You are on page 1of 334

Cambridge International Examinations

Cambridge International General Certificate of Secondary Education


* 6 0 2 1 8 2 3 5 1 7 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 February/March 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner’s Use

This document consists of 15 printed pages and 1 blank page.

DC (LK/FD) 101312/3
© UCLES 2015 [Turn over
2

1 This diagram shows a computer controlled greenhouse.

/LJKW
&RPSXWHU 0RWRU
6SULQNOHU

+XPLGLW\VHQVRU

7HPSHUDWXUH
VHQVRU 1XPEHUSDG

+HDWHU

/LJKWVHQVRU

(a) Identify three input devices which are shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Identify three output devices which are shown in the diagram above.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2015 0417/12/F/M/15


3

2 Tick the most appropriate method of storing data for each of the following uses.

Memory Magnetic Blu-ray


Use card Tape Disc
✓ ✓ ✓
Storing photos in a camera

Storing file server backups

Storing high definition movies

Storing large numbers of payroll records

[4]

3 Complete the table by identifying the most appropriate input device for each type of application.

Application Device

Inputting diagrams as they are being drawn


Inputting printed text to a computer to be processed by another
software package
Inputting moving pictures, often pre-recorded, into a computer

Used by a pilot to control a flight simulator

[4]

4 There are a number of different types of area networks.


Tick whether the following statements apply to a WAN, LAN, or a WLAN.

WAN LAN WLAN


✓ ✓ ✓
This type of network usually requires the use of WiFi

Usually is cabled and often housed in a single building

Covers a large area and is often connected using a router

Requires the use of Wireless Access Points (WAPs)

[4]

© UCLES 2015 0417/12/F/M/15 [Turn over


4

5 Complete the sentences using words from the list below.

(a) The device used for switching channels on a


television is called

................................................................
[1]

(b) A method of inputting answers from a


candidate’s exam paper is called

................................................................
[1]

(c) A printer which is suitable for producing large


volumes of high quality printout is called

................................................................
[1]

ROM a remote control RAM

a dot matrix printer a trackerball OMR

a laser printer an inkjet printer

© UCLES 2015 0417/12/F/M/15


5

6 Describe how a microprocessor uses the data from input devices to control an automatic cooker.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 0417/12/F/M/15 [Turn over


6

7 A floor turtle can use the following instructions:

INSTRUCTION MEANING
FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

REPEAT n Repeat the following instructions n times

END REPEAT Finish the REPEAT loop

NOT TO
SCALE

60° 120°

40 mm 100 mm 50 mm

Start

A student has written the following set of instructions to make the floor turtle draw these shapes.
The turtle is facing up at the start.

1. PENDOWN

2. LEFT 90

3. REPEAT 5

4. FORWARD 50

5. RIGHT 60

6. PENUP

7. PENDOWN

8. RIGHT 120

9. FORWARD 50

10. END REPEAT

Although the first two instructions are correct, this set of instructions would not draw the shapes
exactly as shown. Three instructions have been missed out and two are incorrect.

© UCLES 2015 0417/12/F/M/15


7

(a) Write down the three missing instructions and indicate where they should be positioned in
the list of instructions provided.

1. ...............................................................................................................................................

...................................................................................................................................................

2. ...............................................................................................................................................

...................................................................................................................................................

3. ...............................................................................................................................................

...................................................................................................................................................
[3]

(b) Identify the two incorrect instructions and for each, state the correct instruction to be used.

1. ...............................................................................................................................................

...................................................................................................................................................

2. ...............................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 0417/12/F/M/15 [Turn over


8

8 (a) Identify five different items of data that are input at an ATM when cash is withdrawn by a
customer or read from the card.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................

4 ................................................................................................................................................

5 ................................................................................................................................................
[5]

(b) Discuss the advantages and disadvantages of the use of a local ATM to withdraw cash rather
than travelling to a bank.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 0417/12/F/M/15


9

9 WBA is a company that makes little profit. Its newly commissioned ICT system is ready to be
implemented. It needs the new system to be in use as soon as possible.

Describe the advantages and disadvantages of using parallel running compared with direct
changeover as a method of implementing the system. Choose which of these two methods of
implementation WBA should use, giving reasons for your choice.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 0417/12/F/M/15 [Turn over


10

10 Most smart phones can carry out many functions which, until recently, only a computer could
perform.

Explain why computers of all types are still needed.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[7]

11 Most computers have backing storage as well as main/internal memory (RAM/ROM).

(a) Explain why backing storage is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 0417/12/F/M/15


11

(b) Describe why main/internal memory is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

12 A headteacher has decided to arrange delivery of hard copy versions of the school magazine as
well as placing it on the school website.

(a) Give two reasons why he has chosen to do this.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give three disadvantages of producing the hard copies.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2015 0417/12/F/M/15 [Turn over


12

13 (a) Using the example of COUNTIF(A2:A10,”<31”), explain how the COUNTIF function works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Rupinder has created a spreadsheet showing the following data and formula.

' ( ) *

 1DPH 0RQWKVLQHPSOR\PHQW
 $YWDU.KROL  &2817,) ((µ µ
 6XUMHHW6LQJK 
 -DZDKDU1HKUX 
 6XQLO.DSRRU 
 -DVYLU6KHUJLOO 
 ,VKLWD'XWWD
 1LNKLO%DQHUMHH 
 $QLWD0HUFKDQW 
 6DQMLYH.XPDU

(i) Write down the value that would be contained in cell G2.

.......................................................................................................................................[1]

(ii) Rupinder subtracts the value in part (i) from 9 (the number of workers). He thinks this will
tell him the number of workers who have been in employment for more than 33 months.
Explain why his reasoning does not work.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2015 0417/12/F/M/15


13

14 The doctors at the Mumbai Clinic have commissioned a knowledge engineer to create an expert
system to help them with their diagnoses of patient illnesses.

(a) Describe how such a system would be created.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Give two other applications apart from diagnostic systems which make use of expert systems.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2015 0417/12/F/M/15 [Turn over


14

15 Recaud Inc. stock many CDs. Below is a small selection of CDs stored on their database.

ID Artist_name CD_title Price Year_released Number_of_tracks


number (Rs)
Maa Na
1 Nayan Pancholi 249.00 2012 29
Nayan
Nayan Pancholi,
2 Maa Amba 145.00 2013 7
Gargi Vora
3 Lakshmi Shankar Ecstasy 120.00 2012 2
Anindo and
4 Anindo Chatterjee 230.00 1991 7
His Tabla
5 Jagjit Singh Greatest Hits 255.00 2011 24

(a) Write down the most suitable data type for the following fields.

CD_title ..........................................................................................................

Price (Rs) ..........................................................................................................

Year_released ..........................................................................................................

Number_of_tracks ..........................................................................................................
[4]

(b) Describe the range check which could be carried out on the Price (Rs) field. The maximum
price and the minimum price are shown in the table above.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 0417/12/F/M/15


15

(c) The owner of the shop, Alam, receives requests from customers about the CDs he has in
stock. He makes a note of these requests using comparison and Boolean operators. For
example, a customer might ask for a CD which was released after 2002 and has at least 7
tracks. Alam would write this down as:

Year_released > 2002 AND Number_of_tracks >= 7

(i) Write down a request for a customer who wants a list of all the CDs which were released
before 2007. This list must also contain all the CDs which cost at least 145 rupees.

.......................................................................................................................................[5]

(ii) Write down the ID numbers of those records which would match your criteria in (i).

.......................................................................................................................................[2]

16 Explain what is meant by copyright.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2015 0417/12/F/M/15


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 9 9 3 7 1 3 8 9 0 0 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/SG) 101050/2
© UCLES 2015 [Turn over
2

1 This diagram shows a tower PC.

(a) Name two input devices apart from a keyboard and mouse, which could connect directly to
the tower.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Name two storage devices which would be available in the PC shown above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Name two output devices which could connect directly to the PC shown above.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2015 0417/12/M/J/15


3

2 Below is a list of statements. Each statement is true for only one of the given methods of
implementation. Tick the method which matches the statement.

Parallel Direct Pilot


running Changeover running
✓ ✓ ✓
All of the old and new systems run at the same time.
If the system fails in one branch, the rest of the
company is not affected.
The new system has to be completely free of errors
before implementation.
The benefits of the new system are available
immediately.
[4]

3 Below is a list of uses of ICT.


Tick the device which would be most appropriate for each activity.

Input Output Storage


device device device
✓ ✓ ✓
Making a backup of work

Typing a document

Printing out student records

Reading details from a bar code

Making a soft copy for future use


[5]

4 Tick whether the following items are found in user documentation only, technical documentation
only or are found in both.

User Technical Both


✓ ✓ ✓
Systems flowchart

How to save a document

List of variables

The purpose of the system


[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


4

5 There are a number of methods of direct data entry.

Complete the sentences using words from the list below.

(a) The method of inputting bank codes from the bottom of a cheque is called

............................................................[1]

(b) The device used for inputting details from a label on a product is called

............................................................[1]

(c) The device used for inputting data directly from a bank card is called

............................................................[1]

a bar code reader a PIN pad OMR

MICR a keyboard a graphics tablet

a mouse a chip reader

6 A floor turtle can use the following instructions:

INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

35 mm
10 mm

20 mm
10 mm

15 mm
Start Finish

The turtle is facing up the page and the pen is up.

© UCLES 2015 0417/12/M/J/15


5

A student has written the following set of instructions to make the floor turtle draw the above
shape.

1. PENDOWN

2. LEFT 90

3. FORWARD 15

4. RIGHT 90

5. PENUP

6. FORWARD 20

7. RIGHT 90

8. PENUP

9. FORWARD 90

10. RIGHT 35

11. FORWARD 20

Although the first four instructions are correct, this set of instructions would not draw the shape
exactly as shown. One instruction has been missed out and four are incorrect.

(a) Write down the missing instruction and indicate where it should be positioned in the list of
instructions provided.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Identify the four incorrect instructions and state the correct instructions to be used.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


6

7 A microprocessor controlled washing machine is fitted with a number of sensors.

(a) Tick three sensors which would be used in such a system.

Pressure sensor

Height sensor

Wind speed sensor

Sound sensor

Temperature sensor

Moisture sensor

Cold sensor

Detergent sensor
[3]

(b) Describe the actions taken by a microprocessor during a wash cycle, based on the readings
from those sensors identified in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2015 0417/12/M/J/15


7

8 A bank has introduced a system whereby its customers will use contactless smart cards to make
purchases. This method of payment involves customers holding their card close to a reader at
shopping outlets and restaurants.

Discuss the advantages and disadvantages of this method of payment compared to using chip
and PIN cards.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 0417/12/M/J/15 [Turn over


8

9 (a) Explain how a VLOOKUP function works, using the example of VLOOKUP(38,A2:C10,3,FALSE).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) A spreadsheet contains the following data and formula.

D E F G H I

1 Months in employment :ŽďĚĞƐĐƌŝƉƟŽŶ Name


2 31 Teacher John =VLOOKUP(33,D2:F10,3)
3 34 Chemist Avtar
4 39 Engineer Ahmed
5 43 Lecturer Ho
6 32 Bricklayer David
7 35 Manager Jose
8 38 Shopkeeper Simon
9 33 Zoo owner James
10 23 Explorer /ŶƟŬŚĂď
11
12

Explain why the cell H2 might not contain James. Suggest the value that would be contained
in that cell, giving reasons why.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 0417/12/M/J/15


9

10 Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as well as
job losses.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

11 Aftab wants to create a network using a PC and two laptop computers he has bought for his family.
All have network cards fitted. He has already purchased network protection software. He wishes to
use them for online banking.

Name and describe the use of four additional items, apart from cables, he would need in order to
set up this network.

Item 1 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 2 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 3 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Item 4 ...............................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................
[8]
© UCLES 2015 0417/12/M/J/15 [Turn over
10

12 A school in the UK holds a sports day every year. Students compete in a number of athletics
events during the day.

The results of all events, together with suitable photographs, are to be included in the school
newsletter on its website. Initially the results will be stored in a spreadsheet.

Describe how the sports day part of the newsletter will be produced.

..........................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

.........................................................................................................................................................................

......................................................................................................................................................[6]

13 Tick three drawbacks in terms of costs to banks of introducing online banking.

Initial purchase of hardware and software is expensive

Bank workers will have to be paid more

Extra buildings will be need to be rented

System maintenance costs may be high

Cost of lighting and electricity will be higher

More cashiers will need to be employed

More security staff will need to be employed

Redundancy payments will need to be made to cashiers who are now


unemployed
[3]

© UCLES 2015 0417/12/M/J/15


11

14 A headteacher wishes to store details of her students in a computer database. She has been
given an example of one student record by the school secretary:

Strauss, Johann, SR132516, 83, 01/09/2011

This corresponds to family_name, first_name, Student_Id, Maths_test_score, joined_the_school.

The file is currently stored in the form of plain text with each record separated by a line break.

(a) Give a file extension which is appropriate for this file.

...............................................................................................................................................[1]

(b) For each field identify the most appropriate data type. The Maths_test_score is used in
calculations.

Field name Data type

family_name

first_name

Student_Id

Maths_test_score

joined_the_school
[5]

(c) Identify the two fields for which a format check would be the most appropriate validation
check. In each case describe how the format check would work.

1 ..............................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 0417/12/M/J/15 [Turn over


12

(d) The school secretary will use a screen input form to make it easier to enter data on the new
system.

Design a suitable screen input form to enter the details of one student using the fields given in
part (b) but leaving the field contents blank.

It should contain appropriate spacing for each field, as well as navigation aids and other
appropriate features of a screen input form.

[5]

15 One of the stages in systems analysis and design is called development and testing.

Describe the different testing strategies that can be used on a new system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]
© UCLES 2015 0417/12/M/J/15
13

16 An oil prospecting company wants to use an expert system to help it to decide where to drill for oil.

(a) Describe how such a system would work.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Give two different uses of expert systems for diagnosis.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2015 0417/12/M/J/15


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 5 9 4 1 0 0 7 6 8 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 October/November 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/FD) 101066/3
© UCLES 2015 [Turn over
2

1 These printouts show a document before and after it was finalised.

Write down six editing techniques which have been used on the image and the text.

This is a flower pot with two


flowers. One is growing
Printout before

Printout after
This is a flower pot with two flowers. One
is growing straight up and the other is
growing at an angle.

straight up and the other is


growing at an angle.

1 ........................................................................................................................................................

2 ........................................................................................................................................................

3 ........................................................................................................................................................

4 ........................................................................................................................................................

5 ........................................................................................................................................................

6 ........................................................................................................................................................
[6]

2 For each use, tick the most appropriate type of application software.

Modelling Database Word processing


Use
✓ ✓ ✓
Writing a letter

Flight simulation

Storing student records in a school

Producing a business card


[4]

© UCLES 2015 0417/12/O/N/15


3

3 Tick the type of computer which would be most appropriate for each use of ICT.

Mainframe Laptop Desktop


Use
✓ ✓ ✓

Entering data from a Biology survey while out of


school

Massive transactions which need the use of many


CPUs

Students who need to transport their computer


from home to use in school

Personal use with better performance at lower cost

[4]

4 Tick the most appropriate method of implementing a new system for each company.

Parallel Pilot Direct


Company running running changeover
✓ ✓ ✓

A company with several branches wishes to test


the new system in one branch only.

A small company that can only afford to spend a


small amount of money on implementing the new
system.

If the whole system fails, the company wishes to


return to the original existing system.

A company that wants the quickest method of


implementation.

[4]

© UCLES 2015 0417/12/O/N/15 [Turn over


4

5 There are a number of methods of direct data entry.

Complete each sentence using the most appropriate words from the following list.

a bar code reader a touch pad OCR

a magnetic stripe reader a trackerball a graphics tablet

a touch screen a PIN pad

(a) The inbuilt device which moves the cursor when using a laptop is called

............................................................[1]

(b) The device used for selecting an icon so a bar code label can be printed in a supermarket is
called
............................................................[1]

(c) The device used for controlling a pointer on a screen when the user has limited motor skills is
called
............................................................[1]

© UCLES 2015 0417/12/O/N/15


5

6 A student wishes to use a floor turtle to draw this regular shape.

The pen is already lowered and does not need to be lifted.


This turtle can only move in one direction and turn one way.

Give three instructions which the turtle graphics software could use to draw the shape. For each
one, explain the meaning of the instruction.

Instruction 1 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................

Instruction 2 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................

Instruction 3 ......................................................................................................................................

Meaning ............................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2015 0417/12/O/N/15 [Turn over


6

7 Scientists want to find the level of pollution in a river running past a chemical factory. They will use
sensors connected to a computer to do this.

(a) Name three sensors that the scientists would place in the river.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Explain why it is so important to carefully consider the position of sensors placed in the river.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe how the computer would monitor the level of pollution in the river.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2015 0417/12/O/N/15


7

8 A school has introduced a system so that parents of its students can access data about their
children.

(a) Give three reasons why the school has introduced this system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) In order to access this data, parents will need to log on to the school’s website.

Describe the purpose of the following two items of data they will need to enter.

User id .......................................................................................................................................

...................................................................................................................................................

Password ...................................................................................................................................

