Professional Documents
Culture Documents
03215275281
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
International General Certificate of Secondary Education
*9118532402*
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB13 06_0417_12/5RP
© UCLES 2013 [Turn over
2
1 Name the input devices A, B, C and D using the words from the list. For
Examiner's
A B Use
5
1 2 3 10
4 5 6 20
40
7 8 9 60
TOTAL 80
ENTER
100
C D
A B
C D
[4]
[2]
[5]
Hub
Printer
Bridge
Router
Scanner
Passwords
Monitor
Switch
[4]
5 Microprocessors are used in different applications to control the process or to simply gather
data (measurement only).
Tick which of the following applications are examples of control or of measurement only.
Measurement
Control
only
Automatic cookers
Weather stations
Microwave ovens
[4]
Finish
70 mm 50 mm
40 mm
NOT TO
SCALE
Start
60°
80 mm
Using only the following commands, complete the set of instructions to draw this shape by
filling in the blank lines.
PENDOWN
FORWARD 40 REPEAT
RIGHT 90 80
FORWARD 60
FORWARD
[8]
7 Use the most appropriate phrase from the list below to complete each sentence. For
Examiner's
Use
[4]
[4]
[3]
10 (a) Car mechanics often use expert systems to help them to diagnose faults with car
engines.
Graph plotter
Inference engine
Knowledge base
Rules base
Scanner
Spreadsheet
Web cam
[4]
(b) Name two other applications which involve the use of expert systems.
[2]
11 Give three advantages of using a graphical user interface (GUI) rather than a command For
line interface (CLI). Examiner's
Use
[3]
12 A company wishes to replace its current system with a new computerised system. It has For
employed a systems analyst to investigate the current system. Examiner's
Use
(a) Describe three methods the systems analyst could use to research the current system.
[3]
When large volumes of data are input to a new system it is usual to carry out verification
and validation on this data.
(b) Name and describe two methods of verification which could be used.
Name
Description
Name
Description
[4]
(c) Explain why it is necessary to carry out validation even though the data has been
verified.
[3]
13 A bank is looking into a variety of security measures to protect its customers’ data. It is For
worried that hackers may gain access and cause viruses to infect the system. Examiner's
Use
[3]
(b) Describe three ways in which a bank customer could protect their computer from
becoming infected.
Way 1
Way 2
Way 3
[3]
14 The manager of a travel company asked her secretary to look into the reliability of trains in For
Birmingham. The secretary obtained the details of some of the trains. He created two Examiner's
Use
spreadsheets to help him do this.
Sheet 1 is a list of some of the UK stations that trains from Birmingham go to. Sheet 2
consists of the train details he looked at.
A B
1 Code Station
2 E Edinburgh
3 LB Longbridge
4 B Bournemouth
5 LI Lichfield
6 S Shrewsbury
7 W Wolverhampton
8 LO London
9 P Plymouth
Sheet 1
A B C D
1 Arrival Station Code Number
2 =VLOOKUP(B2,Sheet1!$A$2:$B$9,2) E =COUNTIF($C$9:$C$18,B2)
3 =VLOOKUP(B3,Sheet1!$A$2:$B$9,2) LO =COUNTIF($C$9:$C$18,B3)
4 =VLOOKUP(B4,Sheet1!$A$2:$B$9,2) S =COUNTIF($C$9:$C$18,B4)
5 =VLOOKUP(B5,Sheet1!$A$2:$B$9,2) LI =COUNTIF($C$9:$C$18,B5)
6 =VLOOKUP(B6,Sheet1!$A$2:$B$9,2) W =COUNTIF($C$9:$C$18,B6)
7
8 Arrival time Minutes late Arrival code Late Y/N
9 11:03 0 E =IF(B9>0,"Y","N")
10 11:05 4 LO =IF(B10>0,"Y","N")
11 11:07 -4 W =IF(B11>0,"Y","N")
12 11:10 13 LO =IF(B12>0,"Y","N")
13 11:12 6 S =IF(B13>0,"Y","N")
14 11:14 -2 LI =IF(B14>0,"Y","N")
15 11:16 0 W =IF(B15>0,"Y","N")
16 11:19 -3 LO =IF(B16>0,"Y","N")
17 11:22 0 LI =IF(B17>0,"Y","N")
18 11:25 6 E =IF(B18>0,"Y","N")
Sheet 2
[3]
[1]
[3]
[1]
[3]
(f) What value would you expect to see in cell D11 in Sheet 2?
[1]
15 Chi has employed Sarbjit, a systems analyst, to create a new database system for his For
mobile telephone (cellphone) business. Examiner's
Use
(a) Complete the data dictionary below filling in the field names and the most appropriate
data types to create a database using only the above information.
Model
Monthly payment
[6]
(b) Name and describe three different validation checks that could be used on the data in
this database.
[6]
16 A small business wishes to set up a Local Area Network (LAN). The manager is not sure For
whether to use cables to connect the computers or use wireless technology. Examiner's
Use
[3]
[4]
[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2013 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 12
2
buzzer DVD R joystick [1]
3
True False
4
Hub
Printer
Bridge
Router
Scanner
Passwords
Monitor
Switch
[4]
5
Measurement
Control
only
Automatic cookers
Weather stations
Microwave ovens
[4]
6
PEN DOWN PENDOWN
FORWARD 40 REPEAT 6
RIGHT 90 FORWARD 80
FORWARD 70 RIGHT 60
FORWARD 50
1 mark for each correct statement
[8]
(iv) A flash memory card is used to store photographs in a digital camera [4]
8 Four from:
9 Three from:
Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously [3]
10 (a)
Graph plotter
Inference engine
Knowledge base
Rules base
Scanner
Spreadsheet
Web cam
[4]
Medical diagnosis
Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [2]
11 Three from
Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’E’/the contents of B2 (in Sheet 2)
Or
It reads the contents of B2 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1
(d) 1 [1]
(f) N [1]
15 (a)
16 Three from:
17 Four from:
18 Six from:
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB13 06_0417_13/3RP
© UCLES 2013 [Turn over
2
1 Name the devices A, B, C and D using the words from the list. For
Examiner's
A B Use
C D
A B
C D
[4]
[2]
[5]
Name and describe two validation checks which would be used to check the marks as they
are entered.
[4]
RAM ROM
This memory is used to store the data the user is currently working on.
[4]
6 Draw four lines on the diagram to match the use to its most appropriate input device. For
Examiner's
Use
[4]
7 A student wishes to use a floor turtle to draw this shape which has no two lines the same
length:
Name four different instructions which the turtle graphics software could use in order to
draw the shape. For each one explain the meaning of the instruction.
Instruction 1
Meaning
Instruction 2
Meaning
Instruction 3
Meaning
Instruction 4
Meaning
[8]
8 Explain what is meant by OCR and give one example of its use. For
Examiner's
Use
[3]
9 A head teacher has decided that the school magazine will now be included in the school’s
website.
(a) Tick three features of a website which would not be found in a magazine printed on
paper.
Hyperlinks
Colour
Photos
Sound
Video
[3]
(b) Give three other reasons why the head teacher thinks it is a good idea to replace the
paper version with a website version.
[3]
[4]
11 Car mechanics often use an expert system to help them with their work in diagnosing car
engine faults.
[5]
Keypad
Sensor
[2]
(b) Describe how the microprocessor would use the data from these devices to control the
system.
[4]
13 Davina has asked Boris, a systems analyst, to create a new database system for her zoo. For
She keeps animals of all types. Here are some of the questions that visitors to the zoo ask: Examiner's
Use
(a) Complete the data dictionary below filling in the field names and most appropriate
data type to create a database which would answer these questions.
Name Text
Species
Weight (kg)
Currency
[5]
(b) Boris will provide two types of documentation when the system is implemented.
Name each type of documentation and for each one give two items which would be
included.
Name
Item 1
Item 2
Name
Item 1
Item 2
[6]
14 Mobile phones (cellphones) are used for accessing the Internet. For
Examiner's
Use
Give two advantages and two disadvantages of using a mobile phone rather than using a
desktop computer to access the Internet.
Advantage 1
Advantage 2
Disadvantage 1
Disadvantage 2
[4]
15 A Sports Science student had to analyse the performance of athletes prior to the 2012 For
Olympic Games. He created a spreadsheet to do this. Below is his analysis of the javelin Examiner's
Use
event. It is split into two sheets. Sheet 1 contains the Code for each nationality. Sheet 2
contains a list of athletes and the results they achieved in a pre-Olympic event.
A B
1 Code Country
2 AUS Australia
3 FRA France
4 GHA Ghana
5 RUS Russia
6 THA Thailand
7 TUN Tunisia
8 TUR Turkey
9 USA America
10
Sheet 1
Because athletes sometimes miss a throw or throw outside the area, this is recorded in the
spreadsheet as a no throw using the letters NT.
A B C D E F G H
1 Country Athlete Code Throw Throw Throw Total Number
2 1 2 3 thrown of throws
3 =LOOKUP(C3,Sheet1!$A$2:$B$9) Chevonne Baines USA 85.02 73.29 76.9 =SUM(D3:F3) =COUNTIF(D3:F3,”<>NT”)
4 =LOOKUP(C4,Sheet1!$A$2:$B$9) Mary Bempe GHA NT 66.64 70.61 =SUM(D4:F4) =COUNTIF(D4:F4,”<>NT”)
5 =LOOKUP(C5,Sheet1!$A$2:$B$9) Rhiannon Jones USA 81.22 68.4 71.18 =SUM(D5:F5) =COUNTIF(D5:F5,”<>NT”)
6 =LOOKUP(C6,Sheet1!$A$2:$B$9) Abhasra Boonme THA 83.04 76.43 60.35 =SUM(D6:F6) =COUNTIF(D6:F6,”<>NT”)
7 =LOOKUP(C7,Sheet1!$A$2:$B$9) Jean Claude Devandre FRA 68.04 45.98 62.62 =SUM(D7:F7) =COUNTIF(D7:F7,”<>NT”)
8 =LOOKUP(C8,Sheet1!$A$2:$B$9) Brett Lewis AUS 79.98 68.78 NT =SUM(D8:F8) =COUNTIF(D8:F8,”<>NT”)
9 =LOOKUP(C9,Sheet1!$A$2:$B$9) Vera Stepanov RUS 70.42 49.88 90.18 =SUM(D9:F9) =COUNTIF(D9:F9,”<>NT”)
10 =LOOKUP(C10,Sheet1!$A$2:$B$9) Murat Mehmet TUR 49.81 67.51 53.66 =SUM(D10:F10) =COUNTIF(D10:F10,”<>NT”)
11 =LOOKUP(C11,Sheet1!$A$2:$B$9) Joan Lewington USA 88.85 NT 69.44 =SUM(D11:F11) =COUNTIF(D11:F11,”<>NT”)
12 =LOOKUP(C12,Sheet1!$A$2:$B$9) Youssef Ibrahim TUN 93.39 63.1 47.14 =SUM(D12:F12) =COUNTIF(D12:F12,”<>NT”)
13 =LOOKUP(C13,Sheet1!$A$2:$B$9) Laura Bennett AUS 55.97 49.45 70.07 =SUM(D13:F13) =COUNTIF(D13:F13,”<>NT”)
Sheet 2
[3]
(b) What value would you expect to see in cell A6? For
Examiner's
Use
[1]
[2]
[3]
[1]
(f) Spreadsheets are often used to produce computer models. There are however, other
forms of models such as simulations.
[3]
[3]
[3]
[2]
(b) Explain how software manufacturers attempt to prevent copyright being broken.
[2]
[7]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2013 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2013 0417 13
3
True False
Range check
Check no less than 0 and no more than 100
Presence check
Mark must be entered [4]
5
RAM ROM
This memory is used to store the data the user is currently working on
INSTRUCTION MEANING
1 for instruction
1 for meaning [8]
8 Two from:
9 (a)
Hyperlinks
Colour
Photos
Sound
Video
[3]
10 Four from:
Weblog
Usually one author
Personal opinions on a number of topics/personal thoughts
Can be an electronic diary
Others can comment
Only author can edit entries [4]
11 Five from:
13 (a)
Field name Data type
Name Text
Two from:
Program listing
Programming language
Flowchart/algorithm
List of variables
File structure
Purpose of the system/program
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Known bugs/possible errors
Validation rules
Limitations of the system [2]
User [1]
Two from:
Easily lost
May have poorer signal
Display is smaller/keyboard is smaller
Content is more limited
Can be slower to access Internet
Batteries might run out
No mouse so can be more difficult to navigate [2]
Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’USA’/the contents of C3 (in Sheet 2)
Or
It reads the contents of C3 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1
(e) 3 [1]
Lawful protection....
......given to authors/software companies and publishers
Relates to the software the author/publisher/company created/published
Prohibits purchaser from making unlimited copies/lend it to others/change the software/sell it
without the company’s permission [2]
18 Seven from:
Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously
Robots have to be reprogrammed when there is a small change/can’t think for themselves
Robots need programming in order to be adaptable
Expensive start up costs – redundancy payments
Expensive start up costs – have to spend money on training workers to use robots
Expensive start up costs – buying of robots/programming of robots
Computer crash would halt production
Maintenance/repair costs can be expensive [7]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB13 11_0417_12/3RP
© UCLES 2013 [Turn over
2
1 Name the storage media A, B, C and D using words from the list. For
Examiner's
A B Use
C D
A B
C D
[4]
[2]
virus checker
keyboard
chip
mobile phone
[4]
4 Complete the following sentences using the most appropriate device from this list.
[5]
5 Name and describe three ICT methods which could be used to help prevent illegal access For
to computer networks. Examiner's
Use
[6]
[3]
Finish
60 70 30
30
NOT TO
80 SCALE
60°
Start
Complete the set of instructions to draw this shape by filling in the blank lines provided. Do
not use additional lines.
PENDOWN FORWARD 70
FORWARD 80
[8]
8 There is a public library in New York. The librarian uses a computer to keep records of For
borrowers as well as records of the books in the library. Examiner's
Use
[1]
(b) When a borrower comes in for a book they show their membership card.
Give a method of data input which could be used instead of typing in the borrower’s
membership number.
[1]
(c) Give two reasons why your method in (b) is better than typing in the membership
number.
[2]
(d) Describe how the librarian could create a relational database using the data already
held in the borrower file and the book file.
[3]
9 Describe, including the uses of the hardware and software, what is meant by video For
conferencing. Examiner's
Use
[5]
10 There are many safety issues associated with the use of computers.
2 [2]
(b) Explain why computers are unable to read the data directly from these sensors.
[2]
(c) Describe what is meant by a pre-set value and how it is used by the computer to help it
control the temperature of the greenhouse.
