes a lot safer as the driver uses the devices to help, whilst they
focus on driving
− If the driver falls asleep then the car remains in control
− If the temperature is colder outside then the windscreen clears quickly
− The ABS stops the driver sliding on ice
− Automatic (full beam) lights stop other drivers getting dazzled
− Automatic lights (full beam) shows the road ahead in different conditions
− Cost of repair reduced as it tells the driver of problems immediately.
− The GPS can guide the driver on shortest/quickest route

Disadvantages
Max four from:
− The driver relies too heavily on the device and can become over reliant/You are
legally responsible for the car
− The device may fail and put the driver/pedestrians in danger
− Sometimes the device is more of a hindrance than a help e.g. parking sensors in
traffic jams
− Can increase the price of the car
− Very difficult for the driver to repair the car himself
− GPS can take the driver a long way out of his way when trying to avoid hold ups
− The driver can believe the GPS and drive into the river/narrow road.
− Air bags can accidentally trigger is there is a small collision/they have a life span
− Excessive number of devices/devices left activated can lead to battery drain

Allow one mark can be awarded for a reasoned conclusion.

© UCLES 2017 Page 5 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

8(a) 2
tick
(✓)
Control unit
Graphics program
Inference engine ✓
RFID
Rules base ✓
Search engine

8(b) Any three from: 3


− An expert system may help the doctor make a more accurate diagnosis
− An expert system uses data from many experts therefore it contains more
knowledge than a single doctor
− Cheaper than regularly re-training the doctor
− The expert system's knowledge may be more up to date than the knowledge of a
single doctor
− Cheaper than employing many specialists
− The diagnoses given are more consistent

© UCLES 2017 Page 6 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

9(a) Any four from: 4


− Open database
− Create new table of pupil data
− Create new table of examination data
− Select primary and foreign keys
− Link the two database tables using a primary/foreign key...
− «and a foreign/primary key
− Set up the relationship
− Import the data for the pupils from the pupil records
− Import the data from the examinations from the examination boards

9(b) 4
Field name Data type

Examination_ID Text

Name_of_subject Text

Examination_level Boolean

Date_of_exam Date

9(c) Date_of_exam>26/06/2018 or Date_of_exam>=27/06/2018 2

1 mark for Date_of_exam


1 mark >26/06/2018 or 1 mark >=27/06/2018

9(d) 1 mark for name of suitable check and 1 mark for description of suitable check 4

Examination_ID
Length check
The data must be exactly 6 digits /characters

Date_of_exam
Range check
The dates must be a range specified

Or

Format check/picture check


Must be in the form 2 digits slash 2 digits slash 4 digits

© UCLES 2017 Page 7 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

10(a) Max two from: 5


− Appropriate field spacing
− Use of white space and is clearly a hard copy membership card
− Size of photograph – not too small
− Title of the Leisure Centre
− Additional elements like bar code/ signature

And

1 mark for the photograph

And

1 mark for three items o r 2 marks for all five items

10(b) Any five from: 5


− Create a master document (membership card)
− Create/use a data source
− Check the membership cards for errors
− Place tags in the document
− Link the fields with the tags
− Select the records to merge
− Merge the records and save
− Check the data on the cards is correct
− Preview/Print the cards

Question Answer Marks

11(a) Max two from: 3


− Select range/(A6 to B14)
− Click on the name box/select define name
− Type/enter in the name of the range

And

1 mark for an example of a suitable name

11(b) VLOOKUP(B18, named range,2) 4

1 mark for VLOOKUP( )


1 mark for B18,
1 mark for use of named range from part (a)
1 mark for ,2

© UCLES 2017 Page 8 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

12(a) Observation 3
Questionnaire
Examination of documents

12(b) Any two matched pairs: 4


− The interviewee may be uneasy with the questioning«
− «.as it is not anonymous
− Time consuming to interview all the users«
− «the interviewers are carried out one at a time
− Both the interviewee and the interviewer have to be free at the same time«
− «which can cause time problems
− May be a language problem«
− «this increases the time explaining all sections
− May give an answer they think the interviewer is trying to elicit«
− «the interviewer could be biased/leading questions
− Disillusioned workers may give an answer that jeopardises the project«
− «they could give a biased view/too vocal
− They cannot give the answer they want«
− «as the interview is not anonymous/due to peer pressure
− Costly to the employers«
− «time for the worker being off job

© UCLES 2017 Page 9 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

13(a) 3
Job description tick
(✓)
Car production workers
Delivery drivers ✓
Payroll workers
Programmers ✓
Typists
Website designers ✓

13(b) Compressed hours 4

Any two from:


− The worker completes the normal working hours per week«
− «but works for fewer days
− For example, a 40-hour week compressed into 4 days not 5

Flexible hours

Any two from:


− Workers complete the same number of hours over a working week«
− «but can choose when to start and end in agreement with the manager
− Allows for workers to complete the school run or miss rush hour

Question Answer Marks

14(a) Double data entry 2


Visual verification

14(b) Any one from: 2


− Visual verification involves the data being compared with the original copy
− Double entry involves re-entering the data
Any one from:
− Proofreading only involves reading through the document
− Proofreading is looking for spelling mistakes/grammar

Question Answer Marks

15 Any two from: 2


− Spam could contain viruses
− Spam could contain spyware that record your key depressions«
− ...this could send messages out to alert others that the email address is live
− Spam can fill up your inbox
− Spam may have links to fraudulent websites

© UCLES 2017 Page 10 of 11


0417/12 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

16 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. There will be a
reasoned conclusion. They will relate the answer to both Bluetooth and WiFi. The
information will be relevant, clear, organised and presented in a structured and
coherent format.

Level 2 (4–6 marks):


Candidates will expand on advantages/disadvantages relating the answer to both
Bluetooth and WiFi. Some of the points may be one sided. There may be a conclusion.
For the most part the information will be relevant and presented in a structured and
coherent format.