...................................................................................................................................................
[2]

9 Describe four items which can be provided by an ISP.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 0417/12/O/N/15 [Turn over


8

10 A video shop owner uses a spreadsheet to calculate his costs.

This is part of the spreadsheet.

A B C D

1 Book title Number in stock Cost price Total cost

2 The Wolf Of Wall Street 4 $18 $72

3 Thinking Fast And Slow 5 $17 $85

4 Be Careful What You Wish For 8 $15 $120

5 The Fell Sword 4 $20 $80

6 Metro 2034 2 $15 $30

8 Overall cost $387

(a) Give the cell reference of the cell that contains $20.

...............................................................................................................................................[1]

(b) Give the number of rows shown in the spreadsheet.

...............................................................................................................................................[1]

(c) Write down the formula which should go in cell D2.

...............................................................................................................................................[1]

(d) Write down the formula which should go in cell D8. Make the most efficient use of a function.

...............................................................................................................................................[2]

(e) Explain why financial models are often used to predict future profitability.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 0417/12/O/N/15


9

11 Explain why encryption is needed when transmitting data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

12 Many database software packages have a report generation feature.

The following is part of a video hire shop database showing films available in Blu-ray format.

Film_name Director Price ($) Regions Length (min)

Rush Ron Howard 12.99 A 122

Last Vegas Jon Turtletaub 17.72 B 105

Captain Phillips Paul Greengrass 14.99 Free 134

Saving Mr Banks John Lee Hancock 15.00 C 125

(a) Each of the following fields contains data that is numeric. Give a more precise data type for
each of these fields.

Price .........................................................................................................................................

Length .......................................................................................................................................
[2]

(b) Blu-ray discs have one of three region codes or are region-free.

Describe how the field Regions could be set up to reduce the possibility of inaccurate data
entry.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 0417/12/O/N/15 [Turn over


10

(c) Describe, in detail, how you would create a formatted report which does not show regions
and only shows films which are longer than 110 minutes.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

13 (a) Tick three components of an expert system.

Word processor

Spreadsheet

Rules base

Search engine

Inference engine

Control software

Knowledge base

Presentation software
[3]

(b) Give three examples of applications which use expert systems other than diagnosis systems.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


11

14 A large company has asked a systems analyst to research the current system.

(a) Describe how this will take place.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe what information will be identified as a result of this research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

15 There are many safety issues associated with the use of computers.

Describe three of these issues.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15 [Turn over


12

16 Ajit has been set homework by her Geography teacher. She has the choice of using her text book
or the internet to find the necessary information.

Discuss the advantages and disadvantages to Ajit using the text book rather than the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[7]

17 Give three reasons why some companies have intranets.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


13

18 Give three reasons why files are backed up.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

19 Give three specific examples of work that are carried out by a robot in the car industry.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2015 0417/12/O/N/15


www.gceguide.com

Cambridge International Examinations


Cambridge International General Certificate of Secondary Education
* 8 8 7 0 3 9 4 6 6 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory February/March 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your name, Centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

DC (KN/CGW) 114006/4
© UCLES 2016 [Turn over
2

1 There are a number of different types of computer.

Write down the type of computer that best fits the following descriptions.

(a) A computer that is difficult to move and has a separate monitor and keyboard.

...............................................................................................................................................[1]

(b) A portable computer that includes a physical keyboard.

...............................................................................................................................................[1]

(c) A thin portable computer that has a touch screen and a battery in a single unit, not normally
used to make phone calls.

...............................................................................................................................................[1]

(d) A mobile phone that can be used as a computer.

...............................................................................................................................................[1]

2 Tick whether the following are features of operating systems containing a command line interface
(CLI) or a graphical user interface (GUI).

CLI GUI
(✓) (✓)
Instructions have to be typed.

Applications are represented by icons.

Options are chosen from a menu.

Many instructions have to be memorised.


[2]

3 Tick whether the following statements about output devices are true or false.

true false
(✓) (✓)
A multimedia projector is used to output slide shows.

A laser printer is a type of page printer.


An inkjet printer cartridge lasts longer than a laser printer toner cartridge
producing the same output.
A dot matrix printer produces very high quality printouts quickly.
[2]

© UCLES 2016 0417/12/F/M/16


3

4 The use of computers has led to some employees changing their working patterns.

Complete the following sentences.

(a) Two or more employees doing the same job but working at different times is called

...............................................................................................................................................[1]

(b) When a person is employed to work fewer hours than the normal working week, this is called

...............................................................................................................................................[1]

(c) When employees work the full normal hours in a week but work at times which suit them and
the employer, this is called

...............................................................................................................................................[1]

(d) When an employee works the full normal hours in a week but works fewer days, this is called

...............................................................................................................................................[1]

5 Describe four strategies that you could use to minimise the dangers of using social networking
sites to make new friends.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2016 0417/12/F/M/16 [Turn over


4

6 Use examples to describe the difference between a weak password and a strong password.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

7 The following diagram shows towns A and B and the two roads that connect them.
A

Describe how a satellite navigation system (sat nav) in a motor vehicle would calculate the quickest
route from A to B.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 0417/12/F/M/16


5

8 Describe how data is sent from a networked computer to a computer on a different network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

9 (a) Describe two similarities between physical faxing and electronic faxing.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Describe three differences between physical faxing and electronic faxing.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 0417/12/F/M/16 [Turn over


6

10 In certain countries, the RFID chip in a passport is scanned when the passport is presented at an
automated passport control gate.

(a) Give three items of information about the passport holder that are stored on the RFID chip.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Describe how RFID technology reads the details from the chip.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) Explain why RFID technology is used for reading data from passports.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/F/M/16


7

11 The following is part of a database of cars (automobiles).

Make Registration_number Engine_size Maximum_speed Colour Parking_sensors

Frod K674 TUV 1.3 140 red Y

Olep K349 XUP 1.4 140 white N

Yotoya R123 AZN 2.0 160 blue Y

Yotoya U283 BBV 1.7 175 red Y

Frod K943 SCG 1.3 180 blue Y

(a) You have been asked to design a suitable input screen which will enable this data to be
entered.

Complete the following screen for one car only, before the data is entered.

[6]

© UCLES 2016 0417/12/F/M/16 [Turn over


8

(b) For each of the following fields, name and describe the most appropriate validation check.
Assume that the values given in the numeric fields include the minimum and maximum values
for those fields.

(i) Registration_number .........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Maximum_speed ...............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

Operators such as AND, OR, NOT, LIKE, >, <, =, >=, <=, <> can be used to search the database
for information. A search for all the red Frod cars would look like this:

Make = “Frod” AND Colour = “red”

Use appropriate operators from the examples given to answer the following.

(c) Write down a search which will produce a list of the cars where the size of engine is greater
than 1.4, in addition to all those cars which have parking sensors.

...............................................................................................................................................[5]

(d) Write down the registration numbers of those cars that match the requirements of part (c).

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/F/M/16


9

12 This is part of a spreadsheet used to calculate workers’ earnings after tax.

A B C D E F G
1 Rate of income tax 25%
2
Number Pay
Hourly Rate Pay after
of hours before Tax paid
of pay tax
3 worked tax
4 Amir Khan £10.00 40 £400.00 £100.00 £300.00
5 John Jones £8.00 36 £288.00 £72.00 £216.00
6 Pierre Gaston £7.50 42 £315.00 £78.75 £236.25
7 Jasvinder Sidhu £8.50 40 £340.00 £85.00 £255.00
8 Zhou Wenlin £9.00 36 £324.00 £81.00 £243.00
9
10

(a) Pay before tax is calculated by multiplying Hourly Rate of pay by Number of hours worked.
Write down the formula which should be entered in cell D4.

...............................................................................................................................................[1]

(b) The Tax paid by each worker is calculated by multiplying the Rate of income tax by their Pay
before tax.

Without using numerical values and by using absolute referencing where appropriate, write
down the formula which should be entered in cell E4.

...............................................................................................................................................[3]

(c) Explain what absolute referencing is and why it is needed in this example.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) Write down, using a function, the most efficient formula which should be entered in cell F9 to
calculate the total pay of these 5 workers.

...............................................................................................................................................[1]

© UCLES 2016 0417/12/F/M/16 [Turn over


10

13 HTTP is an internet protocol.

(a) Explain what is meant by HTTP.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain the differences between HTTP and HTTPS.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

14 Give four reasons why an internet search to find relevant information is not always fast.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2016 0417/12/F/M/16


11

15 Describe the following file formats and explain the differences between them.

.txt ....................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.rtf .....................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[5]

© UCLES 2016 0417/12/F/M/16 [Turn over


12

16 The following is a word-processed worksheet to help 11-year-old students to understand part of


ancient India.

Patna, Bihar
The present-day capital of the Indian state of Bihar, Patna, was once believed to be the greatest
city on Earth.
In 300 BC, a Greek ambassador, Megasthenes, wrote that Pataliputra (as Patna was then called)
was ‘22 miles in circuit, with a wooden wall pierced by 64 gates and 570 towers, rivalling the
splendours of Persian cities such as Susa and Hamadan’.
Megasthenes spent time at the court of Chandragupta Maurya, India’s first great emperor. Maurya
presided over an empire stretching from Bengal to present-day Afghanistan from this majestic
capital. Pataliputra was built on the southern banks of the Ganges at the confluence of the rivers
Ganges, Son and Gandak. It had a significant Jain and Buddhist influence as both the Buddha and
Mahavira founder of Jainism lived and preached nearby.
King Asoka also had his capital at Pataliputra. The Agam Kuan or ‘Bottomless Well’ in which
Asoka is said to have put his prisoners to death (before he became influenced by Buddhism) still
exists in Patna today.

Describe five improvements to the worksheet that would make it more appealing to 11-year-old
students.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................

5 .......................................................................................................................................................

..........................................................................................................................................................
[5]

© UCLES 2016 0417/12/F/M/16


13

17 Shape A has been transformed into shape B in three stages.

Y - axis

Shape A

Stage 1
X - axis

Shape B

Stage 3 Stage 2

Describe, in detail, what has happened at each stage.

Stage 1 .............................................................................................................................................

..........................................................................................................................................................

Stage 2 .............................................................................................................................................

..........................................................................................................................................................

Stage 3 .............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2016 0417/12/F/M/16 [Turn over


14

18 Explain why you might want to insert a section break in a document.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 0417/12/F/M/16


15

19 “Chip and PIN is the new, more secure way to pay with credit or debit cards ”.

Discuss the accuracy of this statement with regard to developments, since and including the use
of magnetic stripe cards at EFTPOS terminals and ATMs.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 0417/12/F/M/16


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*9659398909*

Paper 1 Theory May/June 2016


2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

06_0417_12_2016_1.19
© UCLES 2016 [Turn over
2

1 Write down the most appropriate input device which matches the following descriptions:

(a) This is provided with a laptop to imitate the functions of a mouse.

........................................................................................................................................... [1]

(b) This is not a mouse but is used to manoeuvre objects around the screen in computer video
games.

........................................................................................................................................... [1]

(c) This is used to type in text.

........................................................................................................................................... [1]

(d) This is used for direct input of hard copy images.

........................................................................................................................................... [1]

2 Tick whether the following statements are true or false.

true false
(✓) (✓)

A microphone is an output device.

The Control Unit is part of the Central Processing Unit.

The Arithmetic and Logic Unit is part of the Central Processing Unit.

A temperature sensor is an input device.

[2]

3 Tick whether the following statements would most appropriately apply to the internet or an intranet.

internet intranet
(✓) (✓)

A public computer network.

Is easier to protect sensitive data from hackers.

The content is more easily controlled.

Exists within a single organisation only.

[2]

© UCLES 2016 06_0417_12_2016_1.19


3

4 Complete the following sentences.

(a) A piece of programming code which maliciously deletes files is called

........................................................................................................................................... [1]

(b) The scrambling of data to make it unreadable by unauthorised users is called

........................................................................................................................................... [1]

(c) An internet protocol for delivering private messages using cryptography is called

........................................................................................................................................... [1]

(d) An attachment to an electronic message used to verify the identity of the sender is called

........................................................................................................................................... [1]

5 Describe four methods you could use to minimise the likelihood of receiving spam emails.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


4

6 A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.

(a) Write down the name of this type of network.

........................................................................................................................................... [1]

(b) In order to access the network the laptop must be within range of a type of WiFi network device.

(i) Write down the name of this type of device.

................................................................................................................................ [1]

(ii) Describe how this device is connected to the network using an ethernet cable.

................................................................................................................................

................................................................................................................................ [1]

(c) WiFi networks can be limited in their range.

Describe one other disadvantage of a WiFi network compared to a cabled network.

...........................................................................................................................................

........................................................................................................................................... [1]

7 (a) Explain what is meant by VOIP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2016 06_0417_12_2016_1.19


5

8 There are many microprocessor controlled devices used in the modern home.

Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

9 A customer wishes to check the balance of their bank account and inserts their card into the ATM.

(a) Describe the computer processing which takes place at the ATM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe the computer processing which takes place at the bank’s computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


6

10 When a bank cheque is presented to a bank it is sent off to a cheque clearing centre.

(a) (i) Give three items of information that are pre-printed on the cheque in magnetic ink.

1 .............................................................................................................................

................................................................................................................................

2 .............................................................................................................................

................................................................................................................................

3 .............................................................................................................................

................................................................................................................................

[3]

(ii) Describe how MICR is used to read these details from the cheque.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

(b) Explain why magnetic ink is used rather than bar codes on a cheque.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


7

11 Name and describe three methods of implementing a new computer system. For each one describe
the type of situation where each method might be used.

1 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

[9]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


8

12 Maria is the principal of the International Municipal school. She has employed Paulo, a systems
analyst, to create a new database system to store records of her final year IGCSE students.

Examples of the details of the students which will be stored are:

Velia Grimaldi, A3058, Female, 161, Leaving

Giuseppe Campo, A3072 , Male, 177, Staying on to 6th form

Nicola Donati, B3085, Female, 173, Staying on to 6th form

Giovanni Agnelli, C3102, Male, 172, Leaving

(a) Complete the following table by entering the field names and most appropriate data type for
each field.

For any numeric field, specify the type of number.

Field name Data type

Name

Boolean

Height

[7]

(b) Paulo wishes to save storage space. He does not change the Name field, but decides that two
other fields could have their data shortened.

Apart from the Name field, identify the two other fields and describe how the contents will be
shortened.

Field 1................................................................................................................................

Shortened form 1...............................................................................................................

Field 2................................................................................................................................

Shortened form 2...............................................................................................................

[4]

© UCLES 2016 06_0417_12_2016_1.19


9

(c) There is no key field set. Maria’s secretary typed in the data to the database in this order:

Giuseppe Campo, A3072, Male, 177, Staying on to 6th form

Giovanni Agnelli, C3102, Male, 172, Leaving

Nicola Donati, B3085, Female, 173, Staying on to 6th form

Velia Grimaldi, A3058, Female, 161, Leaving

Maria can get the database back in to the original order by sorting the data using one field.

Write down the name of this field and the order in which it will need to be sorted.

Field...................................................................................................................................

Order.................................................................................................................................

[2]

13 FTP is an internet protocol.

Explain what is meant by FTP and how it differs from HTTP.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


10

14 Below is a spreadsheet showing contributions to a charity from different regions.

A B C D E F G H I

1 The Manta Conservaon Project


2 Regional analysis
3 Region RCode Currency Regional income Date Rcode Amount
4 Africa AF Rand ZAR 65.00 20/01/2016 AF 15.00
5 Asia AS Yuan ¥3,752.50 20/01/2016 AS 150.00
6 Australasia AU Dollar $142.50 20/01/2016 NA 2000.00
7 Europe EU Euro €1,076.00 20/01/2016 EU 25.00
8 North America NA Dollar $2,240.50 21/01/2016 NA 120.50
9 South America SA Real R$75.75 21/01/2016 SA 50.00
10 21/01/2016 AF 50.00
11 21/01/2016 AS 25.00
12 21/01/2016 EU 15.00
13 22/01/2016 AU 140.00
14 22/01/2016 EU 1000.00
15 22/01/2016 NA 20.00
16 23/01/2016 SA 25.75
17 23/01/2016 EU 16.00
18 23/01/2016 NA 100.00
19 23/01/2016 AS 55.00
20 24/01/2016 AS 12.50
21 25/01/2016 AS 10.00
22 25/01/2016 AU 2.50
23 26/01/2016 EU 20.00
24 26/01/2016 AS 3500.00
25
26 Number of donaons 21

(a) Cell E4 contains the formula =SUMIF($H$4:$H$24,B4,$I$4:$I$24)

Using cell references explain what this formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) What formula would you expect to see in cell E8?

........................................................................................................................................... [3]

(c) The formula in I26 only refers to the values in column I. Write down the formula you would
expect to see in cell I26

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


11

15 Information on the internet can sometimes be unreliable. Discuss ways you could minimise the
chance of finding unreliable information when searching the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


12

16 Describe what is meant by the following file formats.

(a) .txt

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) .gif

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) .pdf

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2016 06_0417_12_2016_1.19


13

17 The following is an external stylesheet which contains a number of mistakes.

h1 {
colour: #000040;
font-family: Arial, sans serif;
font-size: 18 px;
text-align: center;
}
h2 {
color: 000000;
font-family: Times New Roman, serif;
font-size: 15px;
text-align: centre;
}
body {
background-image: url('j12backgd2.jpg');
background-color: #025fb4;
}
table {
border-collapse: collapse;
border-width: 4px;
border-style: solid;
border-color: #000000;
}

td {
border-width: 2px;
border-style: solid;
border-color: #000000;
}

Write down five mistakes which would prevent this stylesheet from working properly and, for each,
give the correction.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

5 ...............................................................................................................................................