[4]
2 [2]
(b) Describe the computer processing which takes place in order to determine if a product
needs re-ordering.
[4]
13 Abdul owns a large factory. He has asked Imran, a systems analyst, to create a new For
database system for keeping records of his workers and their pay. Examiner's
Use
3 [3]
After collecting information, Imran found that each worker has an ID which consists of one
letter followed by five digits. He also found that no worker earns more than $500.
He wrote down two of the questions that Abdul might ask when using the database, such
as:
(b) Complete the data dictionary table below giving the field names which would be used in
the database in order to answer these questions. State the data types which would be
used for each field.
First_name
Text
Phone_number
Worker_ID
[6]
(c) Identify three items of test data which could be used to test the Worker_ID field, giving For
a reason for each choice. Examiner's
Use
Item 1
Reason
Item 2
Reason
Item 3
Reason
[6]
14 Joanne runs a large company. Her computer network has a large capacity server. She is For
investigating ways of backing up the data on the server. Examiner's
Use
[2]
(b) Joanne has to choose between using magnetic disc or magnetic tapes to make her
backups.
[6]
[4]
Discuss the advantages and disadvantages to the workers of introducing robots rather than
using humans to manufacture cars.
[5]
17 Describe some of the benefits and drawbacks of students using the Internet to do research For
for homework. Examiner's
Use
[7]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 12
hardware software
keyboard [1]
chip [1]
Has to be read before access is gained/Prevents people without cards accessing system
Biometric data
Firewall
6 Three from:
The borrower’s file and book data files would be saved as separate tables
Primary key/key field(s)/foreign key would be identified
One mark is available for an appropriate example of the field which would be set to primary
key
This would be used to link the tables together [3]
9 Five from:
Video conferencing is a method of visual and audio communication between people at separate
locations
Webcams/small video cameras are used to input faces of participants
Large monitor/projector to output faces of participants
Microphones are used to input voices of participants
Speakers are used to output voices of participants
Router/broadband modem used to connect to internet
Video conferencing software needed to link participants
Employees are connected on-line/may need to access the Internet/WAN to work
Images of the employees appear on the screen in real time
Software is needed in each computer to operate the conference
Employees can be heard by all the other employees in the conference
You can take part wherever you are [5]
10
Humidity
Moisture
Light
pH [2]
(c) The preset value is the (required) value input by the user/already stored in the computer [1]
Three from:
Observation
Interview
Questionnaire
Examining documents [3]
(b)
Six digits
This would be rejected by format check
Six letters
This would be rejected by format check
A copy of file(s)
On an alternative medium
In case anything happens to original
Usually removed from the location of the computer [2]
15 Four from:
16 Five from:
Advantages
Safer environment
Don’t need to lift heavy loads/Fewer manual tasks to do
Cleaner/healthier working environment
Can lead to retraining to improve skills
More technical jobs available
Disadvantages
Can lead to unemployment
Deskilling can occur
17 Seven from:
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB13 11_0417_13/3RP
© UCLES 2013 [Turn over
2
1 Name the devices A, B, C and D using the words from the list. For
Examiner's
Use
A B C D
A B
C D
[4]
[2]
True False
[5]
4 Draw five lines on the diagram to match the input device to its most appropriate use. For
Examiner's
Use
[5]
True False
Pen drives are used to copy data from one computer to another.
[4]
50 30 70
Finish NOT TO
50 SCALE
50
Start
Complete the set of instructions to draw this shape by filling in the blank lines. Do not use
additional lines.
PENDOWN
LEFT 90
FORWARD 50
REPEAT
[8]
7 Multi-national companies often use video conferencing instead of face-to-face meetings. For
Examiner's
Use
(a) Tick three advantages of video conferencing.
8 There are many health risks associated with the use of computers.
9 (a) Describe what is meant by hacking, including ways that a hacker can misuse data held For
on a computer. Examiner's
Use
[4]
(b) Describe two methods which would help prevent hackers accessing a computer
network.
[4]
[3]
(b) Apart from data security give three drawbacks to the customer of internet shopping.
[3]
11 Explain why information found on websites is not always reliable and describe how the For
reliability of the information can be evaluated. Examiner's
Use
[5]
12 Chad has developed a new computer system. He now needs to implement it. He has
decided against using phased implementation.
Name and describe three other methods which could be used to implement a new system.
[6]
[3]
(b) Identify the input device which will be used to directly input data from the card.
[1]
(c) Describe the processing which takes place during an electronic funds transfer. Include
reasons why the card might be rejected.
[7]
[4]
15 Paul owns a shop. He has employed Jean, a systems analyst, to write software for a new
database system to store data about the CDs he sells. Jean wrote down three of the
questions that customers might ask which Paul might need to find the answers to quickly:
Have you got the CD recorded by the artist ‘Bett Lyryx’ in 2008?
How much does the CD called ‘Let It Be’ cost?
How many tracks are on the CD?
(a) Complete the data dictionary table below giving the field names which would be used in
the database and identify the data types needed to answer these questions.
Artist_name text
text
[7]
(b) No CD lasts for longer than 90 minutes or is shorter than 20 minutes. Paul wants to For
add a field to the database to include this data. He will use test data on this field. Examiner's
Use
Name three types of test data, giving an example of the data which would be used.
Type 1
Example 1
Type 2
Example 2
Type 3
Example 3 [6]
Tick four items that would be included in the technical documentation but not in the
user documentation.
program coding
system flowcharts
file structures
list of variables
16 Libraries make use of both batch processing and online processing. For
Examiner's
Use
Describe the differences between these types of processing giving examples of situations
where each would be used in a library.
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – October/November 2013 0417 13
3
True False
5
True False
A magnetic tape has faster data access than a DVD ROM. [1]
Pen drives are used to copy data from one computer to another. [1]
LEFT 90 PENUP
FORWARD 50 FORWARD 30
REPEAT 2 PENDOWN
RIGHT 90 FORWARD 70
FORWARD 50
7 (a)
Companies do not have to buy any equipment
(b)
Video conferences can only last a short time
8
Electrocution from touching bare wires
Deletion of data
Amending/changing of data
Copying and distributing data
Using data for fraudulent purposes
Three max. [4]
Allocating each user a Magnetic stripe/smart card/electronic key/bar code system/ID card
Card/key has to be read before access is gained
Prevents people without cards accessing system
11 Five from:
Anybody can set up a website (claiming to be factually accurate) so information is not necessarily
reliable/accurate
Some commercial sites are bound to be biased
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
Can use the final part of a URL to identify reliability
.ac, .gov, .org are usually fairly reliable
Compare information from reliable sites or reliable/authenticated text books (to see if it is reliable)
See if responsible bodies have endorsed the site
Does it have links to other reliable sites/unreliable sites?
If site has testimonials it is likely to be reliable
If the date of the last update was a long time ago it is likely to be unreliable
If the author’s credentials are good it is likely to be reliable [5]
Direct changeover
New system replaces existing system immediately/overnight
Parallel running
New system runs alongside/together with existing system
Pilot running
system is implemented in one branch/one office (at a time) [6]
14 Four from:
Phishers send an e-mail…
… asking for a customer’s details
appears to be from the bank/says that the bank needs the information
asks the customer for password, card or account number
Three max.
15 (a)
Field name Data type
Artist_name text
Normal data
One of:
greater than or equal to 20 and less than or equal to 90
Abnormal data
One of:
greater than 90 or less than 20
Extreme data
One of:
90, 20 [6]
(c)
purpose of the system
16 Six from:
Batch processing:
data are collected together
during the course of the day
then processed all at once
processed overnight
letters sent to borrowers who are overdue
letters sent to borrowers following morning
no human intervention
Online processing
results in immediate updating of records
book details inputted as soon as book borrowed/returned
records are searched until match is found
recorded as being borrowed/returned [6]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_0417_12/4RP
© UCLES 2014 [Turn over
2
1 Name the items A, B, C and D using the words from the list.
A B
C D
A B
C D
[4]
2 Identify two input devices which are used in mobile phones when making a phone call.
2 [2]
True False
[4]
4 Give two methods a company could use to send instructions electronically to an employee who
works from home.
2 [2]
5 In science lessons, students use sensors connected to computers to find the boiling point of
water.
Give three advantages of using computers and sensors rather than students taking the
temperature readings themselves.
[3]
INSTRUCTION MEANING
NOT TO
SCALE
60°
100 mm
Start
Complete the set of instructions to draw this shape by filling in the blank lines.
All the sides are the same length.
The turtle is facing up the page and the pen is up.
You must use the REPEAT instruction.
RIGHT 90
[5]
A B C D E
1 Sweet shop
2 Item Cost price Selling price Profit Amount sold
3
4 Nutty bar $1.10 $1.30 $0.20 193
5 Choco bar $0.95 $1.10 $0.15 194
6 Cocoa bar $1.05 $1.30 $0.25 171
7 Chocolate digits $0.80 $0.90 $0.10 181
8
[1]
[1]
(c) Write down how many columns are shown in the spreadsheet.
[1]
(d) Give the cell reference for a cell that should be formatted as currency.
[1]
= [1]
8 The chemistry department in a school keeps its stock records on computer. The stock for any
item is not allowed to fall below 10 or go above 100.
2 [2]
(b) For each of these validation checks write down the field that would be best suited to it. You
must name three different fields.
Range
Length
Greater productivity
[4]
Complete each sentence below using the most appropriate device from the list.
[4]
11 A library has decided to update its computer system. The details of each book are typed into a
screen input form.
(a) Design a suitable screen input form for inputting the details of one book. The form must have
appropriate spacing for each field, and navigation aids.
[5]
Name the medium which would be most suitable for storing the data and having direct
access to records. Give two reasons for your choice.
Name
Reason 1
Reason 2
[3]
(c) The library wants to include the new computerised borrowing system on its website.
Borrowers will be able to reserve or renew books using the Internet. Some people are
concerned about this because there is a risk that their data may be accessed by
unauthorised people.
Describe three ways that the library could try to prevent unauthorised access to their system.
[3]
[3]
(e) After the system is implemented the library will be given two types of documentation.
(i) One type will help people use the new system.
(ii) The other type will help a programmer or systems analyst who wants to upgrade the
system.
[4]
[1]
(b) Instead of using this system the school ICT teacher suggests using student fingerprints.
Advantage 1
Advantage 2
Disadvantage 1
Disadvantage 2
[4]
13 Discuss the advantages and disadvantages, in terms of cost, to customers of using the Internet
for home shopping.
[5]
14 Describe the effects on people’s lifestyles of the use of microprocessor-controlled devices in the
home.
[4]
15 A word-processed school newsletter contains only text. The head teacher wants to add images to
the newsletter.
(a) Describe how he could include photographs, taken using a digital camera, in the newsletter.
[3]
2 [2]
(c) The head teacher needs one thousand copies of this newsletter.
Give four reasons why a laser printer should be used rather than an inkjet or a dot matrix
printer.
[4]
16 A head teacher keeps IGCSE examination results stored in a spreadsheet. Part of the
spreadsheet is shown below
A B C
Percentage of students
1
passing
2
3
4 Year 1 95.6
5 Year 2 96.1
6 Year 3 96.4
7
One of the features of a spreadsheet is that you can use it to produce charts.
Describe the steps needed to show these results in the form of a chart.
[3]
[5]
(a) Describe three checks that the credit card computer will make on the customer’s credit card
account.
[3]
(b) Describe the processing carried out by the theatre’s computer when the credit card
company’s computer authorises the transaction.
[4]
19 People can access the Internet using mobile (cell) phones, laptops and their PCs.
Compare and contrast the use of these different devices to access the Internet.
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 12
2 Two from:
Touch screen
Microphone
Buttons
Keypad [2]
True False
[4]
4 Two from:
Send an email
Send an SMS/text message
Use instant messaging
Send a fax
Leave a message on voicemail
Make a phone call
Use VOIP
Send an alert on the company intranet/website
Social networking
Video conference [2]
5 Three from:
Sensors take more accurate readings
Possibly less danger to students
Students could lose concentration and forget taking some readings
More readings can be taken in a short period of time
Results can be automatically/more quickly produced
Graphs are automatically produced [3]
6 RIGHT 90
PENDOWN [1]
REPEAT 6 [1]
LEFT 60 [1]
(b) D5 [1]
(c) 5 [1]
(e) = C5 – B5 [1]
9
True False
10 (i) Webcam
(ii) Microphone
(iii) Speaker
Title [1]
Author’s name [1]
Four from:
Reference number/ISBN/Publisher/Picture of cover/Dewey number/Genre or
Category/fiction or non-fiction/target age group/picture of author/date [2]
Three from:
Published/revision date/summary of contents/no. of copies/cost price/selling price
Number of pages/hardback or softback [1]
Two from:
Fast data access
Stores a lot of data
Cannot be misplaced [2]
13 Five from:
Advantages:
Don’t have to spend money on travelling to shops
Goods may be cheaper as shops have less staff to pay/less premises to rent
Don’t have to pay car parking charges
Don’t have to pay for shopping bags
Vouchers/special deals are often only available online
Comparison websites will find you the cheapest option/can compare prices more easily
Disadvantages:
May have to pay delivery charges
Postal costs of returning items
Initial cost of equipment/phone line
ISP costs/Possible high connection charges
Must have at least one advantage and disadvantage to gain full marks.
14 Four from:
Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Manual household skills are lost [4]
Up to two from:
Load word processing package/open document
Insert image from folder/copy and paste/drag and drop
Edit/position the image
16 Three from:
Highlight A4 to C6/highlight A4 to A6 and C4 to C6
Select insert chart
Select type of chart
Label axes
Select legend/no legend
Create a heading/title [3]
17 Five from:
Microprocessor is programmed with pre-set values
Microprocessor starts cycle at specified time
Microprocessor reads data from sensors
Checks contact switch on door is closed
If it isn’t microprocessor will not start the cycle/if it is microprocessor starts cycle
Microprocessor compares sensor readings with pre-set value
If temperature is above pre-set value, microprocessor switches off heater
If temperature is below pre-set value, microprocessor switches on heater
If pressure is greater than preset value, microprocessor sounds alarm
Microprocessor checks pressure reading and calculates the amount of water to use
At start of cycle, microprocessor opens valve to let in water
If water level reached, microprocessor switches off valve
Microprocessor ends cycle at specified time [5]
19 Six from:
Mobile phones/laptops are portable, PCs are not
Keyboard on mobile phone is smaller/difficult to type
Mobile phone display is smaller than laptop or PC
Mobile phone may not be able to access certain sites
Signal is likely to be more reliable with PC/laptops as they can be cabled
Slower to access the internet with mobile phone
May not always be able to access the internet using a mobile phone or laptop
More likely to have a mobile phone with you
Can access the internet from greater number of places with a mobile phone
Easier to use a mobile phone while on the move
Some sites do not have full facilities for mobile phones [6]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_0417_13/5RP
© UCLES 2014 [Turn over
2
1 Name the items A, B, C and D using the words from the list.
A B
C D
A B
C D
[4]
2 [2]
3 Complete the table below by identifying an appropriate type of software which would be used to
carry out each of the following tasks.