Level 1 (1–3 marks):


Candidates only list an advantage/disadvantage. Candidates only refer to Bluetooth or
WiFi. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content

Answers may make reference to, for example:


Bluetooth is more useful when transferring data between two devices whereas WiFi is
more suited to full scale networks
Bluetooth does not buffer
The devices connected via Bluetooth should be near to each other whereas WiFi has a
larger range
Less data tends to be transferred with Bluetooth
Bluetooth uses a lower bandwidth
Eg sound data (phones) or file transfer (computers)
WiFi has better security than Bluetooth
Cost of Bluetooth is cheaper than WiFi
Bluetooth has a shorter password
Bluetooth devices are battery operated which needs to be replaced or recharged but
WiFi do not necessarily use batteries
To connect to the network need a Bluetooth adapter but WiFi needs a WiFi adapter, a
wireless router and a wireless access point
Bluetooth range is approx. 20m whereas WiFi is approx. 100m
Bluetooth is simple to use and setup but WiFi is more complex
Bluetooth/Wifi are both wireless can’t fall over the wires/move around the house
Saves money (on cables) as both do not require wires
Bluetooth is more energy efficient than wifi
in some cases 3% of the energy

© UCLES 2017 Page 11 of 11


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*4354055157*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2017
2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

MODIFIED LANGUAGE

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages and 3 blank pages.

06_0417_13_2017_1.1
© UCLES 2017 [Turn over
2

1 Using the list, write down the most appropriate output device to produce the following.

3D printer dot matrix printer graph plotter keyboard


monitor mouse speaker SSD

(a) High resolution drawings in hard copy.

........................................................................................................................................... [1]

(b) Sound from a computer.

........................................................................................................................................... [1]

(c) A solid object.

........................................................................................................................................... [1]

(d) Scenes from a video game.

........................................................................................................................................... [1]

2 Tick whether the following statements are true or false.

true false
(✓) (✓)

An actuator is an item of software.

Hardware is the physical components of a computer system.

Software controls the operation of the computer.

A spreadsheet is an example of systems software.

[2]

© UCLES 2017 06_0417_13_2017_1.1


3

3 The following icons are used on the slides in presentation software.

Write down the most appropriate meaning for each icon.

Icon Meaning

[4]

4 Different terms are used in document production.

Complete the following sentences.

(a) The unit used to measure the size of a font is called

........................................................................................................................................... [1]

(b) A page can be portrait or landscape. This is called

........................................................................................................................................... [1]

(c) The special margin that is placed at the top or edge to clear the text from the fold in a page is
called the

........................................................................................................................................... [1]

(d) When the first line of a paragraph appears as the last line of a page this is called

........................................................................................................................................... [1]

© UCLES 2017 06_0417_13_2017_1.1 [Turn over


4

5 People can manage their bank accounts in different ways. One way is telephone banking.

(a) A person wishes to use telephone banking without speaking to an operator to transfer money
from one bank account to another.

Describe the steps needed to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) When a debit card is read by computer, data on the card can be used for transactions.

List four items of data found on a debit card which can be read by computer.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2017 06_0417_13_2017_1.1


5

6 Midwest School library has a database system. Students who borrow books present their library
cards containing their details. The librarian wishes to improve security by introducing biometric
methods.

(a) Name two direct input methods the cards could use.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) Give two examples of biometric input.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(c) Name and describe in detail the files the library database system would use.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_13_2017_1.1 [Turn over


6

(d) The fields date_borrowed and date_due_back are contained in the database.

The date_due_back field is calculated from the date_borrowed field. The student can borrow
a book for 14 days.

Write a formula for the calculated field date_due_back.

...........................................................................................................................................

........................................................................................................................................... [2]

7 A school is creating a spreadsheet as a method of recording academic performance of students in


IGCSE Geography.

The spreadsheet lists each student’s name and their target level. The levels range from 1 to 9,
where 9 is the best level.

Teachers enter the current working level. If the working level is the same or better than target level
then ‘‘well done’’ is displayed in the comment cell, otherwise ‘‘needs improvement’’ is displayed.

A B C D E F G
Target Working
1 Name Comment
Level Level
2 Peter Smith 9 6
3 Frances Brown 5 7

(a) Write a formula for cell E2 to automatically display ‘‘needs improvement’’ or ‘‘well done’’.

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2017 06_0417_13_2017_1.1


7

(b) The school is going to use the data from the spreadsheet in its reports to parents. The school
plans to mail merge the report with the data.

Describe four advantages of using mail merge.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) The teacher needs to check the data source and template before the data is merged.

Describe three checks that need to be done.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2017 06_0417_13_2017_1.1 [Turn over


8

8 A club is setting up a database to store details of its members.

(a) Complete the data dictionary of the database, adding the most appropriate data type for each
field.

Field name Data type

Membership_number Number

Member_name

Membership_fee_paid Boolean

Telephone_number

Expiry_date_of_membership

Membership_fee_amount

[4]

(b) The club secretary wishes to find all the junior members who have paid their membership fee
which would be less than $100.

He searches for these members by typing in the following search criteria.

Membership_fee_amount < 100 AND Membership_fee_paid ="Y"

He now wishes to invite selected members to a special evening. These members will be those
with a membership number over 200 as well as members whose membership expiry date is
before 1 Jan 2017.

Write search criteria to list all the members that should be invited.

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2017 06_0417_13_2017_1.1


9

(c) Discuss the benefits and drawbacks of storing membership details on a computer database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

9 Describe the differences between ROM and RAM.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2017 06_0417_13_2017_1.1 [Turn over


10

10 Using computers can cause problems for the health and safety of users.

(a) Evaluate your own use of computers in terms of health. Include any strategies you have
devised.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Name three safety issues associated with your use of computers. For each issue describe a
way of minimising the risk.

1.........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2017 06_0417_13_2017_1.1


11

11 Systems can be implemented in different ways; one of these is direct changeover.

Name three other methods of implementation. For each method give an advantage when compared
with direct changeover.

1 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

[6]

12 With the increased use of the internet, software copyright rules are being broken more often.

(a) Explain what is meant by software copyright.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Software piracy is one major consequence of the failure to comply with copyright rules.

Describe the ways software can be protected from piracy.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_13_2017_1.1 [Turn over


12

13 Key-loggers are thought to be security risks but they can be used to monitor and track the use of
employees on a computer system.

(a) Describe how a key-logger monitors computer usage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) A small minority of employees in a company have been using the computers for non-business
use, so the company has had to introduce other methods of monitoring their use of ICT.

Apart from key-logging list three other ways that employees could be monitored in their use
of ICT.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2017 06_0417_13_2017_1.1


13

14 Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.

Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2017 06_0417_13_2017_1.1


14

BLANK PAGE

© UCLES 2017 06_0417_13_2017_1.1


15

BLANK PAGE

© UCLES 2017 06_0417_13_2017_1.1


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 06_0417_13_2017_1.1


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2017
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages.