..................................................................................................................................................

[5]

© UCLES 2016 06_0417_12_2016_1.19 [Turn over


14

18 Discuss why different user interfaces require the use of different types of input device.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2016 06_0417_12_2016_1.19


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 0 5 6 8 3 6 2 4 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (CW) 117035/4
© UCLES 2016 [Turn over
2

1 There are a number of different network devices associated with computers.

Give the most appropriate type of communication device that fits the following descriptions.

(a) This device connects a LAN to the internet.

...............................................................................................................................................[1]

(b) This device transmits data to specific computers in a network.

...............................................................................................................................................[1]

(c) This device broadcasts data to all computers in a network.

...............................................................................................................................................[1]

(d) This device connects one LAN to another LAN that uses the same protocol.

...............................................................................................................................................[1]

2 (a) A computer system consists of hardware and software.

Explain what is meant by software.

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Name the type of software from its description.

(i) This type of software lets you manage the hardware and software resources.

.......................................................................................................................................[1]

(ii) Give an example of this type of software.

.......................................................................................................................................[1]

(iii) This type of software lets you carry out tasks such as creating a document or an image.

.......................................................................................................................................[1]

(iv) Give an example of this type of software.

.......................................................................................................................................[1]

© UCLES 2016 0417/12/O/N/16


3

3 Tick whether the following devices are input, output or backing storage.

backing
input output
storage
(✓) (✓)
(✓)
Motor
CD-R
Web cam
Printer
[4]

4 Sending emails to someone involves netiquette.

Tick whether the following statements are true or false.

true false
(✓) (✓)
If capital letters are used in emails, it is considered as ‘shouting’.

You should always use coloured text and coloured backgrounds in emails.

You should reply to all spam emails.

bcc means blind carbon copy.


[2]

Question 5 begins on page 4

© UCLES 2016 0417/12/O/N/16 [Turn over


4

5 The directors of a multi-national car company need to communicate with each other. They have
decided that the best way to do this is through web-conferencing.

(a) Describe web-conferencing and how it could be used in this scenario.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The directors wish to have a conference with their managers in other countries and are
considering the use of video-conferencing.

Name three pieces of hardware that would be needed in order to hold a video-conference.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 0417/12/O/N/16


5

(c) Describe three drawbacks of setting up and using video-conferencing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

6 Tick the most appropriate storage medium for each of the following uses.

Fixed Magnetic Memory


Blu-ray
Hard Disk Tape Card
(✓)
(✓) (✓) (✓)
Storing a database of books in a school library
Storing photographs in a digital camera
Companies distributing HD movies
Storing the backup of a file server
[4]

© UCLES 2016 0417/12/O/N/16 [Turn over


6

7 A teacher has produced a piece of software and uses it to record exam marks. Each exam has a
total of 100 marks available. If a student does not take the examination then the mark awarded is 0.

A B C D
1
2 Name of Student Examination Mark Pass or Fail
3 Candidate A 20
4 Candidate B 70
5 Candidate C 45
6
7
8
9

(a) Write a formula that would be entered in cell C3 to display the word pass if the value in B3 is
more than 75 marks or the word fail if it is not.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/12/O/N/16


7

(b) The teacher wishes to test a formula on the spreadsheet and uses normal, abnormal and
extreme test data.

Describe each of the following terms.

Normal Test Data ......................................................................................................................

...................................................................................................................................................

Abnormal Test Data ..................................................................................................................

...................................................................................................................................................

Extreme Test Data ....................................................................................................................

...................................................................................................................................................
[3]

8 Biometrics have replaced user IDs and passwords in a large number of systems.

Discuss the advantages and disadvantages of using biometric systems rather than more traditional
security methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 0417/12/O/N/16 [Turn over


8

9 Many countries have copyright legislation which applies to the purchasing of software.

Give three actions that would break copyright.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

10 Members of a US Conservation Unit recently discovered a species of frog new to New York. They
identified the frog using an expert system called ARK.

(a) Describe how an expert system can be used to help identify a newly discovered type of
animal.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Identify two other applications which make use of expert systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2016 0417/12/O/N/16


9

(c) A developer has created a plan for a new database.

Field Name Data Type Length of Field Comment


Animal_ID Text 5 2 letters followed by
a 3 digit number
Name_of_animal Text 25
Animal_endangered? Boolean
Years_on_register Numeric

For each named field, give an appropriate validation check the developer should use.

Field Name Validation Check


Animal_ID
Name_of_animal
Animal_endangered?
Years_on_register
[4]

(d) A report is generated from the results. The report contains headers and footers.

Explain, using examples, why headers and footers are used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 0417/12/O/N/16 [Turn over


10

11 A manager of a computer store has created a relational database to keep track of its orders. She
has created two tables that are linked together.

Table A stores the products.


Table B stores the order details.

The following data shows some records from the database.

Table A: products

Product_ID Product_name Unit_price


1232 PC Base unit $300
1246 Monitor TFT $250
1678 Mouse $9
2314 Keyboard $9
3214 Laser printer $250

Table B: order details

Order_ID Product_ordered Quantity


1231 1232 1
1233 1246 10
1234 1678 15
1235 2314 4
1236 2314 16
1237 3214 20

(a) Name the most suitable primary key in the products table.

...............................................................................................................................................[1]

(b) Name a suitable foreign key in the order details table.

...............................................................................................................................................[1]

(c) On the data shown in the tables above, the following search is to be carried out:

(Unit_price>$250)

Write down the Order_ID resulting from this search.

...............................................................................................................................................[1]

© UCLES 2016 0417/12/O/N/16


11

(d) On the data shown in the tables at the start of question 11, the following search is to be
carried out:

(Product_ID>2000) AND (Quantity<20)

Write down the Order_ID(s) resulting from this search.

...............................................................................................................................................[2]

(e) The store has created a report with a new field called total_price to be calculated at run time.
This field will contain the number of units ordered multiplied by the price of each unit.

Write an expression to produce this result.

...................................................................................................................................................

...............................................................................................................................................[2]

12 Explain, using examples, the difference between a function and a formula in a spreadsheet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

13 A new system has been developed and documentation has been produced. There are two types of
documentation; user and technical.

(a) Explain what technical documentation is used for.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/O/N/16 [Turn over


12

(b) Give four examples of the items found in technical documentation.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

14 There are several security issues surrounding the use of smartphones. These include smishing
and pharming.

(a) Describe different security measures that can be put into place to stop smishing or pharming
attacks.

Smishing ...................................................................................................................................

...................................................................................................................................................

Pharming ..................................................................................................................................

...................................................................................................................................................
[2]

(b) Cookies are sometimes seen as a security threat when in reality they are only a nuisance.

Explain, using an example, what cookies are and why they are important to companies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 0417/12/O/N/16


13

15 Explain the differences between a blog and a wiki.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

16 (a) Describe what is meant by an intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe what is meant by the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 0417/12/O/N/16 [Turn over


14

17 It has been announced that the UK banking industry will not now remove the use of cheques.

As more and more people are using debit cards to pay for goods, the cheque was to be phased
out in the UK by 2018. The use of cheques for transactions is declining but still available.

Compare and contrast the use of debit cards and cheques to carry out transactions.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 0417/12/O/N/16


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 2 1 6 6 8 7 2 4 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory February/March 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (KN/SW) 134901/3
© UCLES 2017 [Turn over
2

1 Complete the following sentences, using items from the list below.

a bar code reader a chip reader a laser printer a magnetic ink character reader
a microphone a PIN pad a retina scanner a touch pad

(a) A device that reads black and white lines on a product is called

...............................................................................................................................................[1]

(b) A device that inputs the sound made by a human voice is called

...............................................................................................................................................[1]

(c) A device which is used to read the data from the bottom of bank cheques is called

...............................................................................................................................................[1]

(d) An input device used to input the biometric details of the eye is called

...............................................................................................................................................[1]

2 Tick whether the following are examples of internal memory or backing storage.

internal memory backing storage


(✓) (✓)
Random Access Memory

Portable hard disk

Pen drive

Magnetic tape
[2]

3 Tick whether the following statements about networks are true or false.

true false
(✓) (✓)
A hub is a central computer.

A router connects a LAN to the internet.

A bridge connects a WAN to a LAN.

A switch connects computers in a network.


[2]

© UCLES 2017 0417/12/F/M/17


3

4 The manager of a restaurant uses a database to store data about the food the restaurant uses.
Part of the database is shown below.

Food_type Packs_in_stock Last_order_received Re-order


Lentils 68 06/03/2017 N
Rice 54 10/03/2017 Y
Flour 19 01/02/2017 Y
Ghee 34 05/03/2017 Y

Below is a list of data types. Next to each one write down the field name which most closely
matches that data type. Each answer must be different.

Date ................................................................................

Text .................................................................................

Boolean ..........................................................................

Numeric ..........................................................................
[4]

5 Describe how security can be improved in a WiFi network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

6 Sukhjit has just discovered a large amount of spam emails in her inbox and is worried it may be a
phishing attempt.

(a) Explain some other dangers of opening spam emails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/F/M/17 [Turn over


4

Spam is sometimes associated with phishing emails.

(b) Describe how Sukhjit would recognise a phishing email.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

7 Explain the purpose of an intranet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

© UCLES 2017 0417/12/F/M/17


5

8 Describe how an expert system can be used to suggest car engine fault diagnoses.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

9 Dhanesh has accidentally downloaded a file containing a virus.

(a) Describe the possible effects on Dhanesh’s computer system if he opens the file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe how Dhanesh can help prevent his computer from downloading viruses from the
internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/F/M/17 [Turn over


6

10 Bank cheques are sometimes used to pay bills.

(a) Name four pieces of information that the bank’s computer may read from the bank cheque.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................

4 ................................................................................................................................................
[4]

(b) Describe what is involved in the clearing of bank cheques which the bank has collected in the
course of the day.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/F/M/17


7

11 A teacher has asked you to use a word processor to create a table of some Indian cities together
with their populations. The required layout is shown below.

Populations of Indian cities


City Population City Population
Mumbai New Delhi
Bangalore Ahmedabad
Kolkata Chennai

(a) Describe how you would create this table in a word processor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) When you have completed the table the teacher asks you to add some extra cities. You will
need to expand the table to add the extra cities.

Describe how you can do this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/12/F/M/17 [Turn over


8

12 Hot House Design require a new multimedia presentation for training sessions to be held in
Hyderabad.

(a) You have been asked to design a master slide for the presentation.

The slide must include the following details:


a labelled rectangular box to represent the Hot House Design logo;
a heading: Hot House Design Training;
a subheading with the name of the venue city;
the name of the trainer – Ranjit Desai;
slide number and date of meeting.

Use the space below to design a master slide for the presentation.

[5]

(b) The trainers will need to show the presentation and produce handouts for participants.
Name three output devices they would need.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2017 0417/12/F/M/17


9

13 A teacher wants to record the results of tests for each student in a spreadsheet. He sets test
papers for both the theory (T) and practical (P) aspects of the ICT course.

Part of the spreadsheet is shown below.

A B C D E F G H I J K
2
Total
theory
3 Student T P P T T P P Average mark Grade mark
4 Rajesh Patel 23 45 44 78 34 129 124
5
6
7
8
9
10
11 Max marks 50 90 90 90 100 140 130

(a) Write down a formula you would use in cell K4 which makes use of the labels in row 3, where
appropriate, to add up the marks for the theory tests only.

...............................................................................................................................................[4]

(b) Write down a formula that you would enter in cell I4 to calculate the average of Rajesh’s
results.

...............................................................................................................................................[2]

(c) Describe how the teacher could format the average mark to 2 decimal places.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/12/F/M/17 [Turn over


10

G H I J K L M N O
2
Total
theory
3 P P Average mark Grade mark
4 129 124 68.14 0 U
5 20 G
6 30 F
7 40 E
8 50 D
9 60 C
10 70 B
11 140 130 80 A

(d) The teacher wants the spreadsheet to calculate a student’s grade automatically.
He needs to calculate this from the average mark of all the results for the student.

Write down below a formula which should be entered into cell J4.

It should use the calculated average mark.


It will search for Rajesh’s average mark in column N and return the corresponding grade.
It should be easily replicated for other students.

...............................................................................................................................................[4]

14 When a system has been created documentation needs to be produced.

(a) Explain why technical documentation is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain why user documentation is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/12/F/M/17


11

15 Part of a database report showing August temperatures in several cities in India is shown below.

Name of City Max_temp Min_temp


Kolkata 33 26
Chennai 34 26
Mumbai 31 26
Hyderabad 31 24
Allahabad 35 26

Describe how you would create a calculated field called temp_diff to show the difference between
the maximum and minimum temperatures.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

16 3D printers are being used for producing personalised prescription drugs.

(a) Give two advantages of using 3D printers for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two disadvantages of using 3D printers for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2017 0417/12/F/M/17 [Turn over


12

17 Email is one method of communication that uses the internet.

(a) Explain the strategies that you could use to protect yourself and your computer whilst using
emails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) When using the internet it is easy to accidently give your personal details to others.

Give two examples of personal data.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2017 0417/12/F/M/17


13

(c) Describe ways of protecting your personal data when using the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 0417/12/F/M/17 [Turn over


14

18 Many devices in the home can now connect directly to the internet.

Smartphones and computers used in the home can connect to the internet.

Discuss the benefits and drawbacks of using other devices that connect to the internet in the
home.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 0417/12/F/M/17


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*8606559575*

Paper 1 Theory May/June 2017


2 hours

Candidates answer on the Question Paper.


No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

06_0417_12_2017_1.2
© UCLES 2017 [Turn over
2

1 When a person buys goods in a supermarket they have to pay at the checkout.

(a) Identify two input devices used at the checkout.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) Identify two output devices used at the checkout.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

2 Tick whether the following statements are true or false.

true false
(✓) (✓)

A router is required to allow a LAN to connect to the internet

A web browser displays a web page

An intranet has restricted access

ISP means Internal Service Provider

[2]

© UCLES 2017 06_0417_12_2017_1.2


3

3 Tick whether the following items are found in technical documentation or user documentation or
both.

technical user both


(✓) (✓) (✓)

Error messages

Hardware requirements

Program listing

Purpose of the system

[4]

4 Identify the image editing techniques described in the following statements.

(a) Remove unwanted parts of an image.

........................................................................................................................................... [1]

(b) Make an image larger or smaller.

........................................................................................................................................... [1]

(c) Format the text so that it flows around an image.

........................................................................................................................................... [1]

(d) Turn an image a number of degrees clockwise or anti-clockwise.

........................................................................................................................................... [1]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


4

5 The managers of a nuclear power plant need to check the radioactivity levels in a chimney stack
which needs to be demolished. They intend to use a robot. This device has sensors to read the
radioactivity levels.

(a) Explain why the data from the sensors cannot be read directly by the microprocessor and
name the device needed to change the data into a form that the microprocessor can understand.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The managers have been told they can use this robot for other tasks by replacing the existing
sensors with different ones.

Give three advantages of using an existing robot device rather than developing a new one.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

6 A student has completed some work at school and wishes to take it home. He could use a pen
drive or a CD R disc to transport the files.

(a) Give two error messages that could appear to stop him saving his work.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2017 06_0417_12_2017_1.2


5

(b) Compare and contrast the use of a pen drive rather than a CD R.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

7 Driverless automobiles use a number of different methods to drive between two points.

(a) Name a sensor that could be used on the automobile to detect a person walking in front of it.

........................................................................................................................................... [1]

(b) Modern automobiles contain electronic devices designed to help the driver.

Suggest three examples of labour-saving or safety devices in a modern automobile that use
sensors.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


6

(c) Discuss the advantages and disadvantages of these devices in relation to automobile journeys.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

8 Expert systems are used in medical applications.

(a) From the list below, tick two components of an expert system.

tick
(✓)

Control unit

Graphics program

Inference engine

RFID

Rules base

Search engine

[2]

© UCLES 2017 06_0417_12_2017_1.2


7

(b) Describe three benefits of the doctor using an expert system to help diagnose a patient’s
illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

9 A school’s examinations officer has decided to develop a database to store pupil details and the
examinations they are due to sit next summer. They are going to use a relational database.

(a) Describe the steps involved in creating the database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


8

(b) Some of the records stored in the database are given below.

Examination_ID Name_of_subject Examination_level Date_of_exam

041731 ICT IGCSE 12/04/2018

047822 Computer Science IGCSE 11/06/2018

604312 Design and Technology O Level 01/06/2018

301532 French O Level 28/06/2018

Based only on the examination details above, complete the table below, stating the most
appropriate data type for each field.

Field name Data type

Examination_ID

Name_of_subject

Examination_level

Date_of_exam

[4]

(c) Write the search criteria to search for all examinations which will be sat after 26/06/2018, using
at least one of the following operators >, >=, <, <=, = .

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Apart from presence check, name and describe a suitable validation check for each of the
following fields in the database, based on the data shown in part (b).