Software Task
Typing a letter
[4]
4 Tick whether the following tasks are carried out in the Evaluation or Analysis phase of the
systems life cycle.
Evaluation Analysis
[4]
5 Tick three input devices that would be used at an EFTPOS terminal in a supermarket.
Chip reader
Web cam
Printer
Buzzer
Keypad
TFT screen
[3]
INSTRUCTION MEANING
NOT TO
SCALE
72°
50 mm 60 mm
Start Finish
120 mm
Complete the set of instructions to draw these regular shapes by filling in the blank lines. The
turtle is facing up.
PENDOWN PENUP
REPEAT 5
FORWARD 50
FORWARD 60
END REPEAT
[5]
7 A systems analyst has designed a new computer system for the payroll of a large organisation.
Using examples of workers pay, which must not be lower than $200 and no more than $800,
explain what is meant by normal test data, abnormal test data and extreme test data.
Normal
Abnormal
Extreme
[6]
Give four reasons why both user and technical documentation are needed.
[4]
8 Explain, giving examples of their use, the differences between ROM and RAM.
[4]
9 Other than communication systems, identify two applications which use online processing.
2 [2]
10 Complete each sentence below using one item from the list.
Paperback or Borrower
ISBN Title Name of Author
Hardback number
9780593057049 Gone Tomorrow Lee Child P 864752
Write down the name of the most suitable storage medium for this purpose.
[1]
(b) The records in the book file are to be sorted in descending order of ISBN.
What will be the title of the book in the first record in the database after it has been sorted?
[1]
(c) Give the name of a field that contains a Boolean data type.
[1]
(d) Identity the data type of the borrower phone number field.
[1]
(e) Why would the borrower number in the borrower’s database be used as a key field?
[1]
(f) Write down the author of the book that Giovanni Benitez has borrowed.
[1]
(g) The final digit in the ISBN is used for validation purposes.
[1]
(h) Describe two suitable validation checks, other than limit or range checks, that could be
carried out on the borrower number field.
[2]
(i) Describe three advantages and one disadvantage of the library using email rather than a
phone call to contact borrowers.
Advantage 1
Advantage 2
Advantage 3
Disadvantage
[4]
(j) When a book is borrowed the borrower presents the book and library card to the librarian.
Discuss the advantages and disadvantages of different input devices which could be used by
the librarian.
[6]
(k) Libraries often let borrowers access their own records at home.
One method the library uses to make sure that each borrower only accesses their own
records is by using a User ID and password.
User ID
Password
[2]
(a) Give one way a hacker can use customer accounts to defraud the bank.
[1]
(b) Give three reasons why, despite the risk of hacking, the bank still operates on-line banking.
[3]
[4]
(iii) To enter an instruction into a Command Line Interface you would use
[3]
15 Computer controlled traffic lights are used at busy road junctions. Light sensors and sound
sensors are not used to measure traffic flow.
(a) Giving a different reason for each, explain why these sensors are unsuitable.
Sound
Light
[2]
(b) Explain the difference between measurement and control when using microprocessors.
[2]
Microphone
Speakers
Webcam
[3]
(b) Apart from saving costs and travelling time, describe the advantages to the company of
having a video-conference rather than a conference in a hotel.
[4]
17 Doctors use an expert system to help them with their diagnoses of illnesses.
Describe the processing which the system uses so that it can suggest possible illnesses.
[5]
(b) Name two applications other than medical diagnosis and car fault diagnosis which involve
the use of expert systems.
[2]
18 Students are going to produce a word-processed report about the school greenhouse. It will
contain images of the plants that are grown. It will also contain data and charts from a
spreadsheet showing the costs of plants.
[4]
[4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
IGCSE – May/June 2014 0417 13
1 A Speakers [1]
B Web cam [1]
C Joystick [1]
D Memory stick [1]
2 Two from:
Windows
Icons
Menus
Pointer/Pointing device [2]
Software Task
Evaluation Analysis
5
Chip reader [1]
Web cam
Printer
Buzzer
Keypad [1]
TFT screen
6 PENDOWN PENUP
LEFT 90 BACKWARD 120
REPEAT 5 PENDOWN
FORWARD 50 REPEAT 4
RIGHT 72 FORWARD 60
ENDREPEAT RIGHT 90
END REPEAT
1 mark each correct instruction [5]
7 (a) Normal data – data within a (given) range/appropriate for that data type [1]
Example – any wage between $200 and $800 [1]
Abnormal data – data outside the range/of the wrong data type [1]
Example – any wage less than $200 or greater than $800 or text such as “two hundred” [1]
Extreme data – data on the boundaries of the range [1]
Example – $200 or $800 [1]
Must gain at least one mark for each of user and technical to gain full marks [4]
8 Four from:
ROM cannot be changed/RAM can be changed
RAM can be read from and written to
ROM is read only memory and RAM is random access memory
ROM is non-volatile/RAM is volatile
RAM holds the work that is being currently done by the user
ROM holds instructions that need to be unchanged such as BIOS/program cycles in a washing
machine/program instructions in games [4]
9 Two from:
Buying tickets
Online shopping
Online banking
Any control application
Automatic stock control
(EFT) POS system [2]
12 (a) Can transfer money out of account/Can create bogus account/Can transfer money into
bogus account [1]
13 Four from:
May make friends with inappropriate people
Cannot be sure the person you are communicating with is the same as the images you have
seen.
Can become preoccupied with sites and not do other tasks/perform poorly academically
Can swap coursework/homework inappropriately
Lose person to person social skills/spend less time with family/friends
Prone to cyber bullying
Continual use results in lack of exercise, causing health problems [4]
15 (a) Sound – there might be other noises – e.g. roadworks, masking the sound of a car [1]
Light – Anybody could break the beam not just cars/direct sunlight may affect readings [1]
(b) Measurement is the monitoring of physical variables without the microprocessor taking action
[1]
Control is when the microprocessor takes action depending on sensor readings [1]
18 Four from:
Save pictures from clipart/Internet/scanned images/digital camera
Load word processing software
Insert images
Edit images
Insert spreadsheet
Position chart/images/spreadsheet
Create chart
Type in text
Edit/format text
Save chart
Insert chart/ copy and paste chart
Edit chart [4]
19 Four from:
Phishing involves fraudster sending an e-mail…
…whereas pharming involves fraudster/hacker installing malicious code on a pc or server
Both involve trying to obtain personal details
Phishing
Email appears to be authentic
Is sent by a fraudster posing as a bank/organisation
Pharming
User is redirected to bogus website
User accesses websites which look authentic
But belong to the fraudster/hacker [4]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (AC/CGW) 88639/5
© UCLES 2014 [Turn over
2
web cam
microphone
screen
keyboard
touch pad
speaker
number pad
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
[2]
Producing A0 printouts
CAD applications
4 Complete the table below by identifying the most appropriate type of software which would be
used to carry out each of the following tasks.
Software Task
Creating a slideshow
TRUE FALSE
Pen drives are used to make backups on large company file servers.
Fixed hard discs have slower access times than optical discs.
6 (a) Write down the type of interface shown in the picture below.
.............................................................................................................................................. [1]
(b) Write down the type of interface shown in the picture below.
Folders
Desktop
My Documents
My Computer
3½ Floppy (A:)
.............................................................................................................................................. [1]
A B C D E
1 Snack shop
Number in Number in
Sold more
2 Item stock at start Number sold stock at end
than 150?
of week of week
3 Fruity bars 120 95 25 No
.............................................................................................................................................. [1]
.............................................................................................................................................. [1]
.............................................................................................................................................. [1]
.............................................................................................................................................. [2]
© UCLES 2014 0417/12/O/N/14
5
.............................................................................................................................................. [3]
INSTRUCTION MEANING
20 mm 40 mm 25 mm
NOT TO
SCALE
30 mm
40 mm
25 mm
10 mm
Start Finish
Complete the set of instructions to draw this shape by filling in the blank lines. The turtle is facing
up at the start.
FORWARD 10 ...................................................
LEFT 90 ...................................................
FORWARD 25 ...................................................
RIGHT 90 FORWARD 25
FORWARD 30 RIGHT 90
RIGHT90 ...................................................
[5]
9 A number of schools have Local Area Networks (LANs) in their buildings. The LANs are used to
share software and for students to save their work.
(a) Describe two ways that students can prevent the work they save from being edited by others.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
.............................................................................................................................................. [1]
As a result of all the schools having access to the Internet, students will be able to communicate
with students at other schools in a number of ways.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
The headteachers of the schools will want to send confidential data to each other.
Advantage .................................................................................................................................
...................................................................................................................................................
Disadvantage .............................................................................................................................
...................................................................................................................................................
[2]
10 A school is going to install a new computer system that uses WiFi. The headteacher is very
concerned about the problems that the introduction of such a system will cause.
The safety issue of students tripping over trailing cables has been minimised by using WiFi, and
the risk of electrocution has been minimised by the use of automatic circuit breakers.
(a) Give two other safety issues which might occur and for each one describe a method of
preventing it.
...................................................................................................................................................
Prevention .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Prevention .................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe what a virus is and explain how viruses cause problems for computer users.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) If hackers get into the system, they may plant spyware. Describe what is meant by spyware.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
11 The owner of a shop wants a new computer system to store the records of all the stock and
customers. The systems analyst will need to find out how the existing system works.
(a) Describe, in detail, two out of the four possible ways she could find out this information.
Way 1 ........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Way 2 ........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) After analysing the existing system, the systems analyst will design a database.
Identify four items that the systems analyst will need to design for the database.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(c) Name two methods, other than direct changeover, that could be used to implement the
system and give an advantage for each method compared to direct changeover.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Advantage .................................................................................................................................
...................................................................................................................................................
Method 2 ....................................................................................................................................
...................................................................................................................................................
Advantage .................................................................................................................................
...................................................................................................................................................
[4]
12 A large multi-national company uses video conferencing instead of face to face meetings between
branches in different countries.
(a) Apart from a keyboard, mouse and display devices, identify two other devices which must be
present in such a system for a video conference to take place.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
14 Students save and carry their work from school to home on a pen drive.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................... [1]
...................................................................................................................................... [1]
(b) Name the validation check that would be carried out on the product number.
...............................................................................................................................................[1]
(c) Describe the computer processing involved in updating the stock file every time a product is
sold and checking whether it needs re-ordering.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(d) The customer has to type in the PIN to authorise the transaction.
...................................................................................................................................................
.............................................................................................................................................. [1]
(e) After the checks on the customer’s card have been completed, the supermarket computer
contacts the customer’s bank.
Describe the computer processing involved in taking payment from the customer’s bank.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
16 Describe what is meant by batch processing, using the processing of bank cheques as an example.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
17 Many bank customers do their banking using the Internet at home. Many transactions can now be
done without having to travel to the bank.
(a) Describe three types of transaction which they can do from home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Identify one type of transaction which they cannot do from home.
...................................................................................................................................................
.............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
3
Using Multipart stationery [1]
Producing A0 printouts
CAD applications
4
Software Task
5
Pen drives are used to make backups on large company file servers. [1]
Magnetic tapes use direct access when searching for records. [1]
Fixed hard discs have slower access times than optical discs. [1]
7 (a) 5 [1]
(d) = b4–c4
b–c formula [1]
Row 4 [1]
[1]
FORWARD 10 PENUP
RIGHT90 FORWARD 25
FORWARD 30 RIGHT 90
(d) Advantage
Unauthorised users won’t be able to understand data/only person/computer with key can
understand data
Disadvantage
The data can still be deleted/if the person encrypting the data accidentally deletes the
encryption key the data will be unreadable [2]
Parallel running
There is always the old system to fall back on in the event of the new system failing/training
can be gradual
Phased implementation
You still have most of old system to fall back on/training can be gradual
Pilot running
Only one branch is affected if new system fails/other branches can learn from the branch’s
experiences [4]
13
Patients are always cured.
(d) The PIN on the chip is compared with the typed in PIN [1]
16 Three from:
Cheques are collected together…
…during the course of the day
Cheques are then processed all at once
Cheques are processed overnight
Bank accounts updated following morning [3]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (AC/CGW) 88646/5
© UCLES 2014 [Turn over
2
DVD drive
pen drive
microphone
speaker
mouse
keyboard
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name two output devices shown in the diagram above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Name two storage devices shown in the diagram above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
2 Tick the most appropriate method of inputting data for the following applications.
3 Complete the table by identifying the most appropriate device for each use.
Device Use
TRUE FALSE
It is easy to keep in immediate contact with friends
(a) The type of processing used when booking an airline ticket is called ...................................[1]
MICR serial
batch motor
INSTRUCTION MEANING
FORWARD n Move n mm forward
70 mm
NOT TO
20 mm SCALE
35 mm
15 mm
20 mm 35 mm
Start Finish
Complete the set of instructions to draw this shape by filling in the blank lines. You will need to use
a REPEAT loop after the turtle has moved the 70 mm.
LEFT 90 RIGHT 90
FORWARD 20 ...................................................
RIGHT 90 ...................................................
................................................... RIGHT 90
................................................... FORWARD 35
................................................... ...................................................
[6]
(a) Identify two variables which have to be pre-set before the cooking begins.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
8 The English teacher stores details of her students’ exam scores in a spreadsheet. The exam is
marked out of 80 and the results are typed into the Exam result column.
A B C D
1 Name Form Exam result Pass/Fail
2
(a) The teacher wants to use a validation check which only allows numbers between 0 and 80 to
be typed in. What is the name of this type of validation check?
...............................................................................................................................................[1]
(b) She types in the following exam results to test that the validation works:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
The teacher decides that the pass mark for the exam should be 45. Depending on the number of
marks each pupil gets, the word ‘Pass’ or the word ‘Fail’ will appear in the Pass/Fail column.
(c) Write down the formula which should appear in cell D2.
...................................................................................................................................................
.............................................................................................................................................. [3]
(d) Explain how she can replicate the formula in the 30 cells below D2.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) Give two reasons, apart from safety, why computer models are often used rather than the
real thing.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
9 Complete each sentence below using one item from the list.
(c) Gaining access to somebody else’s work without permission is called ...............................