© UCLES 2017 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) graph plotter 1

1(b) speaker 1

1(c) 3D printer 1

1(d) monitor 1

Question Answer Marks

2 true false 2
(✓) (✓)

An actuator is an item of software. ✓


Hardware is the physical components of a computer system. ✓
Software controls the operation of the computer. ✓
Spreadsheet is an example of systems software. ✓

2 marks for 4 correct ticks


1 mark for 3 or 2 correct ticks
0 marks for 1 or 0 correct ticks

Question Answer Marks

3 4
Icon Meaning
Home

Next Slide

Final Slide

Print

Question Answer Mark

4(a) point 1

4(b) page orientation 1

4(c) gutter 1

4(d) orphan 1

© UCLES 2017 Page 2 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5(a) Any six from: 6


− User telephones the bank telephone centre
− System asks for the long number on the credit / debit card / sort code and
account number / customer ID number
− The user taps out on the phone keypad / speaks the number
− System asks for certain characters in a password
− The user taps out the characters asked for
− System rejects the password
− The user re-enters the characters
− After three attempts the telephone connection drops
− System asks other security answers
− The user taps it in / speaks the answer
− System asks which service you require / options given
− Users tap in the number (transfer from one account to another)
− System asks number of account transfer from
− User taps in account number
− System connects with the bank account
− System asks for number of account transfer money to
− User taps in account number
− System asks amount to transfer
− User taps in the amount
− System asks when the transfer should happen
− The user taps in the date
− System ask you to confirm it/sends a text message / send email

5(b) Any four from: 4


− Sort code
− PIN
− Debit card number
− Bank account number
− Valid from
− Expires end

© UCLES 2017 Page 3 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) Any two from: 2


− Magnetic stripe
− RF / RFID
− Chip
− Bar code

6(b) Any two from: 2


− Fingerprint / Thumbprint
− Retina scan
− Voice
− Hand print
− Iris scan
− Face scan / recognition

6(c) Any two matched pairs: 4


− Book file«
− «This consists of all data on the books in the library

− Borrowers file«
− «This contains all the details of the students

− Loans file«
− «This acts as a link between the book and borrowers file. It contains the
details of the date borrowed and return date

6(d) [date_borrowed]+14 2

1 mark for [date_borrowed]


1 mark for +14

© UCLES 2017 Page 4 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7(a) =IF(D2>=C2,”well done”,”needs improvement”) 3

1 mark for IF(D2>=C2,


1 mark for “well done”,
1 mark for “needs improvement”)

7(b) Any four from: 4


− Faster than editing each individual letter
− Fewer errors than retyping the data
− The data can be used for other applications
− The report template can be easily adapted for other mail merges
− Consistency in the reports
− Error checking only needs to be carried out once (on the data and the
template)
− Reduces the time taken to write out all the reports separately

7(c) Any three from: 3


− Spell check the master document
− Grammar check the master document
− Check consistency of the text
− Check merge fields are in the correct places
− Check the template and merge fields matches the house style
− Proof reading the data in the data source/check the data is correct
− Check the data source exists
− Validate the data in the data source

© UCLES 2017 Page 5 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

8(a) Field name Data type 4

Membership_number Number
Member_name Text
Membership_fee_paid Boolean
Telephone_number Text
Expiry_date_of_membership Date
Membership_fee_amount Currency

8(b) Membership_number > 200 OR Expiry_date_of_membership < 01/01/2017 5

1 mark for Membership_number


1 mark for > 200
1 mark for OR
1 mark for Expiry_date_of_membership
1 mark for < 01/01/2017

8(c) Benefits 6

Max five from:


− Membership details can be searched / sorted very quickly
− «useful if there are hundreds of members

− Membership details can be easily edited«


− «by searching for a record then changing / adding / deleting

− The data in the database can be backed up easily«


− «therefore preserving the records
− «creating an archive of past members

− Far more secure than other methods«


− «can be password protected

− Can be used as a source for mail merging«


− «saves re-writing the database

− Re-writing the data each time it is used would cause errors


− Re-writing the data each time it is used could take a lot of time

Drawbacks

Max five from:


− Need IT skills
− Need to have to correct software
− Can take up a lot of storage space / memory in the computer
− The software could be expensive to buy
− Training on how to use the software«
− «could be expensive for the club

One mark available for a reasoned conclusion

© UCLES 2017 Page 6 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

9 Any four from: 4


− ROM can only be read from whereas RAM can be read and written to
− ROM is non-volatile whereas RAM is volatile
− ROM stores the start-up instructions / boot file whereas RAM stores the
current instruction
− ROM is needed on boot up, whereas RAM is needed during processing /
storing data

Question Answer Mark

10(a) Max 3 marks for the problems 6


Max 3 marks for the strategies of solving the associated problems

for example:

using the computer for a long period of time can affect my eyes/cause
headaches...
...take regular breaks to help with eye strain/headaches

hunching over the computer for a long period of time gives back ache/neck
ache...
...Using an ergonomic chair could stop this

Typing for a long period of time or by resting wrists on the table gives RSI...
...therefore a wrist rest/ergonomic keyboard is needed to reduce this.

Eye strain can be caused by looking at the screen too long«


«this is solved by placing a screen filter/using TFT technology

10(b) Any three matched pairs, for example: 6


− Tripping over loose wires«
− «tie them to the walls or under carpet / use cable runs / use wireless

− Heavy equipment falling«


− «sturdy tables needed / heavy equipment placed in centre of table

− Electrocution caused by spilt drinks / food«


− «do not take drinks to computer

− Fire from overloaded sockets«


− «use CO2 fire extinguisher
− ...don’t use 4 way adapters
− «keep the computer room well ventilated

© UCLES 2017 Page 7 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

11 1 mark for method, 1 mark for appropriate advantage. 6

Parallel running...
...has a backup of the data

Pilot running...
...only affects one branch if system goes wrong/other branches can learn from the
branch's mistakes

Phased implementation...
...if system fails still have most of old system to fall back on
«staff can be trained gradually

Question Answer Mark

12(a) Any two from: 2


− Protection of software from being downloaded, copied, or borrowed...
− ...without the owner’s consent
− Protects the author of the software

12(b) Any four from: 4


− When the software is bought it comes with a unique activation code...
− ...this can only be used once and has to be typed in
− ..on a limited number of machines

− Use of holograms...
− ...this shows that the software is a real copy
− ...holograms cannot be photocopied

− Use of licence agreements


− The purchaser fills in a licence agreement
− ...and agrees to abide by the rules