Examination_ID.................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Date_of_exam...................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2017 06_0417_12_2017_1.2


9

10 A leisure centre is creating membership cards for all its members. The membership card must
include a photograph of the member, the member’s name and membership number, the type of
member (Senior or Junior), their date of birth and gender.

(a) Use the space below to design the membership card.

[5]

(b) Describe all the steps involved in carrying out a mail merge to create the membership cards.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


10

11 The Xtreme Adventure Holiday Company are setting up a spreadsheet for their payroll. They have
job codes for each of their employees. Below is part of the payroll spreadsheet.

A B C D E F G
1 The Xtreme Adventure Holiday Company
2
3
4
5 Job codes
6 A Administration/Office
7 B Snowboard Instructor
8 H Host/Hostess
9 S Ski Instructor
10 SA Senior Administrator
11 TA Transport Assistant
12 TB Trainee Snowboard Instructor
13 TM Transport Manager
14 TS Trainee Ski Instructor
15
16 Employees
17 Name Job code Job description
18 Luca Gisi B
19 Livio Stager S
20 Nico Gantert B
21 Fabian Ging S
22 Mattia Polt S
23 Sofia Walp H
24 Laura Haener S
25 Alessandro Messerli S
26 Lara Forrer B
27 Arda Hegler S
28 Simone Aebi B

(a) Describe, giving a suitable name for the range (A6:B14), how the payroll manager could name
this range.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2017 06_0417_12_2017_1.2


11

(b) Write a formula for cell C18 to display the job description, using the named range from part (a).

...........................................................................................................................................

........................................................................................................................................... [4]

12 When a new system is being developed analysis takes place. One method of researching the
current system is interviewing.

(a) List three other methods of researching the current system.

1.........................................................................................................................................

2.........................................................................................................................................

3.........................................................................................................................................

[3]

(b) Describe two drawbacks of using interviews.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


12

13 The introduction of computers in an organisation can both increase or decrease employment.

(a) Tick the jobs below for which the introduction of computers will increase the number of workers.

Job description tick


(✓)

Car production workers

Delivery drivers

Payroll workers

Programmers

Typists

Website designers

[3]

(b) Describe what is meant by the following types of working.

Compressed hours............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Flexible hours....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

14 There are different ways to check the data that you have entered into a computer system. One of
these ways is verification.

(a) Name two types of verification.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2017 06_0417_12_2017_1.2


13

(b) Proofreading is sometimes thought to be verification.

Explain the differences between verification and proofreading.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

15 Email systems can receive spam emails.

Explain why spam should be prevented.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2017 06_0417_12_2017_1.2 [Turn over


14

16 Bluetooth and WiFi can connect devices together.

Discuss the advantages and disadvantages of using Bluetooth or WiFi.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2017 06_0417_12_2017_1.2


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 2 2 0 9 4 6 7 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

DC (CE/FC) 132682/3
© UCLES 2017 [Turn over
2

1 Tick whether the following statements would apply to a LAN, a WAN or a WLAN.

LAN WAN WLAN


(3) (3) (3)
The internet is an example of this type of network

A wired network found within a single building

This network uses wireless technology

This network is spread over a large geographical area


[4]

2 Complete the following sentences, using the most appropriate technology from the list below.

a 3D printer artificial intelligence batch processing biometrics

a dot matrix printer a microphone a password a robot

a scanner a speaker

(a) A printer that is capable of producing physical objects is called

...............................................................................................................................................[1]

(b) The use of a computer to perform tasks that mimic or duplicate the functions of the human
brain is called

...............................................................................................................................................[1]

(c) A device used in a car production line to assemble a car is called

...............................................................................................................................................[1]

(d) Authentication techniques that use fingerprints or retina scans is called

...............................................................................................................................................[1]

© UCLES 2017 0417/12/O/N/17


3

3 A school is holding an athletics competition. The timings of each running event will be measured
electronically using sensors at the start and finish. Runners begin a race in starting blocks. When
the starting pistol is fired the electronic timing starts. The winner of the race is the first to break the
light beam at the end of the race.

(a) Complete the table using the most appropriate words from the list below.

Infra-red sensor Light sensor Moisture sensor Motion sensor

pH sensor Pressure sensor Sound sensor Temperature sensor

Device
Data from the starting pistol is read by this
device
This device detects that the athlete has left
the starting block
When the light beam is broken the data is
read by this device
[3]

(b) A member of the sports department will use a computer to produce a magazine of the
competition. He will include photographs stored in a digital camera as well as printed
photographs.

Identify the methods he would use to transfer the photographs to the computer.

Digital camera photograph �������������������������������������������������������������������������������������������������������

...................................................................................................................................................

Printed photograph �������������������������������������������������������������������������������������������������������������������

...................................................................................................................................................
[2]

© UCLES 2017 0417/12/O/N/17 [Turn over


4

4 You have been asked to set up a hierarchical folder structure for your IGCSE ICT work directories
so that you can easily locate certain files.

(a) Fill in the boxes and complete the most appropriate hierarchical folder structure, to store
practical and theory work for both homework and classwork.

ICT

[2]

(b) Complete the file path for a document called input_devices.rtf stored in box A.

...............................................................................................................................................[1]

5 (a) Describe the processes a web browser has to go through to load a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 0417/12/O/N/17


5

An organisation is creating a company website and is deciding whether to make it available on the
internet or create a company intranet. The website will contain confidential information.

(b) Explain why they should use an intranet rather than the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 0417/12/O/N/17 [Turn over


6

6 Using the images below write down the Safety issue referred to and a way of Minimising the
risk.

Image Safety issue Minimise the risk

[8]

© UCLES 2017 0417/12/O/N/17


7

7 One popular reason for young people using the internet is playing online games. One way of
ensuring that young people are safe is to use fictional names to identify themselves.

Describe other measures that should be taken to ensure that playing online games is safe for
young people.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17 [Turn over


8

8 Hot House Design keeps to a corporate house style when creating a website.

Web page 1

Web page 2

Using examples from the two webpages, explain what is meant by house style.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17


9

9 The internet is used as a method of communication. This includes Blogs, Wikis and VOIP.

(a) Describe the following ways of communicating.

(i) Blog

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Wiki

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) VOIP

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) The internet has a number of security issues.

Tick whether the following statements would apply to Phishing, Pharming or Smishing.

Phishing Pharming Smishing


(3) (3) (3)
The sending of fraudulent emails appearing to
come from legitimate companies in order to steal
passwords
Redirecting users to a bogus website that looks
authentic
Security attack where a user is tricked into
downloading a virus on to a cell phone
As the user types details they are stored by the
criminal
[4]

© UCLES 2017 0417/12/O/N/17 [Turn over


10

10 The Ocean Sailing Company offers the experience of sailing on a yacht. Customers can choose
which type of yacht they want to sail on. The owner keeps a spreadsheet to calculate the cost
to customers. The owner allocates a loyalty code to each customer. Each code has a different
discount.

A B C D E
1 Holiday Cruises
2
3 Code Discount Cost per day 500
4 1 0.05
5 2 0.1
6 3 0.125
7

Number
8 Name of Yacht of days Percentage Discount Discount
9 1 Ocean Speed 7 =VLOOKUP(A9,$A$4:$B$6,2)
10 2 Sealord 5
11 3 Sunliner 5
12 1 Pacifico 10
13 2 Alexander 14
14 3 Moonliner 5
15 2 Coronia 7
16 2 Voyager 5

(a) Explain each element of the formula in cell D9.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Identify the value you would expect to see in cell D9.

...............................................................................................................................................[1]

(c) The Discount is the cost per day multiplied by the number of days multiplied by the
Percentage Discount.

Write a formula that would be entered in cell E9 to calculate the Discount.

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/O/N/17


11

(d) The $ symbol is used in the formula in cell D9.

Name this type of referencing and explain why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(e) The Ocean Sailing Company owns a number of yachts.

Explain how you could replicate the formulae to calculate the Percentage Discount and the
Discount for each yacht.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 0417/12/O/N/17 [Turn over


12

11 A theatre manager wishes to introduce an online booking system. A programmer has been asked
to write the software. She could continue on her own or discuss the ideas with the theatre manager.

(a) Explain why is it beneficial to discuss ideas with the theatre manager before writing the
software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give four advantages of using online booking systems for the customer rather than using
manual systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2017 0417/12/O/N/17


13

12 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.

Give three disadvantages to the customer of using these cards at an ATM.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

13 A travel agent specialising in adventurous holidays has asked a systems analyst to recommend a
new computer system for their records. The systems analyst’s first task is to research the current
system.

(a) Identify three methods of researching the current system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) The company has decided to set up a website to publicise its holidays.

Name three appropriate types of object that could be inserted into the web page.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2017 0417/12/O/N/17 [Turn over


14

14 A robot is used as a computerised postal delivery system. It drives around the corridors of a set of
offices picking up and delivering post. If the robot is close to a worker it stops and waits until the
worker moves away.

(a) A proximity sensor is used to detect how close to a worker the robot is.

Describe the role of the microprocessor in stopping the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Robots are being used more and more in offices to carry out menial tasks, like delivering
post.

Describe the advantages and disadvantages of using robots in this way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 0417/12/O/N/17


15

15 A word processing program uses a Graphical User Interface (GUI). Using examples from the word
processing program describe three features of a GUI.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................
[3]

16 The banking industry has rapidly changed over the last few years as modern technology has
developed.

Discuss the advantages and disadvantages of using online banking rather than other banking
methods to the customer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 0417/12/O/N/17


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 6 0 9 4 4 3 2 1 6 0 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory February/March 2018
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (NH) 148522/3
© UCLES 2018 [Turn over
2

1 Complete the following sentences, using items from the list below.

Applications A bar code reader A compiler A CPU Hardware

A monitor A printer A scanner System USB

(a) ................................................ software is designed to manage computer hardware. [1]

(b) ................................................ software examples include word processing and spreadsheets.


[1]

(c) ................................................ produces output in the form of hard copy. [1]

(d) ................................................ converts high-level language programs into machine code. [1]

2 Tick the most appropriate device for reading the details from the following media:

Optical Magnetic Bar code Chip and


Mark Ink reader PIN reader
Reader Character (3) (3)
(3) Reader
(3)

Debit card

Bank cheques

A candidate’s responses for


multiple-choice exam questions

A label on a can of soup

[4]

© UCLES 2018 0417/12/F/M/18


3

3 (a) Identify two uses of 3D printing that help doctors and patients in hospitals.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify two uses of holographic imaging that help doctors and patients in hospitals.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

4 CD, DVD and Blu-ray are types of optical storage media.

Tick the most appropriate optical storage medium for each of the statements.

CD DVD Blu-ray
(3) (3) (3)

Stores lower quality audio files

Has the highest storage capacity

The RAM version of this medium is used to


record and play recorded images at the same
time

Stores high definition movies

[4]

© UCLES 2018 0417/12/F/M/18 [Turn over


4

5 Describe the following file formats.

(a) .css ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) .htm ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

6 The Chennai Flood Defence Agency is concerned about the continued flooding of the Adyar river.
You have been asked to produce a flood defence model, using a spreadsheet, to show the normal
depth and the actual depth of the river.

Part of the flood defence model is shown.

A B C D

1 Chennai Flood Defence - Adyar River


2

Normal Actual
depth depth
3 Measurement point (m) (m) Warning
4 Thiru-Vi-Ka Bridge 0.5 3.9 Alert
5 Kotturpuram Bridge 0.5 1.6
6 Anna Salai Bridge 0.6 1.7
7 Alandur Road Bridge 0.65 2
8 Jawaharlal Bridge 0.7 2.6
9 River Bridge 0.75 2.7
10

In the Warning column the model will display:

• ‘Alert’ when the actual depth is above 2.5 m


• ‘Aware’ when the actual depth is between 1.5 m and 2.5 m
• ‘Safe’ when the actual depth is below 1.5 m
• ‘Error’ when abnormal data is entered.

© UCLES 2018 0417/12/F/M/18


5

(a) Test data is entered in cell C4.


Complete the following test plan for the warnings.

Test data Type of data Expected Result


3.4 Normal
Extreme Aware
1.9 Normal Aware
Extreme Aware
Normal Safe
Abnormal Error
[5]

(b) You need to enter a formula in cell D4. This formula will be replicated down to cell D9.

Complete the formula that would be used in cell D4.

=IF(C4>2.5, “Alert”, ...................................................................................................................

...................................................................................................................................................
[5]

(c) One of the users has incorrectly entered actual depth data into cells B4 to B9 rather than cells
C4 to C9.

Describe how you can amend the spreadsheet to prevent this from happening in the future.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 0417/12/F/M/18 [Turn over


6

(d) Part of the flood defence model is shown.

A B C D

1 Chennai Flood Defence - Adyar River


2

Normal Actual
depth depth
3 Measurement point (m) (m) Warning
4 Thiru-Vi-Ka Bridge 0.5 3.9 Alert
5 Kotturpuram Bridge 0.5 1.6
6 Anna Salai Bridge 0.6 1.7
7 Alandur Road Bridge 0.65 2
8 Jawaharlal Bridge 0.7 2.6
9 River Bridge 0.75 2.7
10

You have been asked to produce a graph or chart to show both the normal level and the
recorded actual level at each of the bridges along the river. Include a legend and the names
of each of the bridges.

(i) Name the most appropriate type of graph or chart to display this data.

.......................................................................................................................................[1]

(ii) Describe how you would use the spreadsheet software to create the graph or chart.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2018 0417/12/F/M/18


7

(e) The data will be collected from the river using a remote computer connected to sensors to
measure the data.

Explain why it is better to use this method rather than collecting the data manually.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

7 Tick the three most accurate statements regarding computer hardware.

Tick
(3)
CPU means Computer Processing Unit
Data in RAM is not lost when the computer is turned off
ROM is Read Only Memory
A printer is an input device
A touch screen can be an input device and an output device
The control unit is part of the CPU
The CPU is stored on the hard disk
A pen drive is an example of internal memory
[3]

© UCLES 2018 0417/12/F/M/18 [Turn over


8

8 A company called HotHouse Design has produced the following on-screen data entry form to input
data into a customer database.

HotHouse Design
Ref. No.

Name of customer

Telephone number

Email address

Work to be carried out

Submit

(a) Describe the changes that HotHouse Design could make to their form in order to improve its
design and make it more user friendly.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 0417/12/F/M/18


9

Mail merged letters will be sent to customers.

(b) Describe how mail merge will be used to produce the letters.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

9 Websites that start HTTPS are secure websites. They use encryption when the data is transferred.

Explain what is meant by encryption.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

© UCLES 2018 0417/12/F/M/18 [Turn over


10

10 The Mansa Cricket Club (MCC) is considering setting up an online forum to allow users to post
comments.

(a) Compare and contrast a moderated forum with an un-moderated forum.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) The cricket club considered other methods of allowing its spectators to comment on the
matches.

Tick the most appropriate method for each of these examples.

Blog Wiki Email


(3) (3) (3)
Interactive cricket club web page that can
be viewed and edited by users
An online journal written by the club
secretary
Transmission of messages sent directly to
the secretary of the cricket club
Club members cannot edit the comments
posted online
[4]

© UCLES 2018 0417/12/F/M/18


11

(c) The cricket club are designing a poster to publicise a match against a New Zealand XI. They
have produced the following poster. The space available for the image is 1.3 cm high by 1 cm
wide and the image is currently 26 cm high by 16 cm wide.

Mansa Cricket Club


Place
image
here

New Zealand XI
vs
Mansa Cricket Club

14th March 2018


at the Brabourne Stadium

The image on the right is to be used in the poster but it is too large.

Describe how to edit the image, without cropping, to fit into the space in the poster.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) The image used in the poster is copyright-free.

Explain why copyright legislation is needed for images.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 0417/12/F/M/18 [Turn over


12

11 There are two types of documentation, user and technical.

Tick the elements that are part of User documentation, Technical documentation or Both.

User Technical Both


documentation documentation (3)
(3) (3)
Purpose of the system
Program listing
Input format
Error messages
Hardware requirements
[5]

12 Ananya is a student who is considering buying a new laptop computer. She visits the local store
and is offered the choice of a laptop with an internal solid state drive (SSD) or a laptop where she
can store her data in the cloud.

(a) Describe the benefits and drawbacks of using an SSD rather than the cloud to store her data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 0417/12/F/M/18


13

(b) Ananya is planning to invite her friends to the local cinema and is going to send them an
email.

Explain why she uses an email group to do this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

13 A school has a computer room containing some laptops and some desktop computers. The
headteacher must consider safety issues.

Identify three of these issues and for each one write down a method which would help the
headteacher minimise the risk. Each method must be different in each case.

Issue 1 ..............................................................................................................................................

..........................................................................................................................................................

Method 1 ...........................................................................................................................................

..........................................................................................................................................................

Issue 2 ..............................................................................................................................................

..........................................................................................................................................................

Method 2 ...........................................................................................................................................

..........................................................................................................................................................

Issue 3 ..............................................................................................................................................

..........................................................................................................................................................

Method 3 ...........................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2018 0417/12/F/M/18 [Turn over


14

14 Ocean City is a port which handles a large number of shipping containers. Containers are
automatically transferred between ships, storage areas and lorries at the port. The whole system
is operated by robots.