(a) Describe four disadvantages to the company of using robots to build cars.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) Identify two changes to the workers’ working environment that the use of robots has brought
about.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
13 A sports club uses a computer database to keep records of members in one file and records of the
sport bookings in another file. Here is a record in the sport bookings file.
(a) The members file and the sport bookings file will be saved as separate tables.
Describe other steps which would be required in order to create a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Give two advantages of creating and using a relational database compared to using two flat
files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Explain why a hard disk is used to store the data files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
Name an appropriate validation check for each of the member number and the sport code. Do
not use the same check twice.
(e) When members make a booking, they will show their membership card which holds their
details electronically. Name the device which will be used to input their details from the card.
.............................................................................................................................................. [1]
(f) Give two reasons why this method is better than typing the number in.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
When the system was implemented the systems analyst gave some documentation to the sports
club owner.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(h) Name three different items in the technical documentation which are not present in the user
documentation.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
15 The use of microprocessor-controlled devices in the home affects an individual’s leisure time,
social interaction and the need to leave the home.
(a) Give three advantages to the individual when microprocessor-controlled devices are used in
the home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Give three disadvantages to the individual when microprocessor-controlled devices are used
in the home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
16 Describe three ways in which personal data held on computers can be misused. For each way
explain a different method for helping to prevent it.
Way 1 ...............................................................................................................................................
..........................................................................................................................................................
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
Way 2 ...............................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
Way 3 ...............................................................................................................................................
..........................................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
2
Reading data from bank cheques [1]
3
Dot matrix printer printing on multipart stationery [1]
Chip reader reading information from the front of bank cards [1]
Bar code reader to read data from a product at a POS terminal [1]
4
It is easy to keep in immediate contact with friends [1]
LEFT 90 RIGHT 90
FORWARD 20 FORWARD 70
RIGHT 90 REPEAT 2
PENUP RIGHT 90
FORWARD 15 FORWARD 35
(ii) 0 or 80 [1]
(iii) 87 [1]
(c) =if(C2>=45,”Pass”,”Fail”)
Or
Or
10
Higher charges can be made
They have fewer bad risks
Less paid out in wages as fewer staff need to be employed [1]
Lower costs as fewer buildings need to be rented [1]
A wider customer base is available [1]
Mistakes are never made.
Less actual cash handled so there are fewer robberies [1]
The initial cost of hardware is cheap
12
Producing the payroll
14 Four from
Internet is network of networks/intranet doesn’t have to be a network of networks
Internet is global
Intranet is within one organisation
Intranet is private/internet is public
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more reliable/relevant than that found on the Internet
Internet has more information than an intranet [4]
16 Three matched pairs (with a different method for each one) from:
Data could be amended
Use a username and password so that only the person who knows these can access the data
Use biometrics so that only that person who has those characteristics can access the data
Use a firewall which prevents unknown computers accessing a network
17 Four from:
If computer is switched off work in RAM goes but backing storage stores data for future use
Backing storage is cheaper than IAM per unit of memory so more cost effective to have both
IAM is bulkier than backing storage per unit of memory so more sensible to have both
IAM provides faster access than backing storage so as there has to be backing storage computer
needs IAS to speed up operations
Software package may be so large that it is physically impossible for RAM to store it
Data may need to be transferred from one computer to another and can’t do that with RAM [4]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SG) 101050/2
© UCLES 2015 [Turn over
2
(a) Name two input devices apart from a keyboard and mouse, which could connect directly to
the tower.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name two storage devices which would be available in the PC shown above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Name two output devices which could connect directly to the PC shown above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
2 Below is a list of statements. Each statement is true for only one of the given methods of
implementation. Tick the method which matches the statement.
Typing a document
4 Tick whether the following items are found in user documentation only, technical documentation
only or are found in both.
List of variables
(a) The method of inputting bank codes from the bottom of a cheque is called
............................................................[1]
(b) The device used for inputting details from a label on a product is called
............................................................[1]
(c) The device used for inputting data directly from a bank card is called
............................................................[1]
INSTRUCTION MEANING
35 mm
10 mm
20 mm
10 mm
15 mm
Start Finish
A student has written the following set of instructions to make the floor turtle draw the above
shape.
1. PENDOWN
2. LEFT 90
3. FORWARD 15
4. RIGHT 90
5. PENUP
6. FORWARD 20
7. RIGHT 90
8. PENUP
9. FORWARD 90
10. RIGHT 35
11. FORWARD 20
Although the first four instructions are correct, this set of instructions would not draw the shape
exactly as shown. One instruction has been missed out and four are incorrect.
(a) Write down the missing instruction and indicate where it should be positioned in the list of
instructions provided.
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Identify the four incorrect instructions and state the correct instructions to be used.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
Pressure sensor
Height sensor
Sound sensor
Temperature sensor
Moisture sensor
Cold sensor
Detergent sensor
[3]
(b) Describe the actions taken by a microprocessor during a wash cycle, based on the readings
from those sensors identified in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
8 A bank has introduced a system whereby its customers will use contactless smart cards to make
purchases. This method of payment involves customers holding their card close to a reader at
shopping outlets and restaurants.
Discuss the advantages and disadvantages of this method of payment compared to using chip
and PIN cards.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 (a) Explain how a VLOOKUP function works, using the example of VLOOKUP(38,A2:C10,3,FALSE).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
D E F G H I
Explain why the cell H2 might not contain James. Suggest the value that would be contained
in that cell, giving reasons why.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as well as
job losses.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
11 Aftab wants to create a network using a PC and two laptop computers he has bought for his family.
All have network cards fitted. He has already purchased network protection software. He wishes to
use them for online banking.
Name and describe the use of four additional items, apart from cables, he would need in order to
set up this network.
Item 1 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 2 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 3 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 4 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
[8]
© UCLES 2015 0417/12/M/J/15 [Turn over
10
12 A school in the UK holds a sports day every year. Students compete in a number of athletics
events during the day.
The results of all events, together with suitable photographs, are to be included in the school
newsletter on its website. Initially the results will be stored in a spreadsheet.
Describe how the sports day part of the newsletter will be produced.
..........................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
......................................................................................................................................................[6]
14 A headteacher wishes to store details of her students in a computer database. She has been
given an example of one student record by the school secretary:
The file is currently stored in the form of plain text with each record separated by a line break.
...............................................................................................................................................[1]
(b) For each field identify the most appropriate data type. The Maths_test_score is used in
calculations.
family_name
first_name
Student_Id
Maths_test_score
joined_the_school
[5]
(c) Identify the two fields for which a format check would be the most appropriate validation
check. In each case describe how the format check would work.
1 ..............................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) The school secretary will use a screen input form to make it easier to enter data on the new
system.
Design a suitable screen input form to enter the details of one student using the fields given in
part (b) but leaving the field contents blank.
It should contain appropriate spacing for each field, as well as navigation aids and other
appropriate features of a screen input form.
[5]
15 One of the stages in systems analysis and design is called development and testing.
Describe the different testing strategies that can be used on a new system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2015 0417/12/M/J/15
13
16 An oil prospecting company wants to use an expert system to help it to decide where to drill for oil.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
Joystick
Microphone
Tracker ball
Concept keyboard
Touch screen
Scanner
Digital camera
Graphics tablet
Webcam [2]
2
Direct
Parallel Pilot
Change-
running running
over
3
Input Output Storage
device device device
4
User Technical Both
7 (a)
Pressure sensor [1]
Height sensor
Sound sensor
Cold sensor
Detergent sensor
8 Six from:
Contactless systems reduce the time taken by retailers to deal with each customer
Customers don’t need to queue for so long as contactless cards speed up the transactions/
quicker than inserting the card and entering the PIN
Only checks whether the card is not cancelled or stolen not always making a full check on what
the balance of the holder’s account is.
Customers are limited in what they can buy as transactions must be below a certain value
In some cases, the customer can unwittingly pay for another customer’s purchase if they get too
close to the terminal.
A thief armed with a suitable reader, within a few feet of the customer, would be able to
interrogate all of the cards in their wallet without their knowledge.
If customer lost card a thief could make purchases without having to know a PIN
Customer can pay twice as terminal may detect the card for contactless payment but has inserted
the card to use the PIN.
Customer doesn’t have to worry about PIN being overseen/shoulder surfed [6]
10 Five from:
Modem/Router
To connect the network to the internet
Hub/Switch
To connect the computers to form a network
(Internet) browser
To access the bank’s website/to search on different websites/allow access to internet (if not given
elsewhere)
ISP (contract)
To access the internet/to provide internet services
Telephone line
To connect the router to the internet [8]
12 Six from:
13
Student_Id [1]
It would make sure that it would consist of two letters followed by 6 digits [1]
joined_the_school [1]
It would make sure that it would consist of two digits, a slash, two digits, a slash followed by
4 digits [1]
Three from:
15 Six from:
Medical diagnosis
Car engine fault diagnosis
Computer fault diagnosis [2]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (AC) 101051/3
© UCLES 2015 [Turn over
2
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name one storage device which would be available in the phone shown above.
.............................................................................................................................................. [1]
(c) Identify three ways the phone shown above could be used to contact a bank apart from
making a phone call to the bank.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
2 Tick the most appropriate method of inputting data for the following uses.
Bar code
MICR OMR
Use reader
✓ ✓
✓
Inputting exam answers from a multiple choice test paper
[4]
3 Explain what is meant by computer hardware and computer software, giving an example of each.
Hardware ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Software ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
Neither
verification
Verification Validation
nor
✓ ✓
validation
✓
(b) The type of access used on a magnetic tape is called .................................................... [1]
serial DTP
6 Describe two recent developments in ICT which have improved the quality and speed of
communication using the internet.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[2]
7 There are many causes of health and safety issues related to the use of computers in the
workplace.
Explain, giving examples, the differences between the causes of each issue.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
INSTRUCTION MEANING
FORWARD n Move n mm forward
Each shape
has equal sides
72° 90°
50 mm 80 mm 60 mm
Start
A student has written the following set of instructions to make the floor turtle draw the above
shapes.
1. PENDOWN
2. LEFT 90
3. REPEAT 6
4. FORWARD 50
5. RIGHT 72
6. BACKWARD 80
7. RIGHT 90
8. FORWARD 60
9. END REPEAT
Although the first two instructions are correct, this set of instructions would not draw the shapes
exactly as shown. Four instructions have been missed out and one is incorrect.
(a) Identify the incorrect instruction and state the correct instruction to be used.
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Write down the four missing instructions and indicate where they should be positioned in the
list of instructions provided.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(a) Name and describe, in detail, the use of two input devices in such a system.
Name 1 .....................................................................................................................................
...................................................................................................................................................
Use 1 ........................................................................................................................................
...................................................................................................................................................
Name 2 .....................................................................................................................................
...................................................................................................................................................
Use 2 ........................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe how the microprocessor would keep the temperature of the office at a constant
19°C.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
(a) Describe what is meant by the following terms, using examples of student data.
Field ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
File ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Record ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) Describe what is meant by a key field, using examples of student data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
12 An airline keeps a database of all the flights it operates. A short extract is shown below.
(a) Explain fully, what is meant by the following validation checks using the extract above.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) Using the extract above, give an example of one field which would contain:
Text data
(alphanumeric) ..........................................................................................................................
13 (a) Explain how a SUMIF function works, using the example of SUMIF(A1:A6, ">29", B1:B6).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
D E F G
Explain why the cell G2 does not produce the expected value of 30.
Write down a formula which would total the Days holiday due to those workers who had worked for
the company for more than 31 months but less than 35 months.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
14 Biometric methods are increasingly being used to authorise user access to computer systems.
(a) Explain, giving examples, why biometric methods are considered to be a more secure method
of authorising access to a network than using id and passwords.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Give three disadvantages of using biometric methods compared to user id and passwords.
1 .................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
15 Many computer networks are connected using cables but some are now connected using wireless
technology.
Discuss the advantages and disadvantages of using wireless networks compared to using cabled
networks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
16 A travel company uses an online booking system to book flights for its customers.
(a) The travel agent will type in the departure date, departure airport and destination airport. The
system does not allow invalid airport names.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Give three other organisations which make use of online booking systems.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
17 A headteacher has decided that the school newsletter will no longer be printed out for parents but,
instead, will appear on the school website.
Name three features available on a website not available in a hard copy version of the newsletter.
For each one describe how it could be used on the school website.
Feature 1 ..........................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
Touch screen
Microphone
(Push) button
Camera [2]
Send emails
Send texts
Access website and send secure message [3]
Bar code
MICR OMR
Use reader
Examples of hardware are the monitor, mouse, keyboard, computer data storage, hard disk drive,
graphic cards, sound cards, memory, motherboard, CPU [1]
Computer software is made up of the instructions that can be stored and run by hardware/ any
set of machine-readable instructions/software directs a computer's processor to perform specific
operations/programs that control the computer system [1]
Examples of software are spreadsheet software, data handling software, word processing
software, DTP software, presentation software, control software, measuring software, operating
system, anti-virus software [1]
4
Neither
verification
Verification Validation
nor
validation
Data is entered by two different [1]
operators
Data is checked to see if it is present [1]
5 (a)
[1]
(c)
[1]
Temperature sensor
To input current temperature of the room/office [4]
10 Three from:
11 (a) Field
one item of information [1]
name/address/phone number/date of birth/tutor group/student id [1]
File
a collection of records [1]
all the students names, addresses, phone numbers, dates of birth, forms, student ids [1]
Record
A collection of fields [1]
All the information about one student/More than one of: name, address, phone number, date
of birth, tutor group of one student, student ids [1]
Two from:
A field which contains unique data
It is used to identify the record
Used to create relationships between tables [3]
=SUMIF(D2:D10,">31",F2:F10) [1]
– (minus sign) [1]
SUMIF(D2:D10,">=35",F2:F10) [1]
15 Six from:
Advantages
Less likely to trip over cables
Easier to relocate computers
Cheaper as you don’t have to buy cables
Adding devices/computers to network is easier
Disadvantages
Limited area of network
Strength of signal is weaker
Physical obstacles can interfere with signal/can cause disconnection
Sound
Spoken introduction by head/voiceover the presentation/background music/school
choir/band/orchestra
Animation
Text effects/cartoon representing school activities
Video
Introduction by head/school play/choir/band/orchestra/sports activities
Hyperlinks
Move to another page in the website [6]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (ST/FD) 101066/3
© UCLES 2015 [Turn over
2
Write down six editing techniques which have been used on the image and the text.
Printout after
This is a flower pot with two flowers. One
is growing straight up and the other is
growing at an angle.
1 ........................................................................................................................................................
2 ........................................................................................................................................................
3 ........................................................................................................................................................