− Execution of the encryption code requires a key to run

− Use of a dongle
− Guards hardware / software modules that have not been tampered with in
any way

− Digital signature on the CD

© UCLES 2017 Page 8 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

13(a) Any two from: 2


− A key-logger records the key strokes of a person using the computer
− Transfers / transmits the data back to the supervisor / manager
− The supervisor can then monitor what the employee has been doing / how
hard they have been working

13(b) Any three from: 3


− Monitoring phone call usage
− Monitoring emails
− Monitoring the time spent on and websites visited
− Monitoring the use of printers / number of copies
− Monitoring where employees log in / log out
− Monitoring when employees log in / log out
− Monitoring failed log ins
− Monitor the amount of storage space used
− Monitoring where they send data to print

© UCLES 2017 Page 9 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

14 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. There will be a
reasoned conclusion. They will relate the answer to both advantages and
disadvantages. The information will be relevant, clear, organised and presented
in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will expand on advantages/disadvantages relating the answer to both
advantages and disadvantages. Some of the points may be one sided. There
may be a conclusion. For the most part the information will be relevant and
presented in a structured and coherent format.

Level 1 (1–3 marks):


Candidates only list an advantage/disadvantage. Candidates only refer to either
advantages or disadvantages. Answers may be simplistic with little or no
relevance.

Level 0 (0 marks)
Response with no valid content

Answers may make reference to, for example:


Advantages
Simple to use as all have to do is hold the phone by the reader
No swiping of a card so less damage to the card
Faster method than swiping the card
No PIN
No signature
Stops shoulder surfing
As the credit card does not have to be physically present it cannot be stolen
The credit card number is not used in transactions
«stores do not gain access to names and numbers
No tracking of the data as there is no card
Several cards can be stored and selected
Everyone carries a phone nowadays
Doesn’t matter if you forget credit/debit card

Disadvantages
Need a compatible phone
Not available online
Stores need the reader
May be issues with connectivity as a phone is used
Hackers accessing the phone signal
Phones can run out of battery
There is a limit on how much can be paid
Older people may not have phones
More difficult for older people to use

© UCLES 2017 Page 10 of 10


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 2 2 0 9 4 6 7 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

DC (CE/FC) 132682/3
© UCLES 2017 [Turn over
2

1 Tick whether the following statements would apply to a LAN, a WAN or a WLAN.

LAN WAN WLAN


(3) (3) (3)
The internet is an example of this type of network

A wired network found within a single building

This network uses wireless technology

This network is spread over a large geographical area


[4]

2 Complete the following sentences, using the most appropriate technology from the list below.

a 3D printer artificial intelligence batch processing biometrics

a dot matrix printer a microphone a password a robot

a scanner a speaker

(a) A printer that is capable of producing physical objects is called

...............................................................................................................................................[1]

(b) The use of a computer to perform tasks that mimic or duplicate the functions of the human
brain is called

...............................................................................................................................................[1]

(c) A device used in a car production line to assemble a car is called

...............................................................................................................................................[1]

(d) Authentication techniques that use fingerprints or retina scans is called

...............................................................................................................................................[1]

© UCLES 2017 0417/12/O/N/17


3

3 A school is holding an athletics competition. The timings of each running event will be measured
electronically using sensors at the start and finish. Runners begin a race in starting blocks. When
the starting pistol is fired the electronic timing starts. The winner of the race is the first to break the
light beam at the end of the race.

(a) Complete the table using the most appropriate words from the list below.

Infra-red sensor Light sensor Moisture sensor Motion sensor

pH sensor Pressure sensor Sound sensor Temperature sensor

Device
Data from the starting pistol is read by this
device
This device detects that the athlete has left
the starting block
When the light beam is broken the data is
read by this device
[3]

(b) A member of the sports department will use a computer to produce a magazine of the
competition. He will include photographs stored in a digital camera as well as printed
photographs.

Identify the methods he would use to transfer the photographs to the computer.

Digital camera photograph �������������������������������������������������������������������������������������������������������

...................................................................................................................................................

Printed photograph �������������������������������������������������������������������������������������������������������������������

...................................................................................................................................................
[2]

© UCLES 2017 0417/12/O/N/17 [Turn over


4

4 You have been asked to set up a hierarchical folder structure for your IGCSE ICT work directories
so that you can easily locate certain files.

(a) Fill in the boxes and complete the most appropriate hierarchical folder structure, to store
practical and theory work for both homework and classwork.

ICT

[2]

(b) Complete the file path for a document called input_devices.rtf stored in box A.

...............................................................................................................................................[1]

5 (a) Describe the processes a web browser has to go through to load a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/12/O/N/17


5

An organisation is creating a company website and is deciding whether to make it available on the
internet or create a company intranet. The website will contain confidential information.

(b) Explain why they should use an intranet rather than the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 0417/12/O/N/17 [Turn over


6

6 Using the images below write down the Safety issue referred to and a way of Minimising the
risk.

Image Safety issue Minimise the risk

[8]

© UCLES 2017 0417/12/O/N/17


7

7 One popular reason for young people using the internet is playing online games. One way of
ensuring that young people are safe is to use fictional names to identify themselves.

Describe other measures that should be taken to ensure that playing online games is safe for
young people.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17 [Turn over


8

8 Hot House Design keeps to a corporate house style when creating a website.

Web page 1

Web page 2

Using examples from the two webpages, explain what is meant by house style.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17


9

9 The internet is used as a method of communication. This includes Blogs, Wikis and VOIP.

(a) Describe the following ways of communicating.

(i) Blog

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Wiki

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) VOIP

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) The internet has a number of security issues.

Tick whether the following statements would apply to Phishing, Pharming or Smishing.

Phishing Pharming Smishing


(3) (3) (3)
The sending of fraudulent emails appearing to
come from legitimate companies in order to steal
passwords
Redirecting users to a bogus website that looks
authentic
Security attack where a user is tricked into
downloading a virus on to a cell phone
As the user types details they are stored by the
criminal
[4]

© UCLES 2017 0417/12/O/N/17 [Turn over


10

10 The Ocean Sailing Company offers the experience of sailing on a yacht. Customers can choose
which type of yacht they want to sail on. The owner keeps a spreadsheet to calculate the cost
to customers. The owner allocates a loyalty code to each customer. Each code has a different
discount.