Discuss the benefits and drawbacks of using robots in this type of operation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 0417/12/F/M/18


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*7525211269*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2018
2 hours

Candidates answer on the Question Paper.

No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

06_0417_12_2018_1.18
© UCLES 2018 [Turn over
2

1 A computer contains internal hardware.

Write down the most appropriate item of internal hardware to match the descriptions.

(a) This handles all the system instructions.

........................................................................................................................................... [1]

(b) A printed circuit board that contains the main components of the computer.

........................................................................................................................................... [1]

(c) This generates output to the speaker.

........................................................................................................................................... [1]

(d) A type of memory where data is lost when the computer is switched off.

........................................................................................................................................... [1]

2 Tick whether the following statements are examples of a 3D printer, a dot matrix printer or a laser
printer.
3D dot matrix laser
(✓) (✓) (✓)

A printer that uses toner.

A printer that uses continuous stationery.

A printer that can be used to make physical models.

A printer that prints layer by layer.

[4]

3 Tick the most appropriate type of network for each description.


LAN WAN WLAN
(✓) (✓) (✓)

A cabled network in a building.

A network that can use satellites.

A network that connects countries.

A network that uses wireless technology.

[4]

© UCLES 2018 06_0417_12_2018_1.18


3

4 The security of software and data is very important.

Complete the following sentences using the most appropriate word(s) from the list.

anti-spyware chip reader coding a dongle encryption


quantum
iris scan a password a PIN a token
cryptography

(a) An electronic device that plugs into a computer and contains the key for a piece of software
is called

........................................................................................................................................... [1]

(b) The scrambling of data is known as

........................................................................................................................................... [1]

(c) A security process that uses photons to enable secure communication is called

........................................................................................................................................... [1]

(d) A numeric code that is entered to enable payment to be made for a meal in a restaurant with
a debit card is called

........................................................................................................................................... [1]

5 Circle two items which are used as external storage media.

CD RW Hard disk Monitor


Mouse RAM ROM

[2]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


4

6 You are a student creating a website for your IGCSE ICT revision work. You have produced some
HTML, but have not yet added the logo or merged the cells. You are aiming to produce the following
page.

Fig. 1

Part of the markup you have produced is:

...

<table>

<tr>

<td><h1>IGCSE ICT</h1></td>

</tr>

<tr>

<td><h3>Theory</h3></td>

<td><h3>Practical 1</h3></td>

<td><h3>Practical 2</h3></td>

</tr>

<tr>

<td><h3>2 hour<br>Theory exam</h3></td>

<td><h3>2.5 hour<br>Practical exam</h3></td>

<td><h3>2.5 hour<br>Practical exam</h3></td>

</tr>

</table>

Fig. 2

© UCLES 2018 06_0417_12_2018_1.18


5

(a) Write the HTML that would display the image called “Logo.jpg” as shown in Fig. 1. If the browser
cannot find the image, then the text “Tawara School Logo” will be displayed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

(b) The third line of HTML currently shown in Fig. 2 does not produce the title as shown in Fig. 1.

Write the HTML that would produce the title as shown in Fig. 1.

...........................................................................................................................................

........................................................................................................................................... [2]

7 A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.

(a) Describe how the RFID tag can be activated.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


6

(b) The system recognises the goat and therefore gives the correct feed to the animal.

Describe how RFID technology will be used to give the correct feed to the animal.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2018 06_0417_12_2018_1.18


8

8 An auction company sells toys. It uses a spreadsheet to show each person’s items and the amount
of money the buyer and seller owe to the company.

Part of the spreadsheet is shown below.

A B C D E F G H I J

1 Auction: 18th July 2017


2
3 Name of Seller
4
Item Selling Buyer’s Seller’s Product
5 code Item description Valuation price premium commission value Commission
6 608a Double Decker bus toy € 20.00 € 45.00 € 10.00 € 1.50
7 608b Blackpool Balloon tram € 25.00 € 45.00 € 50.00 € 2.00
8 608c Blackpool Steam tram € 25.00 € 40.00 € 100.00 € 2.50
9 608d James Bond Aston Martin € 250.00 € 340.00 € 250.00 € 4.17
10 608e D457A Bulldozer (rare) € 300.00 € 750.00 € 500.00 € 6.25
11 608f Fairground Attraction 1 € 40.00 € 30.00 € 1000.00 € 8.00
12 608g Fairground Attraction 2 € 40.00 € 40.00
13 608h Fairground Attraction 3 € 40.00 € 50.00

The Buyer’s premium is 20% of the Selling price.

(a) Write a formula to display the Buyer’s premium in cell E6.

=......................................................................................................................................... [2]

(b) The person selling the item pays a Seller’s commission on any item sold. This is calculated
using the Selling price and finding a match or the next value below in the table, in cells I6 to
J11.

Write a formula to display in cell F6, the Seller’s commission on the Double Decker bus toy.
This formula will be replicated down to cell F13.

=.........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2018 06_0417_12_2018_1.18


9

(c) Describe how you could replicate the formula in cell F6 for each item.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Before the auction begins, a hard copy brochure is produced showing information about the
items, data from the spreadsheet and images of some of the items.

Describe how this brochure is created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


10

9 Automatic car parking systems built into cars are becoming more common. They allow the car to
park safely in a parking bay unaided. The car uses proximity sensors fitted to the front and rear of
the car to help it park. There are many advantages to using these sensors.

(a) State three disadvantages of using proximity sensors in this way.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Modern-day drivers rely less on paper maps and more on satellite navigation systems (satnav).

Describe the inputs, outputs and processing of a satnav when used by a driver to reach a
destination.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2018 06_0417_12_2018_1.18


11

10 The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.

(a) Discuss the advantages and disadvantages of using computer controlled robots rather than
humans to build the lens.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) A new computer system will operate the space telescope; the new computer system is made
up of a number of modules.

Describe how the new computer system is to be tested before it is fully operational.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


12

(c) When the new system has been developed, both user and technical documentation have to
be written.

Name three components that are found in both technical and user documentation.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

11 When people use the internet they run the risk of their computers being infected by viruses.

A file, containing a virus, is downloaded from the internet.

(a) Describe the effects the virus could have on their computer’s hard disk.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain another way the computer could have become infected with a virus.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2018 06_0417_12_2018_1.18


13

(c) An antivirus program is set to fully scan a computer for viruses once a day.

Describe how the antivirus software works during the scan.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

12 A company used to have video-conferences with its suppliers, but due to technical problems they
are considering running an audio-conference.

Describe the advantages of using audio-conferencing rather than video-conferencing.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


14

13 Tick four health issues associated with the continual use of computers.
Tick
(✓)

Virus

Backache

Electrocution

Fire

RSI

Tripping

Eye strain

Overheating

Headache

Heart attack

[4]

14 Some smartphones connected to the internet can allow the user to point their phone’s camera at
an object or image to display information about it on the phone’s screen. The object acts like an
item in a search engine. This is called augmented reality.

One example of its use is in mobile games, where the user tries to catch characters from the game
as the characters appear to walk in the streets.

Explain, using examples, other ways in which augmented reality could be used in everyday life.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2018 06_0417_12_2018_1.18


15

15 As banks reduce the number of branches due to the increased use of online banking system,
improved security of customer data is needed. Many banks are introducing biometric systems to
secure customer data.

(a) Explain, using examples, why biometric systems are more effective than other methods of
security.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Adam is paying his bill in a restaurant using a contactless debit card.

Describe the computer processing involved in Electronic Funds Transfer (EFT) using contactless
cards.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2018 06_0417_12_2018_1.18 [Turn over


16

16 The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.

Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 06_0417_12_2018_1.18


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 2 1 9 8 8 5 9 8 7 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2018
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages and 3 blank pages.

DC (SC) 150187/3
© UCLES 2018 [Turn over
2

1 Tick whether the following are examples of applications software or system software.

applications system
software software
(✓) (✓)
Control software

Compiler

Word processing

Device drivers
[2]

2 Complete the following sentences, using the most appropriate technology from the list.

a 3D printer a dot matrix printer a laser printer a light sensor

a magnetic ink character reader a microphone an optical mark reader

a speaker a web cam a wide format printer

(a) A device that is most suited to being used to produce hard copy output in a general office
environment is called

.............................................................................................................................................. [1]

(b) The input device that reads the cheque number from a bank cheque is called

.............................................................................................................................................. [1]

(c) A device that outputs hard copy large architectural drawings is called

.............................................................................................................................................. [1]

(d) A device that outputs sound is called

.............................................................................................................................................. [1]

© UCLES 2018 0417/12/O/N/18


3

3 Pupils working on a science project use the school network to store and retrieve files. They log
onto the network using individual passwords.

(a) Abisha is using his name as his password.

Give two reasons why this is not a good idea.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two other pieces of advice the teacher should give regarding the management of
passwords.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

4 A school is setting up a new computerised system to manage many aspects of the school
administration.

(a) Describe how this system can be used to manage student registration and attendance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe the benefits of using this system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 0417/12/O/N/18 [Turn over


4

(c) The data from the registration system is saved in the school administration database.

The head teacher will need to check the attendance records for any student for any semester.
She will type in the Student_ID and the Semester (Autumn, Spring or Summer). After she has
done this the following data will appear on the same screen.

Field name
Student_name
Days_present
Number_of_lates
Number_absences
Parents_phone_number
Tutor_group

Design a suitable screen layout to display one record. It must have appropriate spacing for
each field, navigation aids and a space to type in search data. Do not include examples of
students.

[6]

© UCLES 2018 0417/12/O/N/18


5

A student record from the database is shown below.

Field name Example Data


Student_ID 8543
Semester Spring
Student_name Kannur Rahul
Days_present 180
Number_of_lates 4
Number_absences 6
Parents_phone_number 01244878387
Tutor_group 11ABC

(d) Name an appropriate validation check that could be used for each of the following fields,
based on the data shown in the record.

Field name Validation check


Semester

Number_of_lates

Parents_phone_number

[3]

5 Describe the benefits and drawbacks of using a Graphical User Interface (GUI) rather than a
Command Line Interface (CLI).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2018 0417/12/O/N/18 [Turn over


6

6 A Medical Authority in a large city is planning to centralise its medical booking system. This
will allow patients to make all of their doctors’ appointments, dental appointments and hospital
appointments online.

(a) Discuss the benefits and drawbacks to both the patients and the medical staff of this type of
system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

(b) The Medical Authority creates many different types of documents including letters and
memos. Each of them is produced using its corporate house style.

Explain why corporate house styles are required.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 0417/12/O/N/18


7

7 A student is setting up a database of information about volcanoes for a Geography project. The
following is part of the database.

Name_of_volcano Country Height State Last_eruption Volcano_type


Usu Japan 731 Active 2001 Stratovolcano
Tor Zawar Pakistan 2237 Dormant 2010 Fissure
Datong China 1882 Extinct 450 Cinder Cone
Changbaishan China 2744 Active 1903 Stratovolcano
Stromboli Italy 926 Active 2016 Stratovolcano
Tengchong China 2865 Dormant 1609 Pyroclastic cone
Wudalianchi China 597 Dormant 1721 Multi-coned

Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, < > can be used to search the volcano
database. The search criteria for all the dormant volcanoes with a height of less than 1000 metres
would look like this:

State = “Dormant” AND Height < 1000

Use only the given operators and data to:

(a) write down the search criteria that will produce a list of all the volcanoes that are not extinct in
China that also last erupted before the year 1900.

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) write down the names of the volcanoes that match the requirements of part (a).

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) The data is sorted into ascending order of height.

Write down the name of the volcano which would now be in the first record.

...................................................................................................................................................

.............................................................................................................................................. [1]

© UCLES 2018 0417/12/O/N/18 [Turn over


8

(d) Drones are remote-controlled flying devices. Data can be collected by drones that fly through
the gas cloud of the volcano. The drones have sensors attached to them which send the data
to a computer. The computer analyses the data.

Discuss the benefits and drawbacks of using this method of measurement.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [7]

(e) Explain why the data collected by the sensors cannot be read directly by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 0417/12/O/N/18


9

8 Spam emails are a problem for computer systems.

(a) Explain what is meant by a spam email.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Explain why spam emails need to be prevented.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Describe the methods which can be used to prevent spam emails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

9 Describe how a router forwards data packets from one network to another.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2018 0417/12/O/N/18 [Turn over


10

10 A local railway company is considering introducing a new system for its passengers using e-tickets
on a smart phone. Before introducing this new system, analysis of the current system is required.

(a) Describe the steps that would be carried out in the analysis of the current system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

The e-ticket will link to a database containing personal data.

(b) Give two examples of personal data that could be stored.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Details of each of the passengers have been entered into the database.

Give one reason why this data was verified on entry.

...................................................................................................................................................

.............................................................................................................................................. [1]

© UCLES 2018 0417/12/O/N/18


11

Proofreading is sometimes thought to be verification.

(d) Explain the difference between verification and proofreading.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

11 .PDF and .RTF are two file formats used for storing documents.

Describe the file formats and explain the differences between them.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2018 0417/12/O/N/18 [Turn over


12

12 HotHouse Design is a large design company. It has recently created a new web address for their
design portfolios. The web address is:

https://www.hothouse-design.co.uk/portfolios

(a) Describe the following parts of the web address.

https:// .......................................................................................................................................

...................................................................................................................................................

hothouse-design .......................................................................................................................

...................................................................................................................................................

.uk .............................................................................................................................................

...................................................................................................................................................

/portfolios ..................................................................................................................................

...................................................................................................................................................
[4]

(b) Hyperlinks are widely used in web pages.

Explain what is meant by a hyperlink.

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

13 Spreadsheets use functions, formulae and named ranges.

(a) Describe the term:

Function ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Formula ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 0417/12/O/N/18


13

(b) Explain why a named range is used in a spreadsheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

14 Emails are a very popular way of communicating.

Tick four statements, relating to emails that are true.

Tick
(✓)
Emails can only be sent from a computer.

An email can be used to send a message to many


people at the same time.
It always takes a long time for an email to arrive.

All emails must have an attachment.

Attachments may have to be compressed to be


sent via email.
Emails can be used to send legal documents.

Every email has to be printed out.

In order to send an email back to the sender


without retyping the address, reply is used.
Email means extended mail.

Email attachments are always checked for viruses


before they are sent.
[4]

© UCLES 2018 0417/12/O/N/18


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 3 1 9 9 6 4 2 0 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory February/March 2019
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page and on any
additional pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 16 printed pages.

DC (KS/SG) 161532/4
© UCLES 2019 [Turn over
2

1 For each of the different statements, tick the most appropriate network.

WAN WLAN LAN


(✓) (✓) (✓)
A cabled network used in one building.

The internet is an example of this type of network.

Several networks connected together using a router.

This network is connected without cables.


[4]

2 Tick whether the following are examples of System Software or Applications Software.

System Applications
Software Software
(✓) (✓)
Compiler

Word processing software

Spreadsheet software

Operating system
[2]

3 Command Line Interface (CLI) and Graphical User Interface (GUI) are examples of interfaces
found in computer systems.

Give two advantages of a computer having a GUI rather than a CLI.

1 ........................................................................................................................................................

..........................................................................................................................................................

2 ........................................................................................................................................................

..........................................................................................................................................................
[2]

© UCLES 2019 0417/12/F/M/19


3

4 A router is used in networks.

Describe how a router routes data packets.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [3]

5 An office worker is about to open an attachment but is worried it might contain a computer virus.

Explain what is meant by a computer virus.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [2]

6 Circle three items which are used as output devices.

Buzzer CD/RW drive Keyboard LCD monitor

Speaker Solid state drive Trackerball Web cam

[3]

© UCLES 2019 0417/12/F/M/19 [Turn over


4

7 The Tawara Tea Company supplies tea to its customers. The company has created a spreadsheet
to help its sales team to keep track of its orders.

The spreadsheet has two worksheets, named Products and Orders.


Part of the spreadsheet is shown below.
All prices and costs are displayed in Indian Rupee ₹.

Worksheet: Products

A B C
1 Tea code Product name Price per unit
2 272 Singbulli Champagne Oolong ₹ 16.00
3 347 Phuguri Supreme ₹ 16.00
4 348 Tumsong Supreme ₹ 16.00
5 349 Pussimbing Supreme ₹ 16.00
6 3 Phuguri ₹ 8.50
7 5 Goomtee ₹ 8.00
8 6 Risheehat ₹ 6.40
9 7 Makaibari Organic ₹ 4.90
10 8 Bannockburn ₹ 5.00
11 9 Chamong Organic ₹ 4.00

Worksheet: Orders

A B C D
1 Order ID Tea code Quantity ordered Cost
2 124 272 24
3 124 348 25
4 124 6 105
5 124 9 120
6 124 349 30
7 125 3 225
8 125 5 220
9 125 6 200

A salesman needs to create a formula to be placed in cell D2, in the Orders worksheet, that finds
the Price per unit of the tea, multiplies it by the Quantity ordered and then displays the result.

(a) Write a formula that needs to be entered in cell D2. This formula will be replicated down to
cell D9.

=
...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 0417/12/F/M/19


5

The salesman has created a new worksheet called Receipt which automatically produces a receipt
for each order.