4 ........................................................................................................................................................
5 ........................................................................................................................................................
6 ........................................................................................................................................................
[6]
2 For each use, tick the most appropriate type of application software.
Flight simulation
3 Tick the type of computer which would be most appropriate for each use of ICT.
[4]
4 Tick the most appropriate method of implementing a new system for each company.
[4]
Complete each sentence using the most appropriate words from the following list.
(a) The inbuilt device which moves the cursor when using a laptop is called
............................................................[1]
(b) The device used for selecting an icon so a bar code label can be printed in a supermarket is
called
............................................................[1]
(c) The device used for controlling a pointer on a screen when the user has limited motor skills is
called
............................................................[1]
Give three instructions which the turtle graphics software could use to draw the shape. For each
one, explain the meaning of the instruction.
Instruction 1 ......................................................................................................................................
Meaning ............................................................................................................................................
..........................................................................................................................................................
Instruction 2 ......................................................................................................................................
Meaning ............................................................................................................................................
..........................................................................................................................................................
Instruction 3 ......................................................................................................................................
Meaning ............................................................................................................................................
..........................................................................................................................................................
[6]
7 Scientists want to find the level of pollution in a river running past a chemical factory. They will use
sensors connected to a computer to do this.
(a) Name three sensors that the scientists would place in the river.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Explain why it is so important to carefully consider the position of sensors placed in the river.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe how the computer would monitor the level of pollution in the river.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
8 A school has introduced a system so that parents of its students can access data about their
children.
(a) Give three reasons why the school has introduced this system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) In order to access this data, parents will need to log on to the school’s website.
Describe the purpose of the following two items of data they will need to enter.
User id .......................................................................................................................................
...................................................................................................................................................
Password ...................................................................................................................................
...................................................................................................................................................
[2]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
A B C D
(a) Give the cell reference of the cell that contains $20.
...............................................................................................................................................[1]
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(d) Write down the formula which should go in cell D8. Make the most efficient use of a function.
...............................................................................................................................................[2]
(e) Explain why financial models are often used to predict future profitability.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
The following is part of a video hire shop database showing films available in Blu-ray format.
(a) Each of the following fields contains data that is numeric. Give a more precise data type for
each of these fields.
Price .........................................................................................................................................
Length .......................................................................................................................................
[2]
(b) Blu-ray discs have one of three region codes or are region-free.
Describe how the field Regions could be set up to reduce the possibility of inaccurate data
entry.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe, in detail, how you would create a formatted report which does not show regions
and only shows films which are longer than 110 minutes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Word processor
Spreadsheet
Rules base
Search engine
Inference engine
Control software
Knowledge base
Presentation software
[3]
(b) Give three examples of applications which use expert systems other than diagnosis systems.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
14 A large company has asked a systems analyst to research the current system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
15 There are many safety issues associated with the use of computers.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
16 Ajit has been set homework by her Geography teacher. She has the choice of using her text book
or the internet to find the necessary information.
Discuss the advantages and disadvantages to Ajit using the text book rather than the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[7]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
19 Give three specific examples of work that are carried out by a robot in the car industry.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 Flip
Crop
Resize
Use of word/text wrap
Change of font type/face
Change of font size [6]
2
Modelling Database Word Processing
Use
3
Mainframe Laptop Desktop
Use
4
Parallel Pilot Direct
Company running running changeover
[1]
A company with several branches wishes to
test a new system in one branch only.
5 (a) The inbuilt device which moves the cursor when using a laptop is called
a touch pad [1]
(b) The device used for selecting an icon so a bar code label can be
printed in a supermarket is called a touch screen [1]
(c) The device used for controlling a pointer on a screen when the user
has limited motor skills is called a trackerball [1]
FORWARD n/BACKWARD n
Move n units forward/Move n units backward
RIGHT t/LEFT t
Turn right t degrees/Turn left t degrees
REPEAT n
Repeat the following instructions n times
END REPEAT
Finish the REPEAT loop [6]
Temperature sensor
Light sensor
pH sensor
O2 sensor
CO2 sensor [3]
(b) User id – in order to identify the user to the system/in order for system to assign privileges [1]
Password – in order to allow access to the system if it matches user name [1]
9 Four from:
Access to the internet
Email address
Router to connect to the internet
Domain name to have own website
Email security software
Web space to create own website
Storage space to save data in the cloud
DNS service to convert URLs to IP addresses
Firewall to block unauthorised traffic [4]
10 (a) C5 [1]
(b) 8 [1]
(d) =sum(d2:d6)
Sum() [1]
D2:D6 [1]
11 Three from:
OR
13 (a)
Word processor
Spreadsheet
Rules base
Search engine
Inference engine
Control software
Knowledge base
Presentation software
[3]
Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [3]
15 Three from:
16 Seven from:
Advantages
No danger of accessing inappropriate information
Relevant information can be found quite quickly
Don’t have to worry about having to have internet connectivity/computer/phone line/modem
Book will be less biased/more reliable as teacher has recommended it
Index makes searching more efficient
Disadvantages
Book has limited amounts of information
Can be slower to find relevant information than using a search engine
Books can go out of date quickly/difficult to update a book
Books don’t have multimedia to help explain information
Easier to detect plagiarism
17 Three from:
18 Three from:
19 Three from:
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (LK) 101049/3
© UCLES 2015 [Turn over
2
Write down six of these features which have been used in the following passage.
The boiling point of water, H2O, at normal atmospheric pressure is 100° C. The two
elements which make up water are Hydrogen and Oxygen. Water covers seventy percent of
the surface of the earth. In different parts of the world, water can be found in liquid, solid, and
gaseous forms. In its liquid form it is tasteless and odourless and more or less colourless. Many
substances dissolve in water and because of this it is commonly referred to as the universal
solvent.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
5 .......................................................................................................................................................
6 .......................................................................................................................................................
[6]
2 Tick the most appropriate method of inputting data for the following uses.
[4]
3 Explain what is meant by the following terms, giving examples of their use.
MICR ................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
OMR ..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
4 When creating a database, it is important to assign the correct data type to each field.
Tick the most appropriate data type for each of the following items of data.
Text
Numeric Date
(alphanumeric)
A student’s name
[4]
5 Complete each sentence using the most appropriate words from the following list.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
7 Give three reasons why it would not be sensible to use batch processing in an online theatre
booking system.
1 ........................................................................................................................................................
..........................................................................................................................................................
2 ........................................................................................................................................................
..........................................................................................................................................................
3 ........................................................................................................................................................
..........................................................................................................................................................
[3]
FORWARD n .....................................................................................................................................
..........................................................................................................................................................
REPEAT n .........................................................................................................................................
..........................................................................................................................................................
LEFT t ...............................................................................................................................................
..........................................................................................................................................................
RIGHT t .............................................................................................................................................
..........................................................................................................................................................
PENUP ..............................................................................................................................................
..........................................................................................................................................................
PENDOWN .......................................................................................................................................
..........................................................................................................................................................
[6]
9 A chemistry student wants to measure how quickly a liquid cools after it has boiled. She will use a
sensor connected to a computer to do this.
1 .................................................................................................................................................
2 .................................................................................................................................................
[2]
(b) Describe how the computer would process the data into a form the student could use to
analyse the results.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
11 Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
(a) Name three methods of researching the current system other than from examining documents.
Identify the workers that each method would be most suitable for. Each method will be used
with a different type of worker.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) After the current system has been researched, the new system will be designed. This means
that the file structure will be designed.
Identify three items of a flat file structure which will form part of this activity.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(a) Explain, using the terms ‘condition’, ‘true’, ‘false’, how this nested IF function works.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Another student wishes to reverse the formula to get the same result.
She types in the formula IF(A1<6,"weak",IF(A1<12,"medium","strong)
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(c) Financial models and scientific experiments are examples of different types of modelling
applications.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
15 Students at a school visit a variety of websites on the internet to get information about a topic.
(a) Describe four features of a website that will prove that the information found on it is reliable.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe three other features of a website that may indicate that the information found on it is
not likely to be reliable.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) In order to make reliable information available to all students, schools often put the information
on their intranet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
17 There are many health issues associated with the use of computers.
Name three of these health issues and for each one describe, in detail, a different cause.
Cause ...............................................................................................................................................
..........................................................................................................................................................
Cause ...............................................................................................................................................
..........................................................................................................................................................
Cause ...............................................................................................................................................
..........................................................................................................................................................
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 Six from:
Indent
Bold
Subscript
Superscript
Underline
Text highlight
Italic
Fully justified
Border [6]
2
Web cam Keyboard Scanner
Use
3 MICR –
Magnetic Ink Character Recognition/Reader [1]
Used for processing bank cheques/Reads the characters at the bottom of bank cheques [1]
OMR –
Optical Mark Recognition/Reader/position of pencil/pen marks are read by scanner/Reader [1]
Used for processing exam papers/school registers/lottery/multiple choice questionnaires/positions
of marks identified on exam papers/school registers/lottery/multiple choice questionnaires [1]
4
Text
Numeric Date
(alphanumeric)
5 (a) The software used to find information on the internet is a search engine [1]
(b) The software which is a component of an expert system is an inference engine [1]
(c) The type of software used to create financial models is a spreadsheet [1]
6 Three from:
7 Three from:
10 Four from:
11 Six from:
12 Six from:
Interview
Manager
Questionnaire
Drivers
Observation
Secretaries [6]
Simulations
Mathematical models
Civil engineering models
Flight/pilot simulation/training
Design of fairground rides
Traffic control
Building fire simulation
Weather forecast models
Population modelling [3]
16 Four from:
Headaches/eyestrain
From staring at screen continuously
RSI in fingers
From continual typing/repetitive clicking of mouse
RSI in wrists
From repetitive clicking of mouse/continual typing
Backache
From sitting in same position all day [6]
18
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
2
TRUE FALSE
() ()
3
Internet Intranet
() ()
5 Four from:
(c) Can get interference from another radio signal/speed of data transmission can be slower
Other valid answers like physical obstacles/walls [1]
Microphone
Speakers/headphones
Headset [2]
8 Two from:
[9 max]
12 (a)
Field name Data type
Gender
M for male, F for female
13 FTP
File Transfer Protocol/is used to transfer files from one computer to another (1 mark)
Differences
Three from:
HTTP is used to access the world wide web/web sites
FTP is used to download from file servers whereas http is used to download from web servers
FTP – files are transferred from one device to another and copied into memory
HTTP transfers the contents of a web page into a browser for viewing.
FTP upload is used in cases when the file size is very large
HTTP upload is used for smaller files. [4]
(b) =SUMIF($H$4:$H$24,B8,$I$4:$I$24)
= SUMIF($H$4:$H$24, – 1 mark
B8, – 1 mark
$I$4:$I$24) – 1 mark [3]
(c) =COUNT(I4:I24)
COUNT – 1 mark
(I4:I24) – 1 mark
OR
=COUNTA(I4:I24)
COUNTA – 1 mark
(I4:I24) – 1 mark [2]
15 Six from:
use information from sites where responsible bodies have endorsed the site/sites which have
links to other reliable sites/sites which have testimonials
use sites where the author’s credentials are good
use sites which have .ac… , .gov, .edu as the final part of the URL/only use
government/academic sites
Compare information from different sites/ reliable/authenticated text books to see if the results are
similar
Ask teachers for advice on a site
In order to obtain full marks candidates must have at least one mention of things they should do
and things they should avoid doing [6]
16 (a) .txt
Two from:
Text file with very little/no formatting/used by a variety of text editors
Can be opened by any software package that reads text/generic text format
Any formatting is lost when saved [2]
(b) .gif
Two from:
Graphic interchange format
Bitmap graphic format/GIF files use data compression to reduce the file size
Image format that will allow still or moving images to be stored [2]
(c) .pdf
Two from:
Portable document format
Makes it possible to display text and graphics in the same fixed layout on any computer
screen
Reduces file size of read only document for transmission [2]
17 Five from:
Level 0 (0 marks)
Response with no valid content
Examples
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
2
Email Fax
() ()
Transmission of messages is relatively slow
When received can be edited using a word processor
Can have attached sound files
The message is basically an image
3
TRUE FALSE
() ()
WLAN stands for Wide Local Area Network
A WAN often requires the use of a router
The internet is a WAN
A LAN usually covers a smaller area than a WAN
5 Four from:
6 Four from:
7 (a) As well as the recipient this sends a copy of the email to the email addresses listed after
cc [1]
(b) bcc is the same as cc except that the recipient is unaware that copies have been sent [1]
(c) This sends a message that has been received to another email address [1]
(d) This is a group of email addresses that are given a group name so that the sender only
needs to type in one name to send an email to several recipients at once [1]
Sort code
Account/bank card number
3 digits from password/passcode
Memorable date/mother’s maiden name/favourite place/answer to security question/place
born
Date of birth [2]
If the marks don't fill the space completely they may not be read correctly/overfill the
space/smudged
If the marks are not in a dark enough pencil they may not be read correctly
If more than one lozenge shaded in result is invalidated
Only suitable for recording one out of a selection of answers, not suitable for text input
Have to use prepared forms which may be expensive
Examinations could consist of mainly multiple-choice questions changing the nature of what
is being tested [3]
12 (a) =Countif(B$2:B$23,D5)
Countif – 1 mark
(B2: – 1 mark
B23, – 1 mark
Absolute referencing – 1 mark
D5) – 1 mark [5]
Two from:
14 Six from:
15 (a) Jpeg –
(b) Png
17 Six from:
18 Six from:
Level 0 (0 marks)
Response with no valid content
Examples
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_12_2016_1.19
© UCLES 2016 [Turn over
2
1 Write down the most appropriate input device which matches the following descriptions:
........................................................................................................................................... [1]
(b) This is not a mouse but is used to manoeuvre objects around the screen in computer video
games.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
true false
(✓) (✓)
The Arithmetic and Logic Unit is part of the Central Processing Unit.
[2]
3 Tick whether the following statements would most appropriately apply to the internet or an intranet.
internet intranet
(✓) (✓)
[2]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) An internet protocol for delivering private messages using cryptography is called
........................................................................................................................................... [1]
(d) An attachment to an electronic message used to verify the identity of the sender is called
........................................................................................................................................... [1]
5 Describe four methods you could use to minimise the likelihood of receiving spam emails.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
6 A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.
........................................................................................................................................... [1]
(b) In order to access the network the laptop must be within range of a type of WiFi network device.
................................................................................................................................ [1]
(ii) Describe how this device is connected to the network using an ethernet cable.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
........................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
8 There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
9 A customer wishes to check the balance of their bank account and inserts their card into the ATM.
(a) Describe the computer processing which takes place at the ATM.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe the computer processing which takes place at the bank’s computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
10 When a bank cheque is presented to a bank it is sent off to a cheque clearing centre.
(a) (i) Give three items of information that are pre-printed on the cheque in magnetic ink.