A B C D E
1 Holiday Cruises
2
3 Code Discount Cost per day 500
4 1 0.05
5 2 0.1
6 3 0.125
7

Number
8 Name of Yacht of days Percentage Discount Discount
9 1 Ocean Speed 7 =VLOOKUP(A9,$A$4:$B$6,2)
10 2 Sealord 5
11 3 Sunliner 5
12 1 Pacifico 10
13 2 Alexander 14
14 3 Moonliner 5
15 2 Coronia 7
16 2 Voyager 5

(a) Explain each element of the formula in cell D9.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Identify the value you would expect to see in cell D9.

...............................................................................................................................................[1]

(c) The Discount is the cost per day multiplied by the number of days multiplied by the
Percentage Discount.

Write a formula that would be entered in cell E9 to calculate the Discount.

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/O/N/17


11

(d) The $ symbol is used in the formula in cell D9.

Name this type of referencing and explain why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(e) The Ocean Sailing Company owns a number of yachts.

Explain how you could replicate the formulae to calculate the Percentage Discount and the
Discount for each yacht.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/O/N/17 [Turn over


12

11 A theatre manager wishes to introduce an online booking system. A programmer has been asked
to write the software. She could continue on her own or discuss the ideas with the theatre manager.

(a) Explain why is it beneficial to discuss ideas with the theatre manager before writing the
software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give four advantages of using online booking systems for the customer rather than using
manual systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2017 0417/12/O/N/17


13

12 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.

Give three disadvantages to the customer of using these cards at an ATM.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

13 A travel agent specialising in adventurous holidays has asked a systems analyst to recommend a
new computer system for their records. The systems analyst’s first task is to research the current
system.

(a) Identify three methods of researching the current system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) The company has decided to set up a website to publicise its holidays.

Name three appropriate types of object that could be inserted into the web page.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2017 0417/12/O/N/17 [Turn over


14

14 A robot is used as a computerised postal delivery system. It drives around the corridors of a set of
offices picking up and delivering post. If the robot is close to a worker it stops and waits until the
worker moves away.

(a) A proximity sensor is used to detect how close to a worker the robot is.

Describe the role of the microprocessor in stopping the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Robots are being used more and more in offices to carry out menial tasks, like delivering
post.

Describe the advantages and disadvantages of using robots in this way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17


15

15 A word processing program uses a Graphical User Interface (GUI). Using examples from the word
processing program describe three features of a GUI.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

16 The banking industry has rapidly changed over the last few years as modern technology has
developed.

Discuss the advantages and disadvantages of using online banking rather than other banking
methods to the customer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 0417/12/O/N/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 0417/12/O/N/17


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written October/November 2017
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1 LAN WAN WLAN 4


(3) (3) (3)
The internet is an example of this type of network 3
A wired network found within a single building 3
This network uses wireless technology 3
This network is spread over a large geographical 3
area

Question Answer Marks

2(a) a 3D printer 1

2(b) artificial intelligence 1

2(c) a robot 1

2(d) biometrics 1

Question Answer Marks

3(a) Device 3

Data from the starting pistol is read by Sound sensor


this device
This device detects that the athlete has Pressure sensor
left the starting block
When the light beam is broken the data Infra-red sensor
is read by this device

3(b) Digital camera photograph – use a USB connection/insert the memory 2


card/use a memory card reader/download the photograph from the cloud/use
bluetooth connection/use wifi connection/connect a cable

Printed photograph – scan the image/use a scanner/photograph the image


using a digital camera

© UCLES 2017 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4(a) 2
ICT

1
2

1 mark writing practical/theory or classwork/homework in level 1


1 mark for writing practical/theory or classwork/homework in level 2

or
1 mark for three correct boxes, for example 1, 2 and 2

4(b) For example: 1


ICT\Theory\Classwork\input_devices.rtf

Must be follow through from part (a)

Question Answer Marks

5(a) Any two from: 2


Request made by entering a web address/URL or clicking on a link
Retrieves code from the server/resources downloaded
Interprets the code as a web page/uses page resources to build page
The web page is displayed/renders page to view

5(b) Any six from: 6


An intranet has restricted access/private network therefore public cannot gain
access/the internet is public access
The intranet is protected by passwords/More chances of hacking on the
internet
The intranet has reduced unauthorised access to material
The material may be sensitive on the intranet
Intranet only used in the organisation/internet is world wide
An intranet will only contain relevant information for the company
The company has more control of data on an intranet
An intranet is policed or managed/the internet has no rules
The data on an intranet is moderated/the internet is not moderated

© UCLES 2017 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6 Image Safety issues Minimise the risk 8

Tripping over trailing Any one from:


wires/cables Use covered cable
runs
Tie cables to wall
Cover cables with
carpet
Use wireless
Organise wires
Electrocution from Any one from:
spilling drinks Do not take
drinks/food into
computer room
Keyboard covers

Fire from overloaded Any one from:


sockets One plug per
socket/reduce the
load on the socket
Use of RCB
Fire from Any one from:
overheating Use of CO2 fire
extinguishers
Fans and cooling
from open
windows/good
ventilation

Question Answer Marks

7 Four from: 4
Be vigilant of others attempting to gain access to your data
Use up to date internet security software«
«antivirus, anti-spyware, firewall
Avoid giving out personal data (not name)
e.g. password, home address, email, age, (mobile)phone number
Be aware of addiction e.g. playing for too long
Be aware of hidden costs«
«read terms and conditions
Play authorised games that have a licence/trusted sites
Choose a user name that does not contain personal information
Use strong passwords
Keep the game up to date
Do not use identifiable images

© UCLES 2017 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8 Any four from: 4


Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar therefore showing it is part of the same
company
Graphics are similar
Logos are the same
Language used is the same on all documents within the group
Position of the images are the same
Blackline at the top with contact details
Same type of icon
Icons in same place on a white background
Use of branding

Question Answer Marks

9(a)(i) Any two from: 2


Regularly updated
Website or web page
Run by an individual or small group/owner can only edit it
Written in an informal or conversational style
Online journal/diary/personal opinions

9(a)(ii) Any two from: 2


A website or database
Collaboration by a community of users/members of a group
Allowing any member to add and edit content.

9(a)(iii) Any two from: 2


Voice Over Internet Protocol
Method for the delivery of voice communications over Internet /Internet
Protocol/ IP networks
Examples: IP/internet/broadband telephone/broadband phone service.