Worksheet: Receipt

A B C D E
1 Order ID Tea code Product name Quantity ordered Cost
2 124 272 Singbulli Champagne Oolong 24 ₹ 384
3 348 Tumsong Supreme 25 ₹ 400
4 6 Risheehat 105 ₹ 672
5 9 Chamong Organic 120 ₹ 480
6 349 Pussimbing Supreme 30 ₹ 480
7 Total ₹ 2416

(b) Explain how he could format the Cost column (column E) to display the values in Indian
Rupees as shown.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0417/12/F/M/19 [Turn over


6

8 A drone is a remote controlled flying vehicle. A drone is being used to monitor floods in Mumbai.

(a) Complete the following sentences, using the most appropriate word or words from the list
below.

buzzer joystick monitor pressure sensor

ROM speaker temperature sensor video camera

(i) The drone is microprocessor controlled with input from a

..................................................................................................................................... [1]

(ii) Images of the floods are captured using a

..................................................................................................................................... [1]

(iii) The images sent from the drone are displayed on a

..................................................................................................................................... [1]

(b) Name three advantages of using a drone to monitor the floods rather than collecting the data
manually.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 0417/12/F/M/19


7

9 Aadhya and her family are planning a visit to the Gir National Park and she is creating a web page
about the destination.

She has started writing some of the HTML but has made some mistakes.

<html>
<!-- Visit to Gir National Park -->
<head>
</head>
<title>The Gir National Park</title>
<body>
<table style= "width:100%">
<tbody style="background-color: #9acd32>
<tr>
<td rowspan="2"><img src="GIRNP.JPG" width="50" alt="image of an elephant">
</td>
<td><h1>The Gir National Park</h1>
<h3>A National Park of Gujarat</h3>
</td>
<td ><img scr="GIR-LOGO.JPG" alt="Logo for Gir National Park">
</td>
</tr>
<tr>
<td colspan="2" >This webpage is under construction.
</td>
</tr>
</tbody>
<table>
</body>
</html>

Write down four mistakes which would prevent this markup from working properly. Your answers
must be different in each case.

1 ........................................................................................................................................................

..........................................................................................................................................................

2 ........................................................................................................................................................

..........................................................................................................................................................

3 ........................................................................................................................................................

..........................................................................................................................................................

4 ........................................................................................................................................................

.........................................................................................................................................................................
[4]

© UCLES 2019 0417/12/F/M/19 [Turn over


8

10 An electric bus system is being considered for New Delhi. Passengers will use smart cards to
travel on the bus. They will have to add money to their smart card before they can travel.

(a) Compare and contrast the use of smart cards rather than using cash to pay for a journey.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

The new electric bus system will help to reduce the air pollution in the city. Sensors are used in the
system.

(b) Name a sensor that could be used to detect high levels of air pollution.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 0417/12/F/M/19


9

(c) The sensor monitors the air pollution. When the air pollution reaches a certain limit, a message
is displayed on a street sign in the city to warn pedestrians and road users.

Describe the computer processing involved in this system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Data from the sensor needs to be converted from analogue to digital before it is processed.

Explain the need for this conversion.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0417/12/F/M/19 [Turn over


10

11 The systems life cycle is shown. The Design, Evaluation, Documentation and Implementation
stages are missing.

Write these stages into their correct places.

Analysis
..........................

.......................... ..........................

Development
.......................... and testing

[4]

© UCLES 2019 0417/12/F/M/19


11

12 Tawara High School has developed a new computerised system to timetable lessons and
examinations. The school needs the new system to be in use before the start of the new school
year. The school is planning to implement the new system using either direct changeover or
parallel running.

(a) Discuss the advantages and disadvantages of using direct changeover compared with
parallel running as a method of implementing the system.

In your answer name the method you would use, giving reasons for your choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Describe four advantages of using computerised timetabling systems.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2019 0417/12/F/M/19 [Turn over
12

13 Aayush has been involved in an accident and has badly damaged his hand. A surgeon is
attempting to replace Aayush’s hand with a prosthetic hand.

Explain how the surgeon would use a 3D printer to create the prosthetic hand.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

14 A student has handed in her homework. One of the incorrect answers she gave was that encryption
could be used to stop an unauthorised person accessing a computer system.

(a) Explain what is meant by encryption and why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify a method which would help to prevent unauthorised access to a computer.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 0417/12/F/M/19


13

15 Geographic Information Systems (GIS) use satellites.

Describe, using an example, how GIS can be used.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

© UCLES 2019 0417/12/F/M/19 [Turn over


14

16 A programmer is developing a presentation of a new ICT solution for a conference and needs to
consider the audience.

(a) Using examples, explain why presentations and ICT solutions have to take into account the
type of audience.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The programmer is concerned that the software used for the presentation will be copied by
the participants during the conference.

Describe how the software could be protected from illegal copying.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0417/12/F/M/19


15

17 Repetitive Strain Injury (RSI) is one of the health problems associated with the prolonged use of
computers.

(a) Describe RSI and what causes it.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) State two strategies for preventing RSI.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0417/12/F/M/19 [Turn over


Cambridge Assessment International Examinations
Cambridge International General Certificate of Secondary Education
*2099221217*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2019
2 hours

Candidates answer on the Question Paper.

No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your name, centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

06_0417_12_2019_1.14
© UCLES 2019 [Turn over
2

1 A computer consists of hardware and software.

(a) State what is meant by hardware.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) State what is meant by software.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) There are two types of software.

Name one of the two types of software used by a computer.

...........................................................................................................................................

........................................................................................................................................... [1]

(d) Name the piece of hardware found in a tablet computer that is both an input and output device.

...........................................................................................................................................

........................................................................................................................................... [1]

2 There are many types of data storage.


Tick whether the following statements are examples of read-only memory (ROM), random access
memory (RAM) or a hard disk drive (HDD).

ROM RAM HDD


(✓) (✓) (✓)

It loses its data when the computer is switched off.

It is classed as backing storage.

It stores the start-up instructions of the computer.

It temporarily stores the current work of the current user.

[4]

© UCLES 2019 06_0417_12_2019_1.14


3

3 Circle two items which are used for direct data entry.
Keyboard MICR Microphone

Mouse Printer RFID

[2]

4 Alpine slalom skiing involves a number of skiers racing down a mountain negotiating obstacles.
The time it takes each skier to complete the course is measured. The fastest skier is awarded first
place. This involves the use of a number of different sensors to monitor variables.

Using words from the list below, complete the following statements.

Humidity Light Motion pH


Pressure Sunlight Temperature Turbidity

(a) This sensor is used to measure how cold it is on the course.

........................................................................................................................................... [1]

(b) This sensor is used to stop the clock when a skier crosses the finish line.

........................................................................................................................................... [1]

(c) This sensor is used to measure the altitude (height above sea level) at the top of the course.

........................................................................................................................................... [1]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


4

(d) Skiers take part in two separate races. The fastest thirty skiers qualify for the second race.

Thirty skiers have already completed the course. In order for the next skier to qualify he has
to beat the race time of the skier currently in 30th place.

Part of the spreadsheet showing the current standings is shown.

Write a formula that can be entered in cell E36 to display Y if the skier has qualified by beating
the time of the skier currently in 30th place. If the skier has not qualified then N is displayed.

=.........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2019 06_0417_12_2019_1.14


5

(e) Just before the second run column E is deleted as it is no longer required. As the skiers in the
second run complete the course their times are entered into the spreadsheet. The spreadsheet
has been changed to display the second run times, as shown.

The combined times for the first and second runs need to be added to the spreadsheet in a
new column between columns E and F.

Describe the steps you would take to add this new column with the heading Combined Time.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(f) Write a formula that can be entered in the new cell F3 that adds the time taken to complete
the first run to the time taken to complete the second run.

=.........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


6

(g) When the overall race is completed the data is sorted into order based on the combined times.
The first place skier will be at the top of the list.

Part of the final spreadsheet before the data is sorted is shown.

The 30th place skier is on row 32.

Describe the steps you would take to sort the data to show each skier in their correct position,
without using functions.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


7

(h) Skiers throughout the season earn World Championship points. At the end of the race the
points are calculated for each skier. The winner of the race gains 100 points. The other skiers
have their points calculated by:

• subtracting the combined time of the winner from the combined time of the skier
• then subtracting this value from the winner’s points.

Write a formula to be placed in cell G4 to show the skier’s points for the race. The formula will
be replicated to G32.

=.........................................................................................................................................

........................................................................................................................................... [3]

5 Adinda is a marathon runner. She uses a smartwatch which is a smaller version of her smartphone.
She trains by running in areas near her home. She uses a smartwatch with an in-built GPS system
to navigate the route she is running.

(a) Describe the disadvantages of using a smartwatch in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Name two other uses of GPS systems.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


8

(c) Adinda also carries a smartphone strapped to her arm but finds this is difficult to use when
running. A smartphone can be used for communication, either for making phone calls or text
messaging. Adinda stops part way through her run for a rest and wishes to communicate with
her friend using the smartphone.

Describe why text messaging is a better way for Adinda to communicate with her friend rather
than making a phone call.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

6 Tawara school uses both the internet and an intranet.

(a) Describe four disadvantages to students of using the internet compared with an intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2019 06_0417_12_2019_1.14


9

(b) Email is a service provided by the internet.

For each of the following problems, associated with email, describe methods of protecting your
data.

(i) Spam

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

(ii) Viruses

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


10

7 The introduction of computers into an organisation’s payroll department has affected employees’
working patterns. Two examples of this are part-time working and job sharing.

(a)
(i) Describe what is meant by part-time working.

................................................................................................................................

................................................................................................................................ [2]

(ii) Describe what is meant by job sharing.

................................................................................................................................

................................................................................................................................ [2]

(b) The introduction of these computers has had positive and negative effects on the payroll
department’s workers.

Describe the benefits to workers of introducing computers into this department.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


11

8 Internet banking is changing how we carry out banking transactions.

Discuss the advantages and disadvantages to the customers of the introduction of internet banking.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


12

9 Expert systems have many applications.

(a) Name two applications that use expert systems.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Tick three components of an expert system.


Tick
(✓)

Interactive user interface

Spreadsheet

Motor

Printer

Knowledge base

Search engine

Actuator

Rules base

[3]

10 The systems life cycle is followed when a new computer system is being created.

Tick whether the following statements are examples of the Analysis stage, the Design stage or
the Evaluation stage of the systems life cycle.
Analysis Design Evaluation
(✓) (✓) (✓)

Identifying the problems with the current system

Deciding on testing strategies

Observation of workers using the current system

Comparing the solution with the original task


requirements

[4]

© UCLES 2019 06_0417_12_2019_1.14


13

11 A teacher is planning to develop a presentation to show his younger students, aged 5 to 6.

Describe the factors which need to be considered when designing the presentation for these
students.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

12 Generic file formats can be used when saving files.

(a) Tick three generic file formats.


Tick
(✓)

.xls

.pdf

.doc

.rtf

.sdc

.bcc

.csv

.accdb

[3]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


14

(b) Explain why generic file formats are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

13 (a) Describe the following terms with reference to navigation from a web page.

(i) Hyperlink

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) href

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) Explain the difference between the use of relative file paths and absolute file paths in navigation
from a web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


15

14 Explain the difference between analogue data and digital data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

15 As our use of the internet increases e-safety becomes essential.

Discuss why e-safety is needed.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2019 06_0417_12_2019_1.14


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 2 7 2 1 3 7 6 6 5 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2019
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (JC/CT) 174146/4
© UCLES 2019 [Turn over
2

1 A student is creating a test plan for a validation routine. The input to be tested is an integer between
1 and 10. Tick whether the following are the most appropriate examples of normal data, abnormal
data or extreme data.

normal abnormal extreme


(✓) (✓) (✓)
one

10

3.2
[4]

2 Tick whether the following statements relate to a command line interface (CLI) or a graphical user
interface (GUI).

CLI GUI
(✓) (✓)
This interface does not need a pointing device

This is an example of a WIMP interface

The user has to type in instructions

This interface takes up more memory in the computer


[2]

3 Complete the following sentences, using the most appropriate items from the list.

An app Coding A data projector A linker Pen drive

Quantum A TFT monitor A touch screen Vision Web cam


cryptography enhancement

(a) ...................................................................... is an example of system software.

(b) ...................................................................... is an example of an output device that can also


act as an input device.

(c) ...................................................................... projects an image inside the headset of the user.

(d) ...................................................................... is a form of encryption of data.


[4]

© UCLES 2019 0417/12/O/N/19


3

4 This diagram shows a smartphone.

(a) Name three input devices found on a smartphone.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Name one storage device which is available in a smartphone.

............................................................................................................................................. [1]

(c) Name two output devices found in a smartphone.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

5 People are buying laptop computers rather than desktop computers.

Give four advantages of using a laptop computer rather than a desktop computer.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]
© UCLES 2019 0417/12/O/N/19 [Turn over
4

6 The computer technician at Tawara School is planning to set up ten new computers to be placed
in the staffroom to form a network. The network will not be connected to the internet. Assume the
school currently has no hardware or software for this network.

(a) State the steps that the technician would need to take to set up this network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The teachers have asked the head teacher if they can access the internet. The computer
technician will need to attach a router to the network.

Explain how a router works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0417/12/O/N/19


5

(c) The school plans to connect some teachers’ laptops to this new network using WiFi.

Describe, in detail, how data is transmitted from the laptops to the new network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

A B C

(a) Describe the steps required to transform shape A into shape B.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the steps required to transform shape A into shape C.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0417/12/O/N/19 [Turn over


6

8 Files can be saved in a generic file format.

(a) Explain why generic file formats are needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Complete the following sentences, using the most appropriate file format from the list below.

.css .csv .doc .gif .htm

.pdf .png .rar .sdb .xls

(i) ............................................... is a stylesheet used in the creation of web pages. [1]

(ii) ............................................... is a generic archive file format. [1]

(iii) ............................................... is a generic file format that stores still and moving images.
[1]

(iv) ............................................... takes data in the form of tables and saves it as text. [1]

© UCLES 2019 0417/12/O/N/19


7

9 The director of a small airport has asked his airport manager to look into the punctuality of
departures. The manager obtained details of some of the departures on one day. He has created
a spreadsheet, which contains both the airport data and the times of departure. Part of the
spreadsheet is shown.

A B C D E F
1 Airport code Airport name
2 ALG Algiers
3 BKK Bangkok
4 BXW Bawean
5 DEL Delhi
6 DOH Doha
7 CPH Copenhagen
8 GVA Geneva
9
Scheduled Actual time of Minutes Airport Destination Late / on
departure departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18

(a) Write a formula that would be entered in cell F11 to display the letter L if the value in C11 is
greater than 0 or the letters OT if it is not.

= ................................................................................................................................................

............................................................................................................................................. [3]

(b) Write a formula, without using named ranges, that would be entered in cell E11. The formula
must be easy to replicate. It should display the name of the airport, using the Airport code
from cell D11 and the list of Airport names.

= ................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


8

(c) The airport manager is producing a report of his findings to present to the director. The data
will change from day to day.

Before he can produce the findings he needs to enter a formula in cell F19 to count the
number of late departures from the airport.

A B C D E F
Scheduled
Actual time of Minutes Airport Destination Late / on
departure
departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18
19 Late 6
20 On Time 1
21

Write the formula, without using a named range, to be entered in cell F19.

= ................................................................................................................................................

............................................................................................................................................. [3]

(d) Name the most appropriate type of chart/graph he could produce to show the proportion of
late departures and those that leave on time.

............................................................................................................................................. [1]

© UCLES 2019 0417/12/O/N/19


9

10 A company is purchasing a new printer. A choice has to be made between using a laser printer or
a dot matrix printer.

Discuss the advantages and disadvantages of using dot matrix printers rather than laser printers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


10

11 Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the advantages of using these devices is that we can now set a cooker to switch on whilst
we are out so that we arrive home to a cooked meal.

(a) Apart from the use of cookers, describe the advantages of using microprocessor-controlled
devices in the home.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Some home devices can be controlled remotely when away from home. These home devices
need to be connected to the internet.

Describe the disadvantages of connecting home devices to the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19


11

12 A sports club is planning a new computerised record keeping system to replace their manual
system.

(a) A systems analyst recommends that new software is required. The analyst could either write
the software or purchase it off the shelf.

Give two advantages to the sports club of the analyst writing the software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Explain why it is better to use a computer to store the records rather than the manual system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


12

(c) The systems analyst recommends that the system is implemented using direct changeover,
but the sports club feel that parallel running should be used.

Describe direct changeover and parallel running, giving a different benefit and drawback of
using each method of implementation.

Direct changeover ....................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................

Parallel running .........................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 0417/12/O/N/19


13

13 Many companies that make microprocessors use robots to carry out the task rather than using
humans.

(a) Give three advantages of using robots to carry out the task.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give three disadvantages of using robots to carry out the task.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 0417/12/O/N/19 [Turn over


14

14 The internet is not controlled by any one single country. The internet is a very good communication
system, but it can also be seen as a security problem.

Discuss the benefits and drawbacks of policing the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 0417/12/O/N/19



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4606582192*

Paper 1 Theory February/March 2020


2 hours

You must answer on the question paper.