1 .............................................................................................................................
................................................................................................................................
2 .............................................................................................................................
................................................................................................................................
3 .............................................................................................................................
................................................................................................................................
[3]
(ii) Describe how MICR is used to read these details from the cheque.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
(b) Explain why magnetic ink is used rather than bar codes on a cheque.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
11 Name and describe three methods of implementing a new computer system. For each one describe
the type of situation where each method might be used.
1 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[9]
12 Maria is the principal of the International Municipal school. She has employed Paulo, a systems
analyst, to create a new database system to store records of her final year IGCSE students.
(a) Complete the following table by entering the field names and most appropriate data type for
each field.
Name
Boolean
Height
[7]
(b) Paulo wishes to save storage space. He does not change the Name field, but decides that two
other fields could have their data shortened.
Apart from the Name field, identify the two other fields and describe how the contents will be
shortened.
Field 1................................................................................................................................
Field 2................................................................................................................................
[4]
(c) There is no key field set. Maria’s secretary typed in the data to the database in this order:
Maria can get the database back in to the original order by sorting the data using one field.
Write down the name of this field and the order in which it will need to be sorted.
Field...................................................................................................................................
Order.................................................................................................................................
[2]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
A B C D E F G H I
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
........................................................................................................................................... [3]
(c) The formula in I26 only refers to the values in column I. Write down the formula you would
expect to see in cell I26
........................................................................................................................................... [2]
15 Information on the internet can sometimes be unreliable. Discuss ways you could minimise the
chance of finding unreliable information when searching the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
(a) .txt
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) .gif
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) .pdf
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
h1 {
colour: #000040;
font-family: Arial, sans serif;
font-size: 18 px;
text-align: center;
}
h2 {
color: 000000;
font-family: Times New Roman, serif;
font-size: 15px;
text-align: centre;
}
body {
background-image: url('j12backgd2.jpg');
background-color: #025fb4;
}
table {
border-collapse: collapse;
border-width: 4px;
border-style: solid;
border-color: #000000;
}
td {
border-width: 2px;
border-style: solid;
border-color: #000000;
}
Write down five mistakes which would prevent this stylesheet from working properly and, for each,
give the correction.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
[5]
18 Discuss why different user interfaces require the use of different types of input device.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_13_2016_1.20
© UCLES 2016 [Turn over
2
Write down the most appropriate input device which will enable you to:
........................................................................................................................................... [1]
(b) select options from a drop down menu whilst moving the device
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
email fax
(✓) (✓)
[2]
true false
(✓) (✓)
[2]
4 Different types of test data are used to test a newly developed system.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(d) Data which has been used with the current system and the results are known is called
........................................................................................................................................... [1]
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
(a) cc
...........................................................................................................................................
........................................................................................................................................... [1]
(b) bcc
...........................................................................................................................................
........................................................................................................................................... [1]
(c) forward
...........................................................................................................................................
........................................................................................................................................... [1]
(d) group
...........................................................................................................................................
........................................................................................................................................... [1]
(e) attachment
...........................................................................................................................................
........................................................................................................................................... [1]
8 A school library uses a computer system where there is a book file and a borrower file.
Each student has a unique membership number and each book has a unique accession number.
The accession number is the number given to a book when it is first bought by the library.
When a book is borrowed, the student has their thumbprint read by a special input device.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Describe the computer processing involved when a book is returned. There is no need for the
borrower to have their thumbprint read during this process.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
9 When customers use phone banking they are connected to an automated system.
(a) Give two items of data they are asked to key in to identify themselves to the system.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Identify three services that they can use in phone banking.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
10 A student exam answer sheet consists of boxes or lozenges which the student shades in to indicate
their choice of answer.
(a) Apart from the details of the test and the lozenges, give two items of information, essential to
the student, that are pre-printed on the answer sheet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Describe how Optical Mark Recognition is used to process the details from the form.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
11 Enrique has developed a new database system for a supermarket. Below is one record from
the database. He needs to test the validation checks that he has developed for the system.
(a) He designed a length check for the Barcode field. However, when he entered the code
5012472141308 by mistake, the system still accepted it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) The Reorder_level for each item is never more than 100. He developed a validation check to
make sure this is the case.
Name and describe the validation check he should use and explain why the number could
have been rejected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) He also designed a length check for the Supplier_code field. However, when he entered
EZQ23 by mistake, the system still accepted it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) For each field write down the most appropriate data type. For any numeric field specify the
type of number.
Barcode.............................................................................................................................
...........................................................................................................................................
Supplier_code....................................................................................................................
...........................................................................................................................................
Contents............................................................................................................................
...........................................................................................................................................
Price..................................................................................................................................
...........................................................................................................................................
Reorder_level....................................................................................................................
...........................................................................................................................................
Weight(kg).........................................................................................................................
...........................................................................................................................................
[6]
12 Here is a spreadsheet showing the countries which have been selected to host the Commonwealth
Games.
A B C D E
1
2 1930 Canada
3 1934 England
4 1938 Australia
5 1950 New Zealand Canada 4
6 1954 Canada England 2
7 1958 Wales Australia 5
8 1962 Australia New Zealand 3
9 1966 Jamaica Wales 1
10 1970 Scotland Jamaica 1
11 1974 New Zealand Scotland 3
12 1978 Canada Malaysia 1
13 1982 Australia India 1
14 1986 Scotland South Africa 1
15 1990 New Zealand
16 1994 Canada
17 1998 Malaysia
18 2002 England
19 2006 Australia
20 2010 India
21 2014 Scotland
22 2018 Australia
23 2022 South Africa
24
(a) Cells E5 to E14 contain the number of times each country has been selected to host the
Commonwealth Games.
Write down the formula which should go in cell E5 so that it can be replicated down to cell
E14.
........................................................................................................................................... [5]
(b) Papua New Guinea are interested in bidding to host the 2026 Commonwealth Games. If they
are successful the spreadsheet will need to be updated.
Apart from those in column E, write down the cell references of those cells which will need to
change.
........................................................................................................................................... [3]
13 Describe what an ISP is and, apart from security measures, describe what it offers its customers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
14 Explain how you would evaluate the reliability of information found on the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
15 Describe each of the file formats giving a different use for each.
(a) .jpeg
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) .png
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
16
Describe, in detail, the changes that have happened to make shape A into shape B.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
<td>
<p>Manta conservation workshops and holidays can be booked through
the Xtreme Adventure Holiday Company or by <a href="http://www.xahc.co.uk" target="_manta">
clicking here.</p>
<td>
<p><href="mailto:tmcp@cie.org.uk">Email</a> us for details of our
Manta Education Packs or <a href="mailto,tmcp@cie.org.uk,subject=Donation by
John>">click on this link<a> to discover how to donate to help us preserve
these disappearing species.</p>
</td>
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
6 ...............................................................................................................................................
..................................................................................................................................................
[6]
18 The following are two slides from a presentation produced for young children.
Describe six improvements to the presentation that would make it more appealing to a typical adult
audience.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
6 ...............................................................................................................................................
..................................................................................................................................................
[6]
19 Discuss the use of spreadsheet software compared to database software to store and manipulate
student data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (CW) 117035/4
© UCLES 2016 [Turn over
2
Give the most appropriate type of communication device that fits the following descriptions.
...............................................................................................................................................[1]
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(d) This device connects one LAN to another LAN that uses the same protocol.
...............................................................................................................................................[1]
...................................................................................................................................................
...............................................................................................................................................[2]
(i) This type of software lets you manage the hardware and software resources.
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) This type of software lets you carry out tasks such as creating a document or an image.
.......................................................................................................................................[1]
.......................................................................................................................................[1]
3 Tick whether the following devices are input, output or backing storage.
backing
input output
storage
(✓) (✓)
(✓)
Motor
CD-R
Web cam
Printer
[4]
true false
(✓) (✓)
If capital letters are used in emails, it is considered as ‘shouting’.
You should always use coloured text and coloured backgrounds in emails.
5 The directors of a multi-national car company need to communicate with each other. They have
decided that the best way to do this is through web-conferencing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The directors wish to have a conference with their managers in other countries and are
considering the use of video-conferencing.
Name three pieces of hardware that would be needed in order to hold a video-conference.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 Tick the most appropriate storage medium for each of the following uses.
7 A teacher has produced a piece of software and uses it to record exam marks. Each exam has a
total of 100 marks available. If a student does not take the examination then the mark awarded is 0.
A B C D
1
2 Name of Student Examination Mark Pass or Fail
3 Candidate A 20
4 Candidate B 70
5 Candidate C 45
6
7
8
9
(a) Write a formula that would be entered in cell C3 to display the word pass if the value in B3 is
more than 75 marks or the word fail if it is not.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The teacher wishes to test a formula on the spreadsheet and uses normal, abnormal and
extreme test data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
8 Biometrics have replaced user IDs and passwords in a large number of systems.
Discuss the advantages and disadvantages of using biometric systems rather than more traditional
security methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Many countries have copyright legislation which applies to the purchasing of software.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
10 Members of a US Conservation Unit recently discovered a species of frog new to New York. They
identified the frog using an expert system called ARK.
(a) Describe how an expert system can be used to help identify a newly discovered type of
animal.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Identify two other applications which make use of expert systems.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
For each named field, give an appropriate validation check the developer should use.
(d) A report is generated from the results. The report contains headers and footers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
11 A manager of a computer store has created a relational database to keep track of its orders. She
has created two tables that are linked together.
Table A: products
(a) Name the most suitable primary key in the products table.
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(c) On the data shown in the tables above, the following search is to be carried out:
(Unit_price>$250)
...............................................................................................................................................[1]
(d) On the data shown in the tables at the start of question 11, the following search is to be
carried out:
...............................................................................................................................................[2]
(e) The store has created a report with a new field called total_price to be calculated at run time.
This field will contain the number of units ordered multiplied by the price of each unit.
...................................................................................................................................................
...............................................................................................................................................[2]
12 Explain, using examples, the difference between a function and a formula in a spreadsheet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
13 A new system has been developed and documentation has been produced. There are two types of
documentation; user and technical.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
14 There are several security issues surrounding the use of smartphones. These include smishing
and pharming.
(a) Describe different security measures that can be put into place to stop smishing or pharming
attacks.
Smishing ...................................................................................................................................
...................................................................................................................................................
Pharming ..................................................................................................................................
...................................................................................................................................................
[2]
(b) Cookies are sometimes seen as a security threat when in reality they are only a nuisance.
Explain, using an example, what cookies are and why they are important to companies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
17 It has been announced that the UK banking industry will not now remove the use of cheques.
As more and more people are using debit cards to pay for goods, the cheque was to be phased
out in the UK by 2018. The use of cheques for transactions is declining but still available.
Compare and contrast the use of debit cards and cheques to carry out transactions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
(ii) For example: Operating system, file management system, utilities [1]
3
input output backing storage
(9) (9) (9)
Motor 9
CD-R 9
Webcam 9
Printer 9 [4]
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
4
true false
(9) (9)
Webcams/cameras
Large monitors/projector
Microphones
Speakers/headphone [3]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
6
Fixed
Magnetic
Hard Blu-ray Memory card
Tape
Disk (9) (9)
(9)
(9)
[4]
Storing the back up of a file server 9
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
(b) Normal data is data that is within the range/right data type. [1]
8 Six from:
Examples
Advantages
Biometrics are unique…
…so others cannot sign people in/whereas with password/card systems someone else can sign
you in.
Fingerprints/eyes are always with you…
…but a password/card can be lost.
Cannot be forgotten passwords can be forgotten
The user has to be present therefore more secure.
Typing in passwords can lead to errors on data entry…
…biometrics tend to be more reliable.
More difficult to forge…
…passwords can be copied/cards can be stolen.
Disadvantages
Personal liberty infringement…
…fingerprints/biometric must be stored.
Method is slower to enter system than passwords.
Equipment and setup is more expensive than producing cards.
The time taken to set up a store of fingerprints/eye prints can be a long time…
…quicker to set up a database of passwords.
If the finger is damaged/dirty it cannot be read passwords can be more reliable.
If dark glasses are worn retina cannot be read passwords are more reliable
If a voice is not understandable on a voice recognition system may not work.
Facial hair can stop facial recognition passwords are more reliable
9 Three from:
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
(c)
Field Name Validation Check
Three max
A header and footer may be on every page to show consistency.
Don’t have to type it in on every page…
…saves time
…reduces errors
Three max
What is in that section of document/title of the sub-section
Author of the document
The page number
The version
The date
File name/path
Company logo/name
To gain full marks candidates must have an example and explanation. [4]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
(=)[Quantity]*[Unit_price]
1 mark for [Quantity] *
1 mark for [Unit_price] [2]
12 Four from:
To gain full marks candidates need to mention both a function and formula. [4]
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
14 (a) Smishing
One from:
Pharming:
One from:
A small text file sent/downloaded to a user’s web browser when they visit a web site [1]
Two from:
Store information about the visit and are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users [2]
© UCLES 2016
Page 9 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 12
15 Four from:
The issues raised will be justified. There will be a reasoned conclusion. The information will be
relevant, clear, organised and presented in a structured and coherent format.
There may be a conclusion. For the most part the information will be relevant and presented in a
structured and coherent format.
Level 0 (0 marks)
Response with no valid content [8]
© UCLES 2016
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 9 6 9 8 6 5 5 3 *
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (RW/JG) 115300/3
© UCLES 2016 [Turn over
2
true false
(✓) (✓)
Tablet computers have touch screens.
Smartphones will only connect to the internet through WiFi.
A tablet computer has a separate keyboard.
Smartphones use a touchpad.
[2]
...............................................................................................................................................[1]
...................................................................................................................................................
...............................................................................................................................................[1]
true false
(✓) (✓)
A GUI involves the use of windows and menus.
User interaction with a GUI is intuitive.
A GUI takes up a lot of memory and resources.
Users have to learn a list of system commands in order to use a GUI.
[2]
true false
(✓) (✓)
ROM is Real Optical Memory.
RAM stores the instructions you are currently working on.
ROM stores the BIOS.
RAM allows the user to read and write data.
[2]
(a) Name the type of printer that is best suited to operate in harsh conditions.
...............................................................................................................................................[1]
(b) Name a type of monitor that can reduce the effects of eye strain.
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(d) Name the type of monitor that is an input device on which output can be seen and is found in
a public information system.
...............................................................................................................................................[1]
5 A new system is being implemented in a company. The systems analyst has a number of ways
that the system can be implemented.