9(b) Phishing Pharming Smishing 4


(3) (3) (3)
The sending of fraudulent 3
emails appearing to come from
legitimate companies in order to
steal passwords
Redirecting users to a bogus 3
website that looks authentic
Security attack where user is 3
tricked into downloading a virus
on to a cell phone
As the user types details they 3
are stored by the criminal

© UCLES 2017 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

10(a) Any three from: 3


VLOOKUP looks at the value in A9
A9 is the lookup value
$A$4:$B$6 – this is the lookup range
2 is the index value

or any three from:


It looks up value of A9
In the range $A$4:$B$6
And retrieves the corresponding value
In the second column of the range

10(b) 5%/0.05 1

10(c) For example (($E$3*C9)*D9) or 500*C9*D9 3

1 mark for $E$3


1 mark for *C9
1 mark for *D9

10(d) Absolute referencing 1 mark 3

Any two from:


If the formula is dragged down the column/replicated
Then the cell reference (associated with the $) does not change
So the user does not need to type in each formula separately

10(e) Three from: 3

Either
Highlight cells D9 / E9 / D9 and E9
Right click and copy
Highlight cells D10 to D16/ E10 to E16
Right click and paste formulas
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Click the black square/drag handle«
«Drag down to row 16
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Fill down...
...to cell D16/E16
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Double click/click F4 on the keyboard the black square/drag handle
Check values are correct

© UCLES 2017 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

11(a) Four from: 4


The programmer will not be familiar with the workings of the theatre/to
understand the requirements of the system
The solution may be easy for the programmer to use but not the users/make
it user friendly
The theatre manager is paying the programmer
The theatre manager may want enhancements that the programmer has not
thought of
The progress of the solution needs to be checked with the theatre manager
«in case the he/she changes his mind
The budget needs to be discussed (as it may involve purchasing new
hardware/software)
The timescale needs to be discussed

11(b) Any four from: 4


Speeds up the booking process
Customers may not have to travel to the theatre so save money in travelling
Customers may not have to travel to the theatre so save time in
travelling/queuing
Postage costs could be reduced
Can make/cancel/change a booking at any time
Can book several shows at same time
Booking can be carried out anywhere

Question Answer Marks

12 Any three from: 3


The card may be read accidently
Only small amounts can be withdrawn
More chance of fraud if card is stolen/lost
May not be able to use the ATM as not everyone will be contactless due to
cost
Devices can read the cards wirelessly to steal money

Question Answer Marks

13(a) Any three from: 3


Observation of the users
Interviewing the manager
Questionnaires given out to users
Examination of existing documents

13(b) Any three from: 3


Text
Static images
Moving images/animation/video
Sound

© UCLES 2017 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

14(a) Five from: 5


The data from the sensor is compared to the pre-set value
The pre-set value is set to show the minimum distance of the worker
If the values are the same/lower«
«the microprocessor sends a signal«
«to the actuator to stop the motor/robot
The microprocessor starts a timer
After a short while the microprocessor restarts the robot
The microprocessor stops the timer
If the values are different/higher
«the microprocessor does nothing/robot keeps moving
The process is continuous

14(b) Any three advantages: 4


Overall wage bill is reduced as there are fewer workers
Productivity is higher/the robot can work all day long therefore is more
efficient
It has a set path/route to follow which means that staff know when it is due
GPS can be used to show where it is in the building
Less expensive in the long run/doesn’t get paid
Less mistakes are made/more accurate
Allow humans to do more skilled work
Greater consistency
Work 24/7/without breaks

Any three disadvantages:


The cost of buying/set up robot is expensive
It can only carry out one task
Stairs can be a problem
Payload size can be an issue
Expensive to maintain (only if Less expensive in the long run
has not been given)
Replace labour, leads to increased redundancy payments

Maximum 4 marks.

Question Answer Marks

15 Any three from: 3


A window plus reasonable example
An icon/buttons/tabs plus reasonable example
A menu/drop down menu plus reasonable example
Pointer (to point to items on the menu) plus reasonable example

© UCLES 2017 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

16 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. The issues
raised will be justified. There will be a reasoned conclusion. The information
will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 (4–6 marks):


Candidates will give both advantages and disadvantages. The issues raised
may be justified. There may be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks):


Candidates may only give either advantages or disadvantages. Candidate
might not give reasons. Answers may be simplistic with little or no relevance

Level 0 (0 marks)
Response with no valid content

The following are examples only:


Due to laptops/tablets/smart phones banking can take place on the move
therefore there is no need to go to a bank
Fewer banks are available to customers
Non IT literate user/ users without equipment will have less access to banking
Need to purchase a computer
Need internet/broadband connection
There is a chance of bank fraud due to devices being used
There is little physical money
Physical money cannot be withdrawn or deposited
Could mismanage account/make a mistake by pressing wrong button
Requires stable internet connection, to ensure is doesn’t disconnect midway
through a transaction
Available 24/7
Available anywhere your computer can get an internet connection
Saves customers money by not having to travel to the branch
Saves customers time by not having to travel to the bank or stand in queues.

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 7 2 1 6 6 7 7 4 2 9 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

DC (CE/FD) 132683/3
© UCLES 2017 [Turn over
2

1 Complete the sentences, using the most appropriate item from the list.

a Blu-ray disc a compact disc a hard disk a magnetic tape

a memory card a pen drive a processor RAM

ROM a solid state drive

(a) Optical storage medium that is often used to store HD movies is called

...............................................................................................................................................[1]

(b) Internal memory where the data cannot be changed is called

...............................................................................................................................................[1]

(c) Magnetic medium which can only be used for serial access is called

...............................................................................................................................................[1]

(d) Internal memory that is volatile is called

...............................................................................................................................................[1]

2 Tick whether the following are examples of application or system software.

application system
(3) (3)
Linker

Database management systems

Photo-editing software

Compiler
[2]

3 Tick whether the following statements are true or false.

true false
(3) (3)
CRT monitors use more power than TFT monitors

A touch screen can be used as an input device or an output device

A dot matrix printer produces high quality graphics

A motor is an input device


[2]

© UCLES 2017 0417/13/O/N/17


3

4 Tick three ways in which data entry can be verified.

Tick
(3)
Compare with source document
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document
Ensure the data is 100% accurate
Type in the data twice and compare versions
Calculate a check digit
Check spelling
[3]

5 Identify three ways in which employment patterns have changed since the introduction of ICT.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2017 0417/13/O/N/17 [Turn over


4

6 Peter was asked to resize an image to fit a space in a document. The image before the change
and the image after the change are shown below.

The image before the change The image after the change

(a) Describe the steps Peter used to resize the image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Peter has been asked to remove some of the sky in the image.