No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

03_0417_12_2020_1.21
© UCLES 2020 [Turn over
2

1 A list of hardware items is given.

3D printer Actuator LCD monitor Memory stick Mouse


RAM Touch screen Video card Webcam Wide format printer

(a) Identify two input devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Identify two internal hardware devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to the internet or an intranet.
internet intranet
(✓) (✓)

This type of network is public

This is the more secure type of network

This type of network is global

This type of network is more likely to be monitored

[2]

3 Chess players can use expert systems to help them practise chess moves.

Name two other applications which involve the use of expert systems.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21


3

4 Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.

(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.

desktop tablet
computer computer smartwatch
(✓) (✓) (✓)

A computer made up of separate units

Is an example of wearable technology

A portable device that allows text to be


typed relatively easily

Most easily used for fitness and health


monitoring by runners

[4]

(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.

Describe three advantages of using a smartphone rather than a laptop computer.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


4

5 A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.

Part of the spreadsheet is shown:

The formula in cell A3 is IF(A2<>'''',VLOOKUP(A2,E3:F6,2),'''')

(a) Explain what the formula in cell A3 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2020 03_0417_12_2020_1.21


5

(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.

(i) Explain why he should do this rather than using the cell references.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

(ii) Give an example of an appropriate name he should give the range.

................................................................................................................................

................................................................................................................................ [1]

(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')

Explain what the formula in cell F9 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


6

6 A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:

C:

Work

Class_A1

Examination_Marks

Registers

Class_Reports

(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.

C: ......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The teacher could have saved the document as a .txt or an .rtf file format.

Describe what is meant by .txt and .rtf file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21


7

(c) Explain the differences between the two file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.

Explain why mail merged documents are used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


8

7 A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.

(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


9

8 A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.

(a) Explain the differences between a flat file database and a relational database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

9 Documents use headers, footers and margins.


The statements refer to a header, a footer or a margin. Tick (✓) the most appropriate term for
each statement.
header footer margin
(✓) (✓) (✓)

Text entered that can appear at the top of each page


automatically

An area between the main content of a page and the edge


of the page

An additional space between facing pages

Text entered that can appear at the bottom of each page


automatically

[4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


10

10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.

(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.

Cell phone ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

VoIP ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.

Identify one type of transaction they cannot do using online banking.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.

Tick (✓) whether the following are appropriate examples of a security question or not.

Appropriate Not appropriate


(✓) (✓)

How old are you?

What is your mother’s maiden name?

What is your PIN?

Which town were you born in?

[2]

© UCLES 2020 03_0417_12_2020_1.21


11

(d) Give three benefits of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

(e) Give two drawbacks of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


12

11 Robots are used in many car production lines.

Discuss how their use has affected the nature of employment in the car production industry.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.

(a) Describe the features of a web page that identify it as using a secure server.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


13

(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.

Compare and contrast smishing and pharming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


14

13 A sales representative is planning a presentation about a new product. He is considering whether


to use a multimedia presentation or to give a talk and hand out leaflets.

(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2020 03_0417_12_2020_1.21


15

(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.

Explain the steps he would need to take to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.

<img src =''New_product.jpg'' alt=''company logo''>

When the markup is run, the words ‘company logo’ are displayed and not the image.

Explain why this may be the case.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*1018410769*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_12_2020_1.15
© UCLES 2020 [Turn over
2

1 The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.

It is important that the correct data type is used in each of the fields.

(a) Tick (✓) the most appropriate data type for each of the following fields.

Text
Boolean Numeric
(alphanumeric)
(✓) (✓)
(✓)

Athlete_name

Gold_medal (Y/N)

Age

Name_of_country

[4]

© UCLES 2020 06_0417_12_2020_1.15


3

(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.

Write down six of the formatting features that have been used in the report.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


4

(a) Write down the type of interface shown.

........................................................................................................................................... [1]

(b) Write down two disadvantages of using this type of interface.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


5

3 Complete the following sentences using the most appropriate network term.

A communication method that wirelessly connects a mobile phone to a car, to allow hands-free

use of the mobile phone is ........................................... .

A network device that allows a stand-alone computer, using a dial-up analogue connection, to

connect to an ISP is a .......................................... .

A network device that allows a LAN to connect to the internet is a ........................................ .

A wireless communication method used in WLAN is ......................................... .

[4]

4 A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.

(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.

Type of test data Example of test data

Normal

Abnormal

Abnormal

Extreme

[4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


6

(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.

(i) Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [5]

(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2020 06_0417_12_2020_1.15


7

(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.

Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.

Method...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Improvement 1...................................................................................................................

...........................................................................................................................................

Improvement 2...................................................................................................................

...........................................................................................................................................

Improvement 3...................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


8

5 When using the internet, FTP can be used.

Explain what is meant by the term FTP.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

6 Smishing and phishing can affect the security of a user’s data.

(a) Compare and contrast smishing and phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_12_2020_1.15


9

(b) Describe the methods which can be used to help prevent phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

7 Complete each sentence using the most appropriate output device from the following list.

3D printer Buzzer Dot matrix printer Heater


Laser printer LCD monitor Light Wide format printer

(a) The device that can produce prosthetic limbs is called a

........................................................................................................................................... [1]

(b) The device that can output soft copy is called a

........................................................................................................................................... [1]

(c) The device that can produce sound as its main output is called a

........................................................................................................................................... [1]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


10

8 Tablet computers tend to be used more than desktop computers.

Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 People rely heavily on microprocessor-controlled devices in the home.

(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


11

(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.

Describe the benefits and drawbacks of using WiFi connections in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

10 Music scores can now be produced using computer systems and appropriate software.

Describe the features of this technology.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


12

11 A headteacher is planning to produce a presentation to showcase the school’s achievements.

(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.

Describe the steps the headteacher would need to take to play music in the background of
the slides.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 06_0417_12_2020_1.15


13

(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.

Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 (a) Describe repetitive strain injury (RSI) and explain what causes it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Give three ways of minimising the risk of RSI.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


14

13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.

Compare and contrast the use of solid state storage with the use of optical storage to store data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2020 06_0417_12_2020_1.15


15

14 There are two types of storage within a computer, internal memory and backing storage.

Discuss the differences between internal memory and backing storage.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_12_2020_1.15


Cambridge IGCSE™
* 4 7 1 5 4 6 9 3 7 1 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/SG) 189826/3
© UCLES 2020 [Turn over
2

1 Complete the question using an appropriate item from the list given.

Bar code reader Blu-ray drive DVD drive Hard Disk Drive Keyboard

Memory stick Mouse Optical Character Reader SSD TFT monitor

(a) Identify two solid state storage devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two direct data entry devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 A website can have three web development layers.

Tick (3) whether the following statements refer to the behaviour layer, content layer or
presentation layer.

behaviour content presentation


(3) (3) (3)
This layer is used to display and format
elements within the web page
This layer includes the hyperlinks to navigate
around the website
This layer is used to enter scripting language
to elements within a web page
This layer is used to create the structure of
a web page
[4]

© UCLES 2020 0417/12/O/N/20


3

3 A computer system consists of a number of different items of hardware.

Write down the most appropriate item of hardware that fits the following descriptions.

(a) A non-volatile device that stores the start-up commands.

............................................................................................................................................. [1]

(b) A printer that produces physical objects.

............................................................................................................................................. [1]

(c) A hardware device that reads analogue data from the environment.

............................................................................................................................................. [1]

4 The temperature in a glasshouse is controlled by a computer. A program is being designed to


open and close the glasshouse windows. If the temperature is too hot, then the windows will open;
otherwise the windows will close.

The systems analyst has produced a number of different instructions to show how the system
works. Part of the instructions are shown.

(a) Complete the instructions by writing the most appropriate technical terms to explain how the
windows are operated.

• Data is read by the sensor.

• ......................................................................................... data is output from the sensor.

• Data from the sensor is sent to the microprocessor via the ..............................................

...........................................................................................................................................

• If the temperature is greater than the ................................................................................

• The microprocessor sends a signal to the ........................................................................


[4]

(b) Circle the two most appropriate input devices associated with the computerised glasshouse.

Chip and PIN reader Hard Disk Drive Laser printer

LED monitor Moisture sensor Numeric keypad


[2]

© UCLES 2020 0417/12/O/N/20 [Turn over


4

(c) Another use of computer control is in the manufacture of cars.

Discuss the benefits and drawbacks of using computer-controlled systems rather than
humans to build a car.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20


5

5 (a) Compare and contrast an intranet with the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Protocols are associated with the internet and an intranet.

Identify three protocols and for each one, identify a use.

Protocol 1 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 2 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 3 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[6]
© UCLES 2020 0417/12/O/N/20 [Turn over
6

6 Khalid keeps a spreadsheet to record his expenses and to plan for future spending. This
spreadsheet is split into two separate sheets, which he has named Plan and Model.

Plan contains details of his future spending.


Model contains a model of his income and expenses.

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

Model
A B C D E F G
1 Model
2 2020 2021 2022 2023 2024 2025
3
4 Income 63,784 65,379 67,013 68,688 70,406 72,166
5 Investment Income 255 527 816 1,123 1,450
6 Total Income 63,784 65,634 67,540 69,504 71,529 73,616
7
8 Taxes 12,757 13,076 13,403 13,738 14,081 14,433
9 Housing 19,135 19,614 20,104 20,607 21,122 21,650
10 Food 6,378 6,538 6,701 6,869 7,041 7,217
11 Transportation 9,568 9,807 10,052 10,303 10,561 10,825
12 Entertainment / Other 6,378 6,538 6,701 6,869 7,041 7,217
13 Healthcare 3,189 3,269 3,351 3,434 3,520 3,608
14 Total Expenses 57,405 58,842 60,312 61,820 63,366 64,950
15
16 Net Income (Savings) 6,379 6,792 7,228 7,684 8,163 8,666
17
18
19 Balance Sheet
20 Savings 6,379 13,171 20,399 28,083 36,246 44,912
21 Can I afford a car? N N N N Y Y
22

© UCLES 2020 0417/12/O/N/20


7

(a) Khalid has entered a formula in cell C4 of the Model sheet. The formula is B4+(B4*Plan!$B13)

Explain, in detail, what the formula does. Include in your answer an explanation of why the $
and the ! are used in the formula.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) He is saving up to buy a new car; this will cost at least $35,000.

Khalid has entered a formula in cell B21 of the Model sheet. The formula is
IF(B20>35000,"Y","N")

Explain, in detail, what the formula does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/12/O/N/20 [Turn over


8

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

(c) Khalid is planning to create an appropriate graph/chart to be placed in a new sheet. The
graph/chart will display the % of income and the names of the expenditure items from the
Plan sheet.

Identify the most appropriate graph/chart he could use and describe the steps he needs to
take to produce this graph/chart in a new sheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2020 0417/12/O/N/20


10

7 The owner of a soccer club has employed a systems analyst to create a new computerised system
to store details of club members.

The systems analyst starts by researching the existing system. One way he could do this is to
interview members of the soccer club.

(a) Discuss the benefits and drawbacks of individually interviewing the members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) When the systems analyst created the new system, he had to choose data types for each
field.

Write down the most appropriate data type for each field. The answers in the table must be
different in each case. The data type for one field has already been identified; this data type
must not be used for the other fields.

For any numeric field specify the type of number.

Field name Data type Example data

Year_joined 2019

Gender F

Date_of_birth 04/11/2000

Membership_number Text 01254

Cost_of_membership $10.50

[4]

© UCLES 2020 0417/12/O/N/20


11

(c) The systems analyst has set the data type for the Membership_number field as text.

Explain why this field has been set for a text data type rather than a numeric data type.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The owner of the soccer club is planning to create membership cards for all its members
using mail merge. The membership card will include personal data from the new system.

Describe the steps required to perform the mail merge.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20 [Turn over


12

8 Many supermarkets now use the internet and allow customers to buy their products online.

(a) Explain, in detail, the effects that online shopping has had on supermarkets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) When customers shop online, they can pay using a debit card.

Describe measures that customers could use to reduce fraud when using a debit card online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2020 0417/12/O/N/20


13

(c) Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.

Tick (3) whether the following statements refer to pharming, phishing or smishing.

pharming phishing smishing


(3) (3) (3)
Fake emails are sent to target users
When the user types in a URL they are directed to
a fake website
Malicious code is installed on the user’s computer
Fake text messages are sent to the user’s phone
[4]

9 When software is bought, the purchaser is subject to copyright legislation.

Give four actions that would breach copyright legislation.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

10 Define the following internet terms.

(a) Hyperlink ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) ISP ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2020 0417/12/O/N/20 [Turn over
14

11 For each of the following pieces of hardware, explain the strategies you would use to help minimise
health problems.

(a) Monitor ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Keyboard ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

12 Describe the differences between using a Graphical User Interface (GUI) and a Command Line
Interface (CLI).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2020 0417/12/O/N/20



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*5506029078*

Paper 1 Theory February/March 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

03_0417_12_2021_1.10
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of internal or external hardware devices.

internal external
(✓) (✓)

Mouse

Video card

Printer

Actuator

[2]

2 Geeta spends a great deal of time at work entering data into her computer.

State three items of hardware that Geeta should be provided with to help avoid RSI when she
enters data into the computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

[3]

© UCLES 2021 03_0417_12_2021_1.10


4

th
3 Falyaz has created a diary using word processing software. The diary entry for 17 May 2020 is
shown.

(a) Write down four formatting features of the word processing software used to make this diary
entry.

Feature 1...........................................................................................................................

...........................................................................................................................................

Feature 2...........................................................................................................................

...........................................................................................................................................

Feature 3...........................................................................................................................

...........................................................................................................................................

Feature 4...........................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10


5

(b) The original diary entry typed into the word processing software did not include an image.

Describe the steps that would be carried out by Falyaz to include in his diary entry an image
taken from his digital camera.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(c) Name two other sources of digital images apart from using a digital camera.

Source 1............................................................................................................................

...........................................................................................................................................

Source 2............................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


6

(d) Tick (✓) whether the following statements about generic image files refer to jpg, png or gif
file types.

jpg png gif


(✓) (✓) (✓)

This file type stores still or moving images

This file type uses lossy compression

This file type is used for storing photographs on a digital camera

This file type is limited to 256 colours

[4]

(e) Falyaz wants to add a header in his word processed diary.

Explain what is meant by a header and why it is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 03_0417_12_2021_1.10


7

4 The table shows a comparison of two different types of fitness tracker. A fitness tracker contains
a microprocessor, is worn around the wrist and monitors physical readings of the wearer.

Name of fitness tracker Flexi-byt 6 FitB 4

Battery life in days 20 days 7 days

Method of internet connection Bluetooth WiFi

Water resistant 100 m 10 m

GPS Y N

Cost INR 22 855 INR 10 700

(a) You have been asked to design a poster to show this data for the two fitness trackers.

Describe how you would use six different design features to enhance the data in this poster.
The poster must be suitable for an audience of adult customers.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


8

(b) Describe the computer processing involved in the use of a microprocessor-controlled fitness
tracker when displaying and monitoring the blood pressure of the user.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

5 A parent is concerned about his children sending texts. When sending a text, it is important to follow
netiquette.

(a) Explain what is meant by the term netiquette.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 03_0417_12_2021_1.10


9

(b) The parent is planning to produce a number of rules to ensure that his children follow netiquette
when texting other people.

Write down four rules that he could include in his list.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

6 Complete the following sentences, using the most appropriate direct data entry device.

a bar code reader a chip reader MICR a magnetic stripe reader


OCR OMR PIN pad RFID reader

(a) The device that reads data from a card in a contactless card system is called

........................................................................................................................................... [1]

(b) The device that reads scanned text and converts it into a readable form is called

........................................................................................................................................... [1]

(c) The device that reads the data made up of black lines and spaces on household goods is
called

........................................................................................................................................... [1]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


10

7 A school is planning to introduce a contactless card system for pupils to pay for school meals. Each
card contains an amount of money which is topped up by parents. Parents transfer amounts of
money into the school system and pupils place the card close to a reader to upload the money onto
the card.

(a) Discuss the benefits and drawbacks, to the pupils, of using a contactless card system rather
than paying by cash.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


11

(b) The terminals in the school use electronic funds transfer at point of sale (EFTPOS).

Describe the computer processing that takes place to pay for a meal at the EFTPOS terminal
using the card.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


12

8 A computer system is being created to calculate the scores in a diving competition. Every dive by
an athlete is awarded a score out of 10 by each judge.

The system is being tested using live data. An athlete completes his dive with a difficulty of 3.4 and
achieves the following scores, which are displayed in a spreadsheet.

(a) Before the overall score is calculated the judges’ scores need to be sorted into ascending
order.

Describe the steps that would be carried out to sort the data into ascending order.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2021 03_0417_12_2021_1.10


13

(b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).

Explain what the formula in cell B12 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The judges’ score column will be tested using normal, abnormal and extreme data.

Explain, giving examples of test data which would be used, what is meant by:

Abnormal test data............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Extreme test data..............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


14

9 Tawara school uses an optical mark recognition (OMR) system for its school register. An example
of the register is shown. For each session of the school there are two lozenges to be shaded in.

At the start of the registration period the teacher shades in a lozenge [P] on the register to show
that a pupil is present and shades in a lozenge [A] for each pupil who is absent. If a pupil is late
then the teacher shades in both the [P] and the [A] lozenges. The register sheets are sent to the
school office to be processed and the data from them is stored in the computer’s database.