For each named method, give an advantage of using the implementation over the others.
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Describe the measures that should be taken to help protect data from being hacked.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 This email has been received by a bank customer who believes it may be fraudulent.
From: no_reply@manger.tawarabank.com
Subject: Account Status
Dear Costumer,
Due to resent activity on account, we have reason to believe that your account has been
compromised . For your security, we have temporariley prevented access to your account.
Tawara Bank safeguards your account when there is a possibility that someone other than you
tried to log in. You may be getting this message because you signed in from a different location
or device. If this is the case, your access may be restored when you log in your username and
passward.. For immediate access, you are required to follow the instruction below to confirm
your account in order to secure your personal account information.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
8 Uniform Resource Locators (URL) are used to locate web addresses and resources. In order to
get to the weather forecast for Auckland, New Zealand, you would enter:
http://www.bbc.com/weather/2193733
http:// .........................................................................................................................................
...............................................................................................................................................[1]
www.bbc.com ............................................................................................................................
...............................................................................................................................................[1]
weather .....................................................................................................................................
...............................................................................................................................................[1]
2193733 ....................................................................................................................................
...............................................................................................................................................[1]
(b) The 2016 CIE IGCSE ICT syllabus can either be found using a web browser or a search
engine.
Describe two advantages of using a web browser rather than a search engine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
9 You have completed a word processed report for a History project on the First World War. You set
the computer to check the grammar and spelling.
Explain why you still need to check the spelling and grammar visually.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
10 There are several ways in which members of an organisation can organise meetings. These
include video-, audio- or web-conferencing.
(a) An organisation is planning an important meeting with the Directors of the three main offices.
They are going to set up an audio-conference.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The organisation has a computer network which is connected to the internet. The router
contains a firewall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
11 The headteacher of a school has decided to allow all data about the students to be backed up
onto the cloud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Even though the cloud appears to be an excellent resource, it has many problems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
[3]
14 Car production lines use robots to manufacture the vehicles. The robots have devices attached to
their arms to help in the manufacturing process.
(a) For each of the named devices, describe their use on a car production line.
...............................................................................................................................................[1]
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(b) Give three advantages to the company of using robots rather than humans to manufacture
cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) Give three disadvantages to the company of using robots rather than humans to manufacture
cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) Cars have to be designed before they can be manufactured. 3D printers can be used to
produce models of a car.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
WiFi ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Satellite .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
3G / 4G ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
16 The following is part of a household budget spreadsheet. Cells B9 and B14 contain formulas. The
owner wishes to test the spreadsheet which must follow the following rules:
A B C
1 Household budget
2
3 Outgoings
4 Heating $45.00
5 Food $80.00
6 Travel $35.00
7 Utilities $61.00
8 Clothes $40.00
9 $261.00
10 Income
11 Total Salary $280.00
12
13
14 Balance $19.00
15
(a) Describe four testing strategies you could use to test the model.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe how you would change the spreadsheet so that it alerts the user if any outgoing is
greater than $100.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
17 A new toll road that drivers pay to use has just opened. The company that owns the road uses
Electronic Number Plate Recognition Systems to collect payments from drivers automatically.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
18 For each of the following safety issues suggest a possible strategy for preventing the problem.
Electrocution ....................................................................................................................................
......................................................................................................................................................[1]
Fire ...................................................................................................................................................
......................................................................................................................................................[1]
......................................................................................................................................................[1]
......................................................................................................................................................[1]
19 The director of a major electronics company announced that ‘homes are about to become much
smarter’. He was talking about the use of home appliances that could connect to the internet.
These include central heating systems, ovens, televisions and fridges.
Devices like these need to connect to the internet. Discuss the advantages and disadvantages of
connecting them to the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
true false
(3) (3)
[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks
true false
(3) (3)
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
true false
(3) (3)
ROM is Real Optical Memory. 3
5 Parallel running
If the new system fails then the old system is still running.
There is always a backup of the whole system. [1]
Direct Changeover
Phased Implementation
If the new system fails then most of the old system still in place.
Possible to see if part of the new system works before proceeding [1]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
6 (a) Unauthorised access to computer systems with the intention of causing harm [1]
Editing files/data
Deleting files/data
Installing viruses
Exposing weaknesses of the system [2]
7 Three from:
Spelling errors
Information requested that the bank would not ask for e.g. password and username/personal
information
Not personalised – name or part of account number
Hyperlink not usually given
Inconsistency i.e. manager and Chief Customer Officer
9 Three from:
The language/dialect used in checking the spelling/grammar could be different e.g. English(US).
Names/proper nouns might be highlighted as an error but are acceptable.
If no suggestions are given
Similar sounding words need to be checked, i.e. where, were, wear.
The grammar might be too complex for the grammar checker to cope with. [3]
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
Either
Contact an audio conferencing provider …
…for organiser’s PIN
…for participant’s PIN
Give the PIN to each participant
at the start of the conference organiser types in his PIN
Each participant dials the number and enters the PIN
or
the organiser phones/contact the first participant
the organiser phones/contact subsequent participants
puts them on hold…
…until all participants have been contacted
joins the participants together/joins the conference [4]
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
Disadvantages
Loss of control of the data…
…as the data is controlled by a data storage provider.
…the user needs to be able to trust the service provider and its staff.
…security issues with the storing of the data with the provider
…fire/flood/electricity spikes can affect data without the user knowing.
The data remains on the server for a length of time…
…easier to be hacked as more copies of it available…
…available for longer…
…users must use strong passwords/authentication methods as hackers have longer time to
be able to crack the password…
…as several copies of the data are available
If data is not encrypted…
…can lead to security issues due to loss of control/hacking.
If connection is lost then the cloud cannot be accessed…
…data could be lost due to this.
If there is a mass/lot of data the data could be split over several servers…
…may have problems retrieving the data.
…may lead to security issues.
…data may be lost during the saving process.
Cost of using cloud is more expensive than buying a hard disk/SSD…
…most computers come with a hard disk/SSD
Difficult to delete all copies of a file…
…as the data is stored/backed up several times.
Advantages
The data is accessible anywhere…
…helps to migrate data from one device to another.
…helps to synchronise data.
Don’t have to buy storage devices…
…some devices do not have hard disks/storage
…the cloud can be used for all storage requirements.
More storage space than using physical devices…
…the cloud has lots of storage
Don’t have to manage the storage…
…the service provider manages the storage
…user does not have to worry about security measures as service provider secures data.
Allows many users to access the data…
...as the data is stored centrally.
Only pay for the storage you use…
…much of the space on the hard disk may be wasted. [6]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
12 Five from:
13 Three from:
Knowledge base
Rules base
Inference engine
Interactive user interface [3]
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
(b) WiFi
Satellite
This is broadband
Useful for general use of the internet
(Connects via satellites so) better coverage
Can be used almost anywhere in the world [2]
3G/4G
© UCLES 2016
Page 9 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
To test the balance is negative change the values in the outgoings so the total is larger than
the total income
Test each individual outgoing so it is larger than 100/abnormal testing
Test each individual outgoing so it is equal to 100/extreme testing
Test so the total outgoing is equal to total income
Type in a negative income
Type in a negative outgoing
Test each individual outgoing so it is less than 100/normal testing
Test using live data [4]
17 Four from:
© UCLES 2016
Page 10 Mark Scheme Syllabus Paper
Cambridge IGCSE – October/November 2016 0417 13
Level 0 (0 marks)
Response with no valid content. [8]
© UCLES 2016
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*8606559575*
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_12_2017_1.2
© UCLES 2017 [Turn over
2
1 When a person buys goods in a supermarket they have to pay at the checkout.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
true false
(✓) (✓)
[2]
3 Tick whether the following items are found in technical documentation or user documentation or
both.
Error messages
Hardware requirements
Program listing
[4]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
5 The managers of a nuclear power plant need to check the radioactivity levels in a chimney stack
which needs to be demolished. They intend to use a robot. This device has sensors to read the
radioactivity levels.
(a) Explain why the data from the sensors cannot be read directly by the microprocessor and
name the device needed to change the data into a form that the microprocessor can understand.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) The managers have been told they can use this robot for other tasks by replacing the existing
sensors with different ones.
Give three advantages of using an existing robot device rather than developing a new one.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
6 A student has completed some work at school and wishes to take it home. He could use a pen
drive or a CD R disc to transport the files.
(a) Give two error messages that could appear to stop him saving his work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Compare and contrast the use of a pen drive rather than a CD R.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
7 Driverless automobiles use a number of different methods to drive between two points.
(a) Name a sensor that could be used on the automobile to detect a person walking in front of it.
........................................................................................................................................... [1]
(b) Modern automobiles contain electronic devices designed to help the driver.
Suggest three examples of labour-saving or safety devices in a modern automobile that use
sensors.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(c) Discuss the advantages and disadvantages of these devices in relation to automobile journeys.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(a) From the list below, tick two components of an expert system.
tick
(✓)
Control unit
Graphics program
Inference engine
RFID
Rules base
Search engine
[2]
(b) Describe three benefits of the doctor using an expert system to help diagnose a patient’s
illness.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
9 A school’s examinations officer has decided to develop a database to store pupil details and the
examinations they are due to sit next summer. They are going to use a relational database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Some of the records stored in the database are given below.
Based only on the examination details above, complete the table below, stating the most
appropriate data type for each field.
Examination_ID
Name_of_subject
Examination_level
Date_of_exam
[4]
(c) Write the search criteria to search for all examinations which will be sat after 26/06/2018, using
at least one of the following operators >, >=, <, <=, = .
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Apart from presence check, name and describe a suitable validation check for each of the
following fields in the database, based on the data shown in part (b).
Examination_ID.................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Date_of_exam...................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
10 A leisure centre is creating membership cards for all its members. The membership card must
include a photograph of the member, the member’s name and membership number, the type of
member (Senior or Junior), their date of birth and gender.
[5]
(b) Describe all the steps involved in carrying out a mail merge to create the membership cards.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
11 The Xtreme Adventure Holiday Company are setting up a spreadsheet for their payroll. They have
job codes for each of their employees. Below is part of the payroll spreadsheet.
A B C D E F G
1 The Xtreme Adventure Holiday Company
2
3
4
5 Job codes
6 A Administration/Office
7 B Snowboard Instructor
8 H Host/Hostess
9 S Ski Instructor
10 SA Senior Administrator
11 TA Transport Assistant
12 TB Trainee Snowboard Instructor
13 TM Transport Manager
14 TS Trainee Ski Instructor
15
16 Employees
17 Name Job code Job description
18 Luca Gisi B
19 Livio Stager S
20 Nico Gantert B
21 Fabian Ging S
22 Mattia Polt S
23 Sofia Walp H
24 Laura Haener S
25 Alessandro Messerli S
26 Lara Forrer B
27 Arda Hegler S
28 Simone Aebi B
(a) Describe, giving a suitable name for the range (A6:B14), how the payroll manager could name
this range.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Write a formula for cell C18 to display the job description, using the named range from part (a).
...........................................................................................................................................
........................................................................................................................................... [4]
12 When a new system is being developed analysis takes place. One method of researching the
current system is interviewing.
1.........................................................................................................................................
2.........................................................................................................................................
3.........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Tick the jobs below for which the introduction of computers will increase the number of workers.
Delivery drivers
Payroll workers
Programmers
Typists
Website designers
[3]
Compressed hours............................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Flexible hours....................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
14 There are different ways to check the data that you have entered into a computer system. One of
these ways is verification.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
2 2
true false
(✓) (✓)
A router is required to allow a LAN to connect to the internet ✓
A web browser displays a web page ✓
An intranet has restricted access ✓
ISP means Internal Service Provider ✓
3 4
technical user both
(✓) (✓) (✓)
Error messages ✓
Hardware requirements ✓
Program listing ✓
Purpose of the system ✓
4(a) Crop 1
4(b) Resize 1
4(d) Rotate 1
6(b) Differences 4
Similarities
− Pen drive and CDR are storage devices
− CDR and pen drive are portable
7(c) Advantages 6
Disadvantages
Max four from:
− The driver relies too heavily on the device and can become over reliant/You are
legally responsible for the car
− The device may fail and put the driver/pedestrians in danger
− Sometimes the device is more of a hindrance than a help e.g. parking sensors in
traffic jams
− Can increase the price of the car
− Very difficult for the driver to repair the car himself
− GPS can take the driver a long way out of his way when trying to avoid hold ups
− The driver can believe the GPS and drive into the river/narrow road.
− Air bags can accidentally trigger is there is a small collision/they have a life span
− Excessive number of devices/devices left activated can lead to battery drain
8(a) 2
tick
(✓)
Control unit
Graphics program
Inference engine ✓
RFID
Rules base ✓
Search engine
9(b) 4
Field name Data type
Examination_ID Text
Name_of_subject Text
Examination_level Boolean
Date_of_exam Date
9(d) 1 mark for name of suitable check and 1 mark for description of suitable check 4
Examination_ID
Length check
The data must be exactly 6 digits /characters
Date_of_exam
Range check
The dates must be a range specified
Or
And
And
And
12(a) Observation 3
Questionnaire
Examination of documents
13(a) 3
Job description tick
(✓)
Car production workers
Delivery drivers ✓
Payroll workers
Programmers ✓
Typists
Website designers ✓
Flexible hours
Level 0 (0 marks)
Response with no valid content
MODIFIED LANGUAGE
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_13_2017_1.1
© UCLES 2017 [Turn over
2
1 Using the list, write down the most appropriate output device to produce the following.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
true false
(✓) (✓)
[2]
Icon Meaning
[4]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The special margin that is placed at the top or edge to clear the text from the fold in a page is
called the
........................................................................................................................................... [1]
(d) When the first line of a paragraph appears as the last line of a page this is called
........................................................................................................................................... [1]
5 People can manage their bank accounts in different ways. One way is telephone banking.
(a) A person wishes to use telephone banking without speaking to an operator to transfer money
from one bank account to another.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) When a debit card is read by computer, data on the card can be used for transactions.
List four items of data found on a debit card which can be read by computer.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
6 Midwest School library has a database system. Students who borrow books present their library
cards containing their details. The librarian wishes to improve security by introducing biometric
methods.
(a) Name two direct input methods the cards could use.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(c) Name and describe in detail the files the library database system would use.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) The fields date_borrowed and date_due_back are contained in the database.
The date_due_back field is calculated from the date_borrowed field. The student can borrow
a book for 14 days.
...........................................................................................................................................
........................................................................................................................................... [2]
The spreadsheet lists each student’s name and their target level. The levels range from 1 to 9,
where 9 is the best level.