Identify the formatting technique Peter would use to do this.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Having created the document, Peter needs to email it to his teacher. The file is too large for
the email attachment. The file size must be reduced so it can be attached to the email.

Describe the steps required to carry out this process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/13/O/N/17


5

7 An electricity company has created a new computer system to produce its bills.

After the system was implemented a number of customers complained about very expensive bills.

Each module was tested in the system using validation checks.

(a) Explain what other testing should have been carried out before the system was implemented.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Prior to implementation the management was undecided over the method of changeover to
be used.

Explain why the management would choose direct changeover rather than parallel running.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/13/O/N/17 [Turn over


6

8 Data transmitted through the World Wide Web can be protected by encryption.

(a) Explain what is meant by encryption of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Explain what is meant by a digital certificate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

9 Shopping often requires the use of a credit card.

(a) Give three methods of reading the data from the credit card.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2017 0417/13/O/N/17


7

(b) Shopping for groceries using the internet has become popular and is replacing more traditional
types of grocery shopping.

Describe the advantages and disadvantages of grocery shopping using the internet rather
than other methods.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

10 (a) A website uses anchors.

Describe what an anchor is and how it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Write the HTML markup to create an anchor called “Top”.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) State the main purpose of a web browser.

...................................................................................................................................................

...............................................................................................................................................[1]
© UCLES 2017 0417/13/O/N/17 [Turn over
8

11 A school library has computerised its book borrowing system. Students are allowed to borrow
books free of charge.

(a) When a book is borrowed the details of the book and the borrower have to be input to the
system.

Tick three direct data entry devices which could be used in such a system.

Direct data entry device Tick


Bar code reader
Magnetic Ink Character Reader
Magnetic stripe readers
Keyboard
Mouse
RFID chip reader
[3]

(b) The library uses a database with two tables: borrowers and books. They have recently
purchased a biometric reader which will identify the borrower from their thumb print. A
borrower may only borrow a maximum of six books.

Describe the computer processing involved when a book is borrowed using this system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 0417/13/O/N/17


9

Question 12 starts on page 10.

© UCLES 2017 0417/13/O/N/17 [Turn over


10

12 A systems analyst is creating a new database for a shop to store the details of its mobile (cell)
phones. Part of the design of this database will involve the identification of suitable validation
checks.

Below is a list of some of the data to be included in the database.

ID_number Make Model Connectivity Price


Z13026 YNOS NAM1 5G $299.00
A23543 OIKAN RID4 3G $150.99
T32167 MUGAS BLK2 4G $250.00

(a) For the following fields write down the most appropriate validation check. Each validation
check must be different. The database will have at least 100 records and each ID number will
be different.

ID_number

...................................................................................................................................................

...............................................................................................................................................[1]

Connectivity

...................................................................................................................................................

...............................................................................................................................................[1]

Price

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2017 0417/13/O/N/17


11

(b) Design a screen input form which would be used to input data for one mobile (cell) phone,
using all the fields shown in the example data.

In your answer include appropriate spacing for each field, and navigational aids.

[5]

(c) The system is being tested using live data. Write the search criteria you would enter into
the database to search for a mobile (cell) phone costing less than $200.00 which has a
connectivity of 4G.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 0417/13/O/N/17 [Turn over


12

13 A theatre uses an online booking system to allow customers to book specific seats for its
performances.

A customer has loaded the theatre website. Describe the inputs and outputs of such a system
before the customer pays for a ticket.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2017 0417/13/O/N/17


13

14 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.

Discuss the advantages and disadvantages to the bank of using these cards at an ATM.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

15 Computers can be used in different applications to control a process, to simply gather data
(measurement only) or to mimic a human expert (expert systems).

(a) Tick whether the following applications use Control, Measurement (only) or Expert system.

Control Measurement Expert system


(3) (only) (3)
(3)
Computerised glasshouse
Burglar alarm
Chess games
Automatic washing machine
Recording weather conditions
Monitoring air pollution
[6]

© UCLES 2017 0417/13/O/N/17 [Turn over


14

(b) Measurement systems can use sensors. The computer cannot read the data directly from the
sensor.

Explain how a device can be used to enable the computer to read the data from the sensor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Identify the four components of an expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

16 State what is meant by OMR and MICR, giving an example of their use.

OMR .................................................................................................................................................

..........................................................................................................................................................

Example ...........................................................................................................................................

..........................................................................................................................................................

MICR ................................................................................................................................................

..........................................................................................................................................................

Example ...........................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2017 0417/13/O/N/17


15

17 Social networking is often used today rather than face-to-face conversations, letter writing and
telephone conversations.

Discuss the advantages and disadvantages of using social networking.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 0417/13/O/N/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 0417/13/O/N/17


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written October/November 2017
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a) a Blu-ray disc 1

1(b) ROM 1

1(c) A magnetic tape 1

1(d) RAM 1

Question Answer Marks

2 application system 2
(3) (3)
Linker 3
Database management systems 3
Photo-editing software 3
Compiler 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks

Question Answer Marks

3 true false 2
(3) (3)
CRT monitors use more power than TFT monitors 3
A touch screen can be used as an input device or an 3
output device
A dot matrix printer produces high quality graphics 3
A motor is an input device 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks

© UCLES 2017 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 Tick 3
(3)
Compare with source document 3
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document 3
Ensure the data is 100% accurate
Type in the data twice and compare versions 3
Calculate a check digit
Check spelling

Question Answer Marks

5 Any three from: 3


Part time working
Job-sharing
Compressed hours
Flexible hours/flexi-time

Question Answer Marks

6(a) Any two from: 2


Click on the image
Move the pointer to the (right hand) corner of the image
Click LH mouse button and drag to new size
or
Click on the image
Click on size
Type in the dimensions
Select maintain aspect ratio

6(b) Cropping tool/crop 1

6(c) Any two from: 2


Click on the image
Select format picture
Select compress image/change the resolution
Select email and OK
or
click on image
save as a different file type/jpg

© UCLES 2017 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7(a) Any two from: 2


The whole system should have been tested
The operator should have checked the meter reading against the previous
one
The bill should have been checked before it was sent
Linkages between modules should have been tested

7(b) Any three from: 3


Less expensive as the old system is removed before new one starts with
parallel there are two systems
There is only one set of workers but with parallel there are two sets and
therefore more expensive
Benefits are immediate but the parallel old system is phased out when new
system is working
Don’t need to maintain integrity of duplicate set of data, parallel running has
two sets of data.