(a) Describe the inputs and computer processing of the registers when they are sent to the school
office, prior to them being stored on the computer’s database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


15

(b) The headteacher of the school is considering modernising the registration system so that pupils
can register using a facial recognition system.

Discuss the advantages and disadvantages of using a facial recognition registration system
rather than the OMR system they currently use.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


16

(c) Biometric data, like facial recognition, is an example of personal data.

Give two other examples of personal data that could be stored on the school registration
database.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10


17

10 Computer data can be stored on physical storage devices. Data can also be stored in the ‘cloud’.

(a) Explain what is meant by the cloud, giving two advantages of storing data in the cloud compared
with physical storage devices.

Explanation........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 1......................................................................................................................

...........................................................................................................................................

Advantage 2......................................................................................................................

...........................................................................................................................................

[4]

(b) Tick (✓) whether the following storage devices are examples of optical, magnetic or solid
state storage.
optical magnetic solid state
(✓) (✓) (✓)

Flash drive

Hard disk drive

Blu-ray disc drive

SSD

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


18

11 The owner of a bookshop has a database of all the books she has in stock. As some of the data
is being entered into the database it is checked using validation checks.

An example of some of the records in the database is shown.

Field name Example data

Name of book Brotherhood of Wisdom

Name of author Colin Turner

ISBN 471837951

Date of purchase 25/02/2021

Number of copies 10

Type of book E

Name of book The Fourth Man

Name of author Aadha Khatri

ISBN 0718121753

Date of purchase 18/03/2019

Number of copies 53

Type of book H

Name of Book Indian Temples

Name of author Vihaan Laghan

ISBN 978147183215

Date of purchase 12/02/2019

Number of copies 30

Type of book H

© UCLES 2021 03_0417_12_2021_1.10


19

Explain, using a field name and examples of the data stored in that field in the database, why
validation checks must be appropriate to the data that is being checked.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

12 A company has placed a firewall between their Local Area Network (LAN) and their internet
connection. This is used to increase security in their computer systems.

Discuss the effectiveness of using this firewall to increase security.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 03_0417_12_2021_1.10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*7108723569*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of control, measurement or modelling applications.

control measurement modelling


(✓) (✓) (✓)

Personal finance

Weather forecasting

Burglar alarms

Weather stations

[4]

2 (a) Circle two items that could be used to output data directly from a smartphone.

Blu-ray disc microphone mouse screen


SD card sensor speaker webcam

[2]

(b) One of the uses of a smartphone is the sending and receiving of emails.

Describe four other uses of a smartphone.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


3

3 Tick (✓) the most appropriate storage medium that should be used in each scenario.

Magnetic tape RAM ROM


Scenario
(✓) (✓) (✓)

To store the current instructions in use by a


computer

To back up data from a school network server

To store data temporarily

To store the start-up instructions of a


computer

[4]

4 Complete the sentences below using the most appropriate word from the list.

cookies hacking pharming phishing


smishing spam spyware virus

(a) The act of gaining unauthorised access to a computer system is called

........................................................................................................................................... [1]

(b) The software that gathers data by monitoring key presses on a user’s keyboard is called

........................................................................................................................................... [1]

(c) A fake text message, that could contain a link, sent to a mobile phone is called

........................................................................................................................................... [1]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


4

5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.

ID Name_of_planet Number_of_moons Orbital_period Rings Gravity Type_of_planet First_observed

4 Mars 2 1.88 N 0.38 Regular 1610

5 Ceres 0 4.61 N 0.27 Dwarf 1801

7 Saturn 62 29 Y 1.16 Gas Giant 1610

9 Neptune 14 165 Y 1.21 Gas Giant 1846

10 Pluto 5 248 N 0.62 Dwarf 1930

11 Haumea 1 309 N 0.401 Dwarf 2004

(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.

Field name Data type

Number_of_moons

Orbital_period

Rings

Name_of_planet

[4]

© UCLES 2021 06_0417_12_2021_1.2


5

(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:

Type_of_planet = ''Gas Giant'' AND Number_of_moons > 20

Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [7]

(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:

ROUND(A2,0)

Explain in detail the function used in cell B2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


6

6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.

Previously the aircraft was manned and all the data was collected and flown back to the weather
station.

Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_12_2021_1.2


7

7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.

(a) When analysing the current booking system, the systems analyst must identify the user
requirements.

Explain why it is important for the systems analyst to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.

Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)

Identifying the problems with the current


system

Comparing the solution with the original


task requirements

Create the file structure

Identify limitations to the new system and


improvements to be made

[4]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


8

(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.

Name two other methods of implementation and describe two benefits of each.

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_12_2021_1.2


9

8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.

Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 (a) Describe two uses of a company intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


10

(b) Social networking is used to communicate with friends; this is one use of the internet.

Describe four other uses of the internet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


11

(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.

Discuss the benefits and drawbacks of policing social networking sites.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


12

10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 When an email is sent, it could have a digital certificate attached.

Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [5]

© UCLES 2021 06_0417_12_2021_1.2


13

12 A search engine can be used to find information on the internet.

(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.

Explain how he would evaluate the reliability of this information.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


14

The student plans to create a table, using word processing software, to display the information he
has found out about the animal.

The completed table will look like this:

Name of animal Tiger quoll

Scientific name Dasyurus maculatus

Pouched No

Habitat Australia

Conservation status Threatened

(c) Explain how the student can create a table to enter this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) The student has saved a picture from the internet of a tiger quoll.

Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_12_2021_1.2


Cambridge IGCSE™
* 9 2 0 1 7 1 7 2 6 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 203094/2
© UCLES 2021 [Turn over
2

1 A computer consists of both hardware and software.

(a) Give two examples of input devices which are part of a laptop computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) There are two types of software: system and applications.

Give two examples of system software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 Tick (3) the most appropriate printer which relates to the following statements.

3D Dot matrix Laser


(3) (3) (3)

This printer is an impact printer

This printer uses toner

This printer uses an inked ribbon

This printer uses tomography

[4]

3 (a) Describe two disadvantages of using a tablet computer rather than a laptop computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0417/12/O/N/21


3

(b) Modern computers often do not have an optical drive.

State two ways music can be transferred onto a computer that does not contain an optical
drive.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

4 Write down the most appropriate network device to match the following statements. Your answers
should be different in each part.

(a) This network device checks the data packet arriving from one computer and sends the data
to a specific computer.

............................................................................................................................................. [1]

(b) This network device sends the data packet from a computer to all devices connected to it.

............................................................................................................................................. [1]

(c) This network device connects a LAN to the internet.

............................................................................................................................................. [1]

(d) This network device connects one LAN to another with the same protocol.

............................................................................................................................................. [1]

© UCLES 2021 0417/12/O/N/21 [Turn over


4

5 The Internet of Things (IoT) is a computer network which allows users to control household
devices remotely. It has many benefits, for example a user can turn on the house central heating
via a smartphone. The IoT can use WiFi and Bluetooth which can cause problems regarding data
security.

Describe the methods that could be taken to protect the user’s data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21


5

6 As a student you often use a computer keyboard. This could be a virtual keyboard or a physical
keyboard on a desktop computer, a laptop computer or even a smartphone.

Evaluate your use of computer keyboards in terms of health risks, and explain any strategies you
use to minimise these health risks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2021 0417/12/O/N/21 [Turn over


6

7 Rockit Motors recently created a new car sales website. The website uses internet shopping
features. Customers can ask questions of the virtual salespeople on the website, and then
purchase the car on the website.

(a) Describe two other features of internet shopping.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Discuss the benefits and drawbacks of using internet shopping for Rockit Motors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


7

(c) Before the website became operational it needed to be tested. The web designer created a
test plan including module and whole system testing.

Explain the difference between module and whole system testing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


8

8 You are creating a presentation on the World Games. You have created a spreadsheet showing
the number of gold, silver and bronze medals awarded to different countries.

You are planning to create a graph in the presentation showing the country, the number of gold
medals and the total number of medals.

A B C D E F
1 World Games Medals
2
3 Country Gold Silver Bronze Total
4 1 Italy 153 145 142 440
5 2 United States 142 131 109 382
6 3 Germany 137 111 138 386
7 4 Russia 137 110 72 319
8 5 France 101 102 105 308
9 6 China 68 55 27 150
10 7 Great Britain 61 89 210 360
11 8 Japan 55 38 53 146
12 9 Ukraine 47 36 125 208
13 10 Spain 42 42 42 126

Original data

(a) Explain how you would create a vertical bar chart, showing the name of the country, the
number of gold medals and the total number of medals awarded to each country, on a new
slide in the presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


9

(b) The total number of medals has been calculated manually and entered as a value. This could
lead to errors.

Explain how you could create a formula to calculate the total number of medals awarded for
Italy, using only the mouse.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Explain how the data could be sorted by the total number of medals won by each country.
The country with the largest number of medals should be at the top of the list.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


10

9 Identify and describe the three web development layers.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2021 0417/12/O/N/21


11

10 A school is planning to change the way it reports back to parents about their child’s academic
progress. They plan to produce a mail merged document and then email this to parents.

They have created a spreadsheet which shows the pupil’s name, target, attainment and effort
levels for Maths and the Science subjects.

Part of the spreadsheet is shown.

A B C D E F G H I J K
1 Name Target level Maths Biology Chemistry Physics
2 Attainment Effort Attainment Effort Attainment Effort Attainment Effort
3 Ahmal Wulandan 6 7 2 6 2 8 1 7 2
4 Nurul Prakoso 8 7 3 7 3 9 1 7 2
5

(a) Design a suitable document layout to display the information of one pupil. The name of the
pupil must be clearly shown separated from the rest of the data. It must have appropriate
spacing. Do not include the pupil’s data.

[6]

(b) The attainment levels range from 1 to 9 and the effort levels range from 1 to 3. Before teachers
are allowed to enter data, the spreadsheet needs to be tested.

Write down one example of extreme data to test the attainment field and one example of
abnormal data to test the effort field.

Attainment – extreme data .......................................................................................................

Effort – abnormal data ..............................................................................................................


[2]

© UCLES 2021 0417/12/O/N/21 [Turn over


12

(c) Describe four advantages of using a mail merge for this document.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(d) When the mail merge is created, a special field containing the date needs to be added. This
date will change automatically each time the merged document is sent or printed.

Explain how the date field can be added.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/12/O/N/21


13

11 An air-conditioning system has been fitted in a hotel bedroom. The air-conditioning system will
contain fans which operate at varying speeds.

Identify the devices used in the system from the descriptions given.

(a) This device captures the temperature from the room.

............................................................................................................................................. [1]

(b) This device changes the data from the microprocessor into a form that can change the speed
of the fan.

............................................................................................................................................. [1]

(c) This output device operates the fan.

............................................................................................................................................. [1]

12 Discuss the disadvantages of policing the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21 [Turn over


14

13 The internet has both moderated and unmoderated forums.

Explain what is meant by a moderated forum.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

14 Students in Tawara College are using the internet to find information for a project. They have been
told that the college has a firewall.

(a) Explain what is meant by a firewall and why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


15

The students visit different websites to get information for their project.

(b) Explain why it is not always easy for the students to find reliable information on the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4639429146*

Paper 1 Theory February/March 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2

1 A tablet computer consists of both hardware and software.

(a) Define the term hardware.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) One input device used on a tablet computer is a touch screen.

Name two other input devices built into a tablet computer.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) Write down two examples of system software.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

2 Circle two items that contain personal data.

bank card bar code laser printer

medical record mouse sensor

[2]

© UCLES 2022 03_0417_12_2022_1.13


3

3 The internal memory of a computer consists of both ROM and RAM.

(a) Describe the terms ROM and RAM.

ROM .................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

RAM ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).

State three advantages of using SSDs rather than HDDs in a laptop computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


4

4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.

Only tick (✓) one answer for each statement.

control measurement modelling


(✓) (✓) (✓)
Maintaining the growing conditions in a
glasshouse

Aircraft flight simulation

Monitoring the pollution in a river

Using what-ifs

[4]

5 The World Wide Web (WWW) is often mistaken for the internet.

(a) Explain the differences between the WWW and the internet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13


5

(b) The web address for Cambridge IGCSE is:

https://www.cambridgeinternational.org/IGCSE

Describe the following parts of the web address.

https:// ...............................................................................................................................

...........................................................................................................................................

cambridgeinternational .....................................................................................................

...........................................................................................................................................

.org ...................................................................................................................................

...........................................................................................................................................

/IGCSE .............................................................................................................................

...........................................................................................................................................

[4]

6 Global Positioning Systems (GPS) are used for many different applications.

(a) Describe how GPS is used by a smartphone to pinpoint its location.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


6

(b) Give three other examples of the use of GPS.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13


7

7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.

For this concert they are going to use an online booking system.

(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.

........................................................................................................................................... [1]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


8

(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


9

9 The introduction of computers into the work place has affected job patterns.

(a) Explain what is meant by part-time working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain what is meant by compressed hours working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Employees working in an office use computers for prolonged periods of time.

Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


10

(d) The office must be a safe working environment.

State two physical safety issues that might exist from the introduction of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.

Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


11

11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.

Choose the most appropriate implication that matches the descriptions given below.

(a) Ensuring that copyright laws have been followed.

........................................................................................................................................... [1]

(b) Not giving information about the ICT solution to another company.

........................................................................................................................................... [1]

12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.

Each car has a unique licence plate.

The cars can either be powered by electric or petrol.

Cars are serviced every 10000 km, for example 10000 km, 20000 km.

The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.

Different models of car are serviced.

The date of the service is agreed.

(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.

Field name Data type

Vehicle_licence_plate

Powered_by

Numeric:integer

Cost_of_service

Text

Date_of_service

[6]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


12

(b) The systems analyst is planning to create a relational database.

Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 03_0417_12_2022_1.13


13

(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.

(i) Vehicle_licence_plate

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(ii) Cost_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(iii) Date_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

13 A family has a number of different devices connected to the internet.

(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


14

(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.

Describe three other ways he could make appropriate use of the internet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(c) Arjun uses the internet to carry out research for his work.

Describe two drawbacks of Arjun using the internet for research.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2022 03_0417_12_2022_1.13


15

(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.

(i) Explain why this is not very secure.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Describe two other ways the office system could identify the user securely.

1 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

[4]

© UCLES 2022 03_0417_12_2022_1.13



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*8667658371*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2

1 Circle two input devices.


Digital
3D printer Actuator CD ROM
camera

Keyboard Linker Monitor Speaker

[2]

2 A computer-controlled glasshouse is used to grow plants.

Identify two output devices used in this glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

3 Network devices are used in computer systems.

Complete each sentence by identifying the most appropriate network device.

(a) The network device that is used to transmit the data along an analogue telephone line is a

........................................................................................................................................... [1]

(b) The network device that connects a LAN to a WAN is a

........................................................................................................................................... [1]

(c) The network device that allows data to be directed to a specific computer on a LAN is a

........................................................................................................................................... [1]

(d) The internal network device that allows a computer to connect to a LAN is a

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15


3

4 Many word processing packages have a number of formatting features.

The paragraph below shows some of the formatting features that can be used.

(a) Write down four of the formatting features that have been used in the paragraph shown.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


4

(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.

Summer
Steam Festival Summer
2022 Steam Festival
2022

A B

Describe the steps that have been used to transform logo A into logo B.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15


5

5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.

Describe the advantages of using RFID rather than bar codes.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).

Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


6

7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.

The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.

(a) List four other principles of a typical data protection act.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Explain what is meant by personal data. Include two examples of personal data in your answer.

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example 1 .........................................................................................................................

...........................................................................................................................................

Example 2 .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


7

(c) Explain why personal data should be kept confidential and secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:

(a) Write down only the part of the URL which shows the file name of the teaching guide.

........................................................................................................................................... [1]

(b) Write down only the part of the URL which is the folder where the teaching guide is stored.

........................................................................................................................................... [1]

(c) Write down only the part of the URL which is the domain name.

........................................................................................................................................... [1]

(d) Explain what is meant by https.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


8

9 A student is creating a spreadsheet of airports for a project.

The formula in G2 is:

=VLOOKUP(F2,A2:B9,2,0)

(a) Explain, in detail, what the formula in G2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.

There are three types of test data: normal, abnormal and extreme.

Explain what is meant by these three types of test data.

Normal ..............................................................................................................................

...........................................................................................................................................

Abnormal ..........................................................................................................................

...........................................................................................................................................

Extreme ............................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


9

(c) Explain, using examples, the differences between a function and a formula.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(d) The completed file could have been created using a database.

Describe two reasons why databases are used in certain applications rather than spreadsheets.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


10

10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.

Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 06_0417_12_2022_1.15


11

11 A car manufacturing company uses computer-controlled robots to manufacture its cars.

Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


12

12 Different methods can be used to analyse a system.

Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.

(a) Describe the two types of verification.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15


13

(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


14

14 Spam is associated with ICT systems.

(a) Explain what is meant by the term spam.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the ways that a user can recognise spam and methods to help prevent it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_12_2022_1.15


15

15 (a) Explain what is meant by cloud storage and how it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe two issues related to the security of data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


16

16 A company uses corporate house style within the headers and footers in its documents.

(a) Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain why headers and footers are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_12_2022_1.15

You might also like