Teachers enter the current working level. If the working level is the same or better than target level
then ‘‘well done’’ is displayed in the comment cell, otherwise ‘‘needs improvement’’ is displayed.
A B C D E F G
Target Working
1 Name Comment
Level Level
2 Peter Smith 9 6
3 Frances Brown 5 7
(a) Write a formula for cell E2 to automatically display ‘‘needs improvement’’ or ‘‘well done’’.
...........................................................................................................................................
........................................................................................................................................... [3]
(b) The school is going to use the data from the spreadsheet in its reports to parents. The school
plans to mail merge the report with the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) The teacher needs to check the data source and template before the data is merged.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(a) Complete the data dictionary of the database, adding the most appropriate data type for each
field.
Membership_number Number
Member_name
Membership_fee_paid Boolean
Telephone_number
Expiry_date_of_membership
Membership_fee_amount
[4]
(b) The club secretary wishes to find all the junior members who have paid their membership fee
which would be less than $100.
He now wishes to invite selected members to a special evening. These members will be those
with a membership number over 200 as well as members whose membership expiry date is
before 1 Jan 2017.
Write search criteria to list all the members that should be invited.
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the benefits and drawbacks of storing membership details on a computer database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
10 Using computers can cause problems for the health and safety of users.
(a) Evaluate your own use of computers in terms of health. Include any strategies you have
devised.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Name three safety issues associated with your use of computers. For each issue describe a
way of minimising the risk.
1.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
Name three other methods of implementation. For each method give an advantage when compared
with direct changeover.
1 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[6]
12 With the increased use of the internet, software copyright rules are being broken more often.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Software piracy is one major consequence of the failure to comply with copyright rules.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 Key-loggers are thought to be security risks but they can be used to monitor and track the use of
employees on a computer system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) A small minority of employees in a company have been using the computers for non-business
use, so the company has had to introduce other methods of monitoring their use of ICT.
Apart from key-logging list three other ways that employees could be monitored in their use
of ICT.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
14 Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
1(b) speaker 1
1(c) 3D printer 1
1(d) monitor 1
2 true false 2
(✓) (✓)
3 4
Icon Meaning
Home
Next Slide
Final Slide
4(a) point 1
4(c) gutter 1
4(d) orphan 1
− Borrowers file«
− «This contains all the details of the students
− Loans file«
− «This acts as a link between the book and borrowers file. It contains the
details of the date borrowed and return date
6(d) [date_borrowed]+14 2
Membership_number Number
Member_name Text
Membership_fee_paid Boolean
Telephone_number Text
Expiry_date_of_membership Date
Membership_fee_amount Currency
8(c) Benefits 6
Drawbacks
for example:
using the computer for a long period of time can affect my eyes/cause
headaches...
...take regular breaks to help with eye strain/headaches
hunching over the computer for a long period of time gives back ache/neck
ache...
...Using an ergonomic chair could stop this
Typing for a long period of time or by resting wrists on the table gives RSI...
...therefore a wrist rest/ergonomic keyboard is needed to reduce this.
Parallel running...
...has a backup of the data
Pilot running...
...only affects one branch if system goes wrong/other branches can learn from the
branch's mistakes
Phased implementation...
...if system fails still have most of old system to fall back on
«staff can be trained gradually
− Use of holograms...
− ...this shows that the software is a real copy
− ...holograms cannot be photocopied
− Use of a dongle
− Guards hardware / software modules that have not been tampered with in
any way
Level 0 (0 marks)
Response with no valid content
Disadvantages
Need a compatible phone
Not available online
Stores need the reader
May be issues with connectivity as a phone is used
Hackers accessing the phone signal
Phones can run out of battery
There is a limit on how much can be paid
Older people may not have phones
More difficult for older people to use
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (CE/FC) 132682/3
© UCLES 2017 [Turn over
2
1 Tick whether the following statements would apply to a LAN, a WAN or a WLAN.
2 Complete the following sentences, using the most appropriate technology from the list below.
a scanner a speaker
...............................................................................................................................................[1]
(b) The use of a computer to perform tasks that mimic or duplicate the functions of the human
brain is called
...............................................................................................................................................[1]
...............................................................................................................................................[1]
...............................................................................................................................................[1]
3 A school is holding an athletics competition. The timings of each running event will be measured
electronically using sensors at the start and finish. Runners begin a race in starting blocks. When
the starting pistol is fired the electronic timing starts. The winner of the race is the first to break the
light beam at the end of the race.
(a) Complete the table using the most appropriate words from the list below.
Device
Data from the starting pistol is read by this
device
This device detects that the athlete has left
the starting block
When the light beam is broken the data is
read by this device
[3]
(b) A member of the sports department will use a computer to produce a magazine of the
competition. He will include photographs stored in a digital camera as well as printed
photographs.
Identify the methods he would use to transfer the photographs to the computer.
...................................................................................................................................................
...................................................................................................................................................
[2]
4 You have been asked to set up a hierarchical folder structure for your IGCSE ICT work directories
so that you can easily locate certain files.
(a) Fill in the boxes and complete the most appropriate hierarchical folder structure, to store
practical and theory work for both homework and classwork.
ICT
[2]
(b) Complete the file path for a document called input_devices.rtf stored in box A.
...............................................................................................................................................[1]
5 (a) Describe the processes a web browser has to go through to load a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
An organisation is creating a company website and is deciding whether to make it available on the
internet or create a company intranet. The website will contain confidential information.
(b) Explain why they should use an intranet rather than the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 Using the images below write down the Safety issue referred to and a way of Minimising the
risk.
[8]
7 One popular reason for young people using the internet is playing online games. One way of
ensuring that young people are safe is to use fictional names to identify themselves.
Describe other measures that should be taken to ensure that playing online games is safe for
young people.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
8 Hot House Design keeps to a corporate house style when creating a website.
Web page 1
Web page 2
Using examples from the two webpages, explain what is meant by house style.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
9 The internet is used as a method of communication. This includes Blogs, Wikis and VOIP.
(i) Blog
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Wiki
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) VOIP
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Tick whether the following statements would apply to Phishing, Pharming or Smishing.
10 The Ocean Sailing Company offers the experience of sailing on a yacht. Customers can choose
which type of yacht they want to sail on. The owner keeps a spreadsheet to calculate the cost
to customers. The owner allocates a loyalty code to each customer. Each code has a different
discount.
A B C D E
1 Holiday Cruises
2
3 Code Discount Cost per day 500
4 1 0.05
5 2 0.1
6 3 0.125
7
Number
8 Name of Yacht of days Percentage Discount Discount
9 1 Ocean Speed 7 =VLOOKUP(A9,$A$4:$B$6,2)
10 2 Sealord 5
11 3 Sunliner 5
12 1 Pacifico 10
13 2 Alexander 14
14 3 Moonliner 5
15 2 Coronia 7
16 2 Voyager 5
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Identify the value you would expect to see in cell D9.
...............................................................................................................................................[1]
(c) The Discount is the cost per day multiplied by the number of days multiplied by the
Percentage Discount.
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Explain how you could replicate the formulae to calculate the Percentage Discount and the
Discount for each yacht.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
11 A theatre manager wishes to introduce an online booking system. A programmer has been asked
to write the software. She could continue on her own or discuss the ideas with the theatre manager.
(a) Explain why is it beneficial to discuss ideas with the theatre manager before writing the
software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give four advantages of using online booking systems for the customer rather than using
manual systems.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
12 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
13 A travel agent specialising in adventurous holidays has asked a systems analyst to recommend a
new computer system for their records. The systems analyst’s first task is to research the current
system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The company has decided to set up a website to publicise its holidays.
Name three appropriate types of object that could be inserted into the web page.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
14 A robot is used as a computerised postal delivery system. It drives around the corridors of a set of
offices picking up and delivering post. If the robot is close to a worker it stops and waits until the
worker moves away.
(a) A proximity sensor is used to detect how close to a worker the robot is.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Robots are being used more and more in offices to carry out menial tasks, like delivering
post.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
15 A word processing program uses a Graphical User Interface (GUI). Using examples from the word
processing program describe three features of a GUI.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
16 The banking industry has rapidly changed over the last few years as modern technology has
developed.
Discuss the advantages and disadvantages of using online banking rather than other banking
methods to the customer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
2(a) a 3D printer 1
2(c) a robot 1
2(d) biometrics 1
3(a) Device 3
4(a) 2
ICT
1
2
or
1 mark for three correct boxes, for example 1, 2 and 2
7 Four from: 4
Be vigilant of others attempting to gain access to your data
Use up to date internet security software«
«antivirus, anti-spyware, firewall
Avoid giving out personal data (not name)
e.g. password, home address, email, age, (mobile)phone number
Be aware of addiction e.g. playing for too long
Be aware of hidden costs«
«read terms and conditions
Play authorised games that have a licence/trusted sites
Choose a user name that does not contain personal information
Use strong passwords
Keep the game up to date
Do not use identifiable images
10(b) 5%/0.05 1
Either
Highlight cells D9 / E9 / D9 and E9
Right click and copy
Highlight cells D10 to D16/ E10 to E16
Right click and paste formulas
Check values are correct
Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Click the black square/drag handle«
«Drag down to row 16
Check values are correct
Or
Highlight cells D9 / E9 / D9 and E9
Fill down...
...to cell D16/E16
Check values are correct
Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Double click/click F4 on the keyboard the black square/drag handle
Check values are correct
Maximum 4 marks.
Level 0 (0 marks)
Response with no valid content
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (CE/FD) 132683/3
© UCLES 2017 [Turn over
2
1 Complete the sentences, using the most appropriate item from the list.
(a) Optical storage medium that is often used to store HD movies is called
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(c) Magnetic medium which can only be used for serial access is called
...............................................................................................................................................[1]
...............................................................................................................................................[1]
application system
(3) (3)
Linker
Photo-editing software
Compiler
[2]
true false
(3) (3)
CRT monitors use more power than TFT monitors
Tick
(3)
Compare with source document
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document
Ensure the data is 100% accurate
Type in the data twice and compare versions
Calculate a check digit
Check spelling
[3]
5 Identify three ways in which employment patterns have changed since the introduction of ICT.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
6 Peter was asked to resize an image to fit a space in a document. The image before the change
and the image after the change are shown below.
The image before the change The image after the change
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Peter has been asked to remove some of the sky in the image.
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Having created the document, Peter needs to email it to his teacher. The file is too large for
the email attachment. The file size must be reduced so it can be attached to the email.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
7 An electricity company has created a new computer system to produce its bills.
After the system was implemented a number of customers complained about very expensive bills.
(a) Explain what other testing should have been carried out before the system was implemented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Prior to implementation the management was undecided over the method of changeover to
be used.
Explain why the management would choose direct changeover rather than parallel running.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
8 Data transmitted through the World Wide Web can be protected by encryption.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(a) Give three methods of reading the data from the credit card.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Shopping for groceries using the internet has become popular and is replacing more traditional
types of grocery shopping.
Describe the advantages and disadvantages of grocery shopping using the internet rather
than other methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2017 0417/13/O/N/17 [Turn over
8
11 A school library has computerised its book borrowing system. Students are allowed to borrow
books free of charge.
(a) When a book is borrowed the details of the book and the borrower have to be input to the
system.
Tick three direct data entry devices which could be used in such a system.
(b) The library uses a database with two tables: borrowers and books. They have recently
purchased a biometric reader which will identify the borrower from their thumb print. A
borrower may only borrow a maximum of six books.
Describe the computer processing involved when a book is borrowed using this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
12 A systems analyst is creating a new database for a shop to store the details of its mobile (cell)
phones. Part of the design of this database will involve the identification of suitable validation
checks.
(a) For the following fields write down the most appropriate validation check. Each validation
check must be different. The database will have at least 100 records and each ID number will
be different.
ID_number
...................................................................................................................................................
...............................................................................................................................................[1]
Connectivity
...................................................................................................................................................
...............................................................................................................................................[1]
Price
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Design a screen input form which would be used to input data for one mobile (cell) phone,
using all the fields shown in the example data.
In your answer include appropriate spacing for each field, and navigational aids.
[5]
(c) The system is being tested using live data. Write the search criteria you would enter into
the database to search for a mobile (cell) phone costing less than $200.00 which has a
connectivity of 4G.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
13 A theatre uses an online booking system to allow customers to book specific seats for its
performances.
A customer has loaded the theatre website. Describe the inputs and outputs of such a system
before the customer pays for a ticket.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
14 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.
Discuss the advantages and disadvantages to the bank of using these cards at an ATM.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
15 Computers can be used in different applications to control a process, to simply gather data
(measurement only) or to mimic a human expert (expert systems).
(a) Tick whether the following applications use Control, Measurement (only) or Expert system.
(b) Measurement systems can use sensors. The computer cannot read the data directly from the
sensor.
Explain how a device can be used to enable the computer to read the data from the sensor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
16 State what is meant by OMR and MICR, giving an example of their use.
OMR .................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
MICR ................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[4]
17 Social networking is often used today rather than face-to-face conversations, letter writing and
telephone conversations.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
1(b) ROM 1
1(d) RAM 1
2 application system 2
(3) (3)
Linker 3
Database management systems 3
Photo-editing software 3
Compiler 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks
3 true false 2
(3) (3)
CRT monitors use more power than TFT monitors 3
A touch screen can be used as an input device or an 3
output device
A dot matrix printer produces high quality graphics 3
A motor is an input device 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks
4 Tick 3
(3)
Compare with source document 3
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document 3
Ensure the data is 100% accurate
Type in the data twice and compare versions 3
Calculate a check digit
Check spelling
Maximum 4 marks
10(a) An anchor is a link within the web page/It is the destination 1 mark 3
Price 1 mark
<$200.00 1 mark
AND 1 mark
Connectivity 1 mark
=4G 1 mark
13 Five from: 5
A list of performances/shows is displayed
Customer selects a performance/show
A list of dates/times is displayed
Customer selects a date/time
A plan of the seats are displayed
A customer selects the number of seats to book/number of people
A customer selects the location of the seats
Displays the payment page/shows the booking information
Customer selects checkout
To gain full marks there must be at least one input and at least one output
14 Five from: 6
Disadvantage
The cost of producing new cards
The cost of producing new readers
The cost of re-writing the ATM software
They are liable to fraud therefore compensate customers...
...Increasing costs
Less money removed at transaction therefore potentially more small
transactions
...Increased administration
...Increased hardware use
Five from:
Advantage
The cards last longer as they are not in contact with the machine
Attracts new customers
Reducing the cost of replacement cards
Reduction in fraud as less money taken out
Cards not retained therefore less cost for replacements
The transactions are faster
Level 0 0 marks
Response with no valid content