Question Answer Marks

8(a) Any three from: 3


Scrambling of data
Converting data into an unreadable form
Protects sensitive data
Requires an encryption key/decryption key/key to encrypt data
Requires a decryption key/encryption key/public or private keys to decrypt
data

8(b) Any two from: 2


Allows people/organisations/computers to exchange secure information over
the internet
Uses a PKI (Public Key Infrastructure)
Unique key used by the sender and receiver

Question Answer Marks

9(a) Any three from: 3


Magnetic stripe reader
Chip reader
Contactless reader/RFID reader/NFC reader
Using a manual/physical imprint card reader

© UCLES 2017 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

9(b) Any three from: 4


Advantages
Saves time rather than travelling to the shops/No waiting in queues therefore
saves time shopping
Saves cost of travelling to the shops
Orders can be repeated at the touch of a button
Schedule in advance/choose time for delivery
Can shop worldwide
Shop 24/7
Shop from anywhere there is an internet connection
Overall wage bill decreases
Smaller/fewer shops needed reduces costs
More customers from around world

Any three from:


Disadvantages
Extra costs for delivery/tax
With fruit and vegetables customer cannot choose the ripest/best goods
Takes time to order
Problems if items are forgotten/alternative goods delivered
Need a computer/device and stable internet connection
Need online payment method
Takes time to deliver
Need to be in when the goods arrive
Loses loyalty
Increased delivery drivers (therefore more expensive)

To gain full marks candidates need at least one advantage/disadvantage.

Maximum 4 marks

Question Answer Marks

10(a) An anchor is a link within the web page/It is the destination 1 mark 3

Any two from:


Example media file, image in a hyperlink
Used to move (quickly) to the top of the page
Used to link to another web page
Used to link to a media file
Used to link to a program
Used to link to an image

10(b) <a id="Top"></a> 3


<a href=”#Top”>top</a>

Any three from:


1 mark for <a id=”Top”>
1 mark for <a href=
1 mark for “#Top”>
1 mark for both </a>

© UCLES 2017 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

10(c) A web browser views information on the internet/Views webpages/websites 1

11(a) Direct data entry device Tick 3

Bar code reader 3


Magnetic Ink Character Reader
Magnetic stripe readers 3
Keyboard
Mouse
RFID chip reader 3

11(b) Six from: 6


Converts the image of the thumbprint into a code
Searches for the code in its database«
...until a matching record is found
...or error returned
Reads the number of books from the borrowers record/on loan
if less than 6 transaction continues«
...otherwise error message produced
Searches the books table for the book code data
...until a matching book record is found
...flag as book as being borrowed
...produces error message if no match
Updates the borrowers table
Updates the books table

Question Answer Marks

12(a) ID_number Format check/length check 1 mark 3


Connectivity Lookup check/length check 1 mark
Price Range check/limit check 1 mark

12(b) All five correct fields 2 marks 5


three correct fields 1 mark
less than three fields 0 marks

Any three from:


Appropriate spacing in the text box
Forward and backward arrows
drop down/radio buttons for connectivity
Individual boxes for price
Fills the page and is clearly a screen input form
submit button/new form/clear/help button

© UCLES 2017 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

12(c) Price<$200.00 AND Connectivity=4G 5

Price 1 mark
<$200.00 1 mark
AND 1 mark
Connectivity 1 mark
=4G 1 mark

13 Five from: 5
A list of performances/shows is displayed
Customer selects a performance/show
A list of dates/times is displayed
Customer selects a date/time
A plan of the seats are displayed
A customer selects the number of seats to book/number of people
A customer selects the location of the seats
Displays the payment page/shows the booking information
Customer selects checkout

To gain full marks there must be at least one input and at least one output

Question Answer Marks

14 Five from: 6
Disadvantage
The cost of producing new cards
The cost of producing new readers
The cost of re-writing the ATM software
They are liable to fraud therefore compensate customers...
...Increasing costs
Less money removed at transaction therefore potentially more small
transactions
...Increased administration
...Increased hardware use

Five from:
Advantage
The cards last longer as they are not in contact with the machine
Attracts new customers
Reducing the cost of replacement cards
Reduction in fraud as less money taken out
Cards not retained therefore less cost for replacements
The transactions are faster

A mark can be awarded for a reasoned conclusion

If one side of the argument i.e. all advantages/disadvantages then 5 marks


maximum

© UCLES 2017 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

15(a) Measurement Expert 6


Control (only) systems
(3) (3) (3)
Computerised glasshouse 3
Burglar alarm 3
Chess games 3
Automatic washing machines 3
Recording weather conditions 3
Monitoring air pollution 3

15(b) An analogue to digital convertor is used to convert analogue data to digital 2


data
Data from the sensor is input in analogue form
Computers only understand digital data

15(c) Knowledge base 4


Inference engine
Rules base
User interface

Question Answer Marks

16 OMR – Optical mark reader/recognition 4


Example – Lottery tickets/multiple choice answers/reads marks on papers
MICR – Magnetic ink character reader/recognition
Example – Cheques/reads the data from the bottom of bank cheques

© UCLES 2017 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

17 To be marked as a level of response: 8

Level 3 7–8 marks


Candidates will give reasoned advantages and disadvantages. The issues
raised will be justified. There will be a reasoned conclusion. The information
will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 4–6 marks


Candidates will give both advantages and disadvantages. The issues raised
may be justified. There may be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent format.

Level 1 1–3 marks


Candidates may only give either advantages or disadvantages. Candidate
might not give reasons. Answers may be simplistic with little or no relevance

Level 0 0 marks
Response with no valid content

The following are examples only

Examples for advantages of social networking


Increase the number of friends worldwide
Send and receive live images instantaneously
Real time information sharing
Common groups can be formed more easily i.e. friends or social grouping and
these keep in contact
easier to advertise
«to a larger number of people
easier to publicise events/activities
«music videos
Speed of news increases
Similar interests can contact each other

Examples for disadvantages of social networking


Reduces face to face communication/relationships
Problem with sarcasm increases as it appears as rudeness
Cyber-bullying increases
Grooming increases
Harder to ignore people
Risks of fraud increases
Risks of identity theft increases
Risks of burglary as holiday reporting increases
Time wasting increases
Invasion of privacy increases
Addiction to social networking
Needs the internet
Needs computer/device

© UCLES 2017 Page 9 of 9

You might